4.3
CVSSv2

CVE-2012-2571

Published: 12/08/2012 Updated: 13/08/2012
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in WinWebMail Server 3.8.1.6 allow remote malicious users to inject arbitrary web script or HTML via an e-mail message body with (1) a SCRIPT element, (2) a crafted Cascading Style Sheets (CSS) expression property, (3) a CSS expression property in the STYLE attribute of an arbitrary element, (4) a crafted SRC attribute of an IFRAME element, or (5) UTF-7 text in an HTTP-EQUIV="CONTENT-TYPE" META element.

Vulnerable Product Search on Vulmon Subscribe to Product

winwebmail winwebmail server 3.8.1.6

Exploits

#!/usr/bin/python ''' Author: loneferret of Offensive Security Product: WinWebMail Server Version: 3816 Vendor Site: wwwwinwebmailnet Software Download: wwwwinwebmailnet/email-server-downloadhtml Timeline: 29 May 2012: Vulnerability reported to CERT 30 May 2012: Response received from CERT with disclosure date set to 20 Jul ...