source: https://www.securityfocus.com/bid/20109/info Neon WebMail is prone to multiple input-validation vulnerabilities because it fails to sanitize user-supplied input. These issues include: - an arbitrary-file-upload vulnerability - an arbitrary-email-manipulation vulnerability - multiple SQL-injection vulnerabilities - an unauthorized-access vulnerability - multiple directory-traversal vulnerabilities - an HTML-injection vulnerability. An attacker can exploit these issues to compromise the affected application. Versions 5.06 and 5.07 (build.200607050) are vulnerable to these issue; prior versions may also be affected. http://www.example.com/neonwebmail/updatemail?ID=1&getpost=get&folderid=-1&tofolderid=-9&status=1&execute=move http://www.example.com/neonwebmail/updatemail?ID=1&getpost=get&folderid=-9&tofolderid=100&status=1&execute=move