Multiple cross-site scripting (XSS) vulnerabilities in EMU Webmail 5.2.7 allow remote attackers to inject arbitrary web script or HTML via (1) a hex-encoded value to the variable parameter in emumail.fcgi, (2) the folder parameter in emumail.fcgi, or Javascript in the (3) username or (4) password field in the login page.
References
Link | Resource |
---|---|
http://members.lycos.co.uk/r34ct/main/emu/emu.txt | Exploit Vendor Advisory |
http://www.zone-h.com/advisories/read/id=4141 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/9861 | Exploit |
http://www.osvdb.org/4204 | Exploit |
http://www.osvdb.org/4972 | Exploit |
http://securitytracker.com/id?1009397 | Exploit |
http://secunia.com/advisories/11110 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15452 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15451 |
Configurations
Information
Published : 2004-12-30 21:00
Updated : 2017-07-10 18:31
NVD link : CVE-2004-2334
Mitre link : CVE-2004-2334
JSON object : View
CWE
Products Affected
emumail
- emu_webmail