CVE-2004-1719
Multiple cross-site scripting (XSS) vulnerabilities in Merak Webmail Server 5.2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) category, (2) cserver, (3) ext, (4) global, (5) showgroups, (6) or showlite parameters to address.html, or the (7) spage or (8) autoresponder parameters to settings.html, the (9) folder parameter to readmail.html, or the (10) attachmentpage_text_error parameter to attachment.html, (11) folder, (12) ct, or (13) cv parameters to calendar.html, (14) an <img> tag, or (15) the subject of an e-mail message.
Published
2004-08-17T04:00:00.000
Last Modified
2025-04-03T01:03:51.193
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 4.3 (MEDIUM)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:N/I:P/A:N
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: PARTIAL
- Availability Impact: NONE
Exploitability Score
8.6
Impact Score
2.9
Weaknesses
-
Type: Primary
NVD-CWE-Other
Affected Vendors & Products
Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
Application |
merak
|
mail_server
|
7.4.5 |
Yes
|
References
-
http://marc.info/?l=bugtraq&m=109279057326044&w=2
([email protected])
-
http://packetstormsecurity.nl/0408-exploits/merak527.txt
Exploit, Patch, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/12269
Exploit, Patch, Vendor Advisory
([email protected])
-
http://securitytracker.com/id?1010969
([email protected])
-
http://www.osvdb.org/9037
Patch, Vendor Advisory
([email protected])
-
http://www.osvdb.org/9038
Patch, Vendor Advisory
([email protected])
-
http://www.osvdb.org/9039
Patch, Vendor Advisory
([email protected])
-
http://www.osvdb.org/9040
Patch, Vendor Advisory
([email protected])
-
http://www.osvdb.org/9041
Patch, Vendor Advisory
([email protected])
-
http://www.osvdb.org/9042
Patch, Vendor Advisory
([email protected])
-
http://www.securityfocus.com/bid/10966
Exploit, Patch, Vendor Advisory
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17024
([email protected])
-
http://marc.info/?l=bugtraq&m=109279057326044&w=2
(af854a3a-2127-422b-91ae-364da2661108)
-
http://packetstormsecurity.nl/0408-exploits/merak527.txt
Exploit, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/12269
Exploit, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://securitytracker.com/id?1010969
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/9037
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/9038
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/9039
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/9040
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/9041
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/9042
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/10966
Exploit, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17024
(af854a3a-2127-422b-91ae-364da2661108)