Vulnerability Name: | CVE-2005-2863 (CCN-22202) | ||||||||
Assigned: | 2005-09-07 | ||||||||
Published: | 2005-09-07 | ||||||||
Updated: | 2016-10-18 | ||||||||
Summary: | Cross-site scripting (XSS) vulnerability in openwebmail-main.pl in OpenWebMail 2.41 allows remote attackers to inject arbitrary web script or HTML via the sessionid parameter. | ||||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2005-2863 Source: BUGTRAQ Type: UNKNOWN 20050903 I have discovered small xss error in open webmail 2.41 Source: CCN Type: SA16734 Open WebMail "sessionid" Cross-Site Scripting Vulnerability Source: SECUNIA Type: Vendor Advisory 16734 Source: CCN Type: Open WebMail Web site Welcome to Open WebMail Project! Source: CCN Type: OSVDB ID: 19225 Open WebMail Error Message Session ID XSS Source: CCN Type: OSVDB ID: 41081 Open WebMail (OWM) openwebmail-main.pl Multiple Parameter XSS Source: CCN Type: OSVDB ID: 41082 Open WebMail (OWM) openwebmail-prefs.pl Multiple Parameter XSS Source: CCN Type: OSVDB ID: 41083 Open WebMail (OWM) openwebmail-send.pl Multiple Parameter XSS Source: CCN Type: OSVDB ID: 41084 Open WebMail (OWM) openwebmail-folder.pl Multiple Parameter XSS Source: CCN Type: OSVDB ID: 41085 Open WebMail (OWM) openwebmail-webdisk.pl Multiple Parameter XSS Source: CCN Type: OSVDB ID: 41086 Open WebMail (OWM) openwebmail-advsearch.pl folder Parameter XSS Source: CCN Type: OSVDB ID: 41087 Open WebMail (OWM) openwebmail-abook.pl Multiple Parameter XSS Source: BID Type: UNKNOWN 14771 Source: CCN Type: BID-14771 Open WebMail OpenWebmail-main.PL Cross-Site Scripting Vulnerability Source: XF Type: UNKNOWN openWebmail-sessionid-xss(22202) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |