CVE: CVE-2002-1527

Export to Word

emumail.cgi in EMU Webmail 5.0 allows remote attackers to determine the full pathname for emumail.cgi via a malformed string containing script, which generates a regular expression matching error that includes the pathname in the resulting error message.

Threat-Mapped Scoring

Score: 0.0

Priority: Unclassified

EPSS

Score: 0.04308
Percentile: 0.88405

CVSS Scoring

CVSS v2 Score: 5.0

Severity:

Affected Products

← Back to Home