![softaculous communigate pro softaculous communigate pro](https://servilon.ru/wp-content/uploads/2021/05/image-3.png)
![softaculous communigate pro softaculous communigate pro](https://webmail.iway.ch/SkinFiles/webmail.iway.ch/Viewpoint/loginlogo.png)
How can I store all outgoing mail sent by all my users?.How can my customers release mail to all their domains with one ETRN or ATRN?.How can my customer servers receive mail if they have dynamic IP addresses? (ATRN/RPOP).How can I hold all client mail till their servers send ETRN?.How can my customer servers receive mail if they have dial-up connections? (ETRN).How can I forward mail to the other SMTP MTA on the same server?.How can I send E-mail and Signals to a remote host bypassing its DNS MX/SRV records?.How can I relay E-mail and Signals for certain domains?.How can I gradually migrate accounts from my old server?.Improper Limitation of a Pathname to a Restricted Directory ('Path. (dot dot) attack.īuffer overflow in CommuniGatePro via a long string to the HTTP configuration port.
SOFTACULOUS COMMUNIGATE PRO PRO
The web administration interface for CommuniGate Pro 3.2.5 and earlier allows remote attackers to read arbitrary files via a. POP3 daemon in Stalker CommuniGate Pro 3.3.2 generates different error messages for invalid usernames versus invalid passwords, which allows remote attackers to determine valid email addresses on the server for SPAM attacks. NOTE: it is not clear whether this issue reveals any more information regarding directory structure than is already available to any CommuniGate Pro user, although there is a possibility that it could be used to infer product version information. Unknown vulnerability in the LIST functionality in CommuniGate Pro before 4.3c3 allows remote attackers to cause a denial of service (server crash) via certain multipart messages.ĬommuniGate Pro 3.1 through 4.0.6 sends the session ID in the referer field for an HTTP request for an image, which allows remote attackers to hijack mail sessions via an e-mail with an IMG tag that references a malicious URL that captures the referer.ĭirectory traversal vulnerability in CommuniGate Pro 4.0b4 and possibly earlier versions allows remote attackers to list the contents of the WebUser directory and its parent directory via a (1).
SOFTACULOUS COMMUNIGATE PRO CODE
The attack uses an HTTP POST request to a /Session URI, and interchanges the XML From and To elements.Ĭross-site scripting (XSS) vulnerability in the WebMail system in Stalker CommuniGate Pro 5.1.8 and earlier, when using Microsoft Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via crafted STYLE tags.ĬommuniGate Pro Core Server before 5.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via LDAP messages with negative BER lengths, and possibly other vectors, as demonstrated by the ProtoVer LDAP test suite. The "XML Interface to Messaging, Scheduling, and Signaling" (XIMSS) protocol implementation in CommuniGate Pro (CGP) 6.2 suffers from a Missing XIMSS Protocol Validation attack that leads to an email spoofing attack, allowing a malicious authenticated attacker to send a message from any source email address.