PhpTpoint Mailing Server Using File Handling 1.0 suffers from multiple Arbitrary File Read vulnerabilities in different sections that allow an malicious user to read sensitive files on the system via directory traversal, bypassing the login page, as demonstrated by the Mailserver_filesystem/home.php coninb, consent, contrsh, condrft, or conspam parameter.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
phptpoint mailing server using file handling 1.0 |