CVE-2007-3171

Uebimiau Webmail - Info Disclosure

Title source: llm
STIX 2.1

Description

Uebimiau Webmail allows remote attackers to obtain sensitive information via a request to demo/pop3/error.php with an invalid value of the (1) smarty or (2) selected_theme parameter, which reveals the path in various error messages.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Michal Majchrowicz · textwebappsphp
https://www.exploit-db.com/exploits/30098

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/38337
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/24210
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/34554

Scores

EPSS 0.0365
EPSS Percentile 87.9%

Details

Status published
Products (3)
uebimiau/uebimiau 2.7.2
uebimiau/uebimiau 2.7.9
uebimiau/uebimiau 2.7.10
Published Jun 11, 2007
Tracked Since Feb 18, 2026