MailTraq version 2.17.3.3150 suffers from a stored cross site scripting vulnerability.
146ace147ff06c7f56045da0af62a91fa81e836cd9400ac850544756e07b726e
Mailtraq WebMail version 2.17.7.3550 suffers from a persistent cross site scripting vulnerability.
7eca4c1e4156efd59362e3ba61cb23597e46a840f3b4dc51f9f5b4a4e8a2074a
Secunia Security Advisory - loneferret has reported a vulnerability in Mailtraq, which can be exploited by malicious people to conduct script insertion attacks.
0fed1f091fa8e947c49a2bc8ed348237c9dd70c2ba8826e594dbf58a285edf86
Mailtraq Version 2.6.1.1677 remote exploit which allows SYSTEM level access while using the Mailtraq administration console. Requires a Mailtraq admin account.
9363a24390dc5f166823eede37366696be7abfad27c632dc5627567f22951267
A privilege escalation technique can be used to gain SYSTEM level access while using the Mailtraq administration console. Mailtraq Version 2.6.1.1677 is vulnerable.
754a99a37c23e5ce9586839e1dbef857f90469878efeac14f8dd013ad62fd9e5
The product Mailtraq suffers from multiple vulnerabilities that range from access to files that reside outside the bounding HTML root directory through decryption of locally stored password, to a cross site scripting vulnerability in the web mail interface.
0fccaf9934ee9baa9e271e3755695428f4343300ad90ccad092c5010d7861a0e
Buffer0verflow Security Advisory #1 - Mailtraq remote file retriving. The Mailtraq message server for Windows NT, 95, and 98 allows any file on the system to be read via a /../../ bug. All versions prior to 1.1.4 are affected.
811946ab0ebf72ba32eae273bd408419d58277b2cc6bec4feb1dad2886c8fc0e