Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks for multiple vulnerabilities in ArGoSoft Mail Server Pro <= 126.96.36.199
Detailed Explanation for this Vulnerability Assessment
The remote mail server is affected by multiple flaws.
The version of ArGoSoft Mail Server Pro installed on the remote host
suffers from several vulnerabilities, including :
- Unauthenticated Account Creation Vulnerability
The application does not authenticate requests sent through
the web interface before creating mail accounts and may
create them even if ArGoSoft has been configured not to.
- Multiple Cross-Site Scripting Vulnerabilities
ArGoSoft fails to filter some HTML tags in email messages
eg, the SRC parameter in an IMG tag. A possible hacker may be
able to run arbitrary HTML and script code in a user's
browser within the context of the affected web site if
the user reads email using ArGoSoft's web interface.
See also :
Upgrade to ArGoSoft Mail Server Pro 188.8.131.52 or later.
Network Security Threat Level:
Low / CVSS Base Score : 2
Networks Security ID: 13323, 13326
Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security
|IBM SYSTEM X3550 M5 SERVER TWO E5-2623V3 3GHZ 128GB 2 X 1TB 7.2K 6G NL SATA
|IBM HX5 BLADECENTER SERVER TWO E7-4860 2.26GHZ 12GB NO HDD
|IBM SYSTEM X3650 M5 2.5 SERVER TWO E5-2697V4 2.3GHZ 4 X 32GB 6 X 1.2TB10K 12G
|IBM SYSTEM X3650 M5 2.5 SERVER E5-2667V3 3.2GHZ 2 X 32GB 4 X 1.2TB10K 12G
No Discussions have been posted on this vulnerability.