CVE-2007-5290

Multiple cross-site scripting (XSS) vulnerabilities in MailBee WebMail Pro 3.4 and earlier; and possibly MailBee WebMail Pro ASP before 3.4.64, WebMail Lite ASP before 4.0.11, and WebMail Lite PHP before 4.0.22; allow remote attackers to inject arbitrary web script or HTML via the (1) mode parameter to login.php and the (2) mode2 parameter to default.asp in an advanced_login mode.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:afterlogic:mailbee_webmail:*:*:lite_asp:*:*:*:*:*
cpe:2.3:a:afterlogic:mailbee_webmail:*:*:lite_php:*:*:*:*:*
cpe:2.3:a:afterlogic:mailbee_webmail:*:*:pro_asp:*:*:*:*:*
cpe:2.3:a:afterlogic:mailbee_webmail:3.1:*:pro:*:*:*:*:*
cpe:2.3:a:afterlogic:mailbee_webmail:3.2:*:pro:*:*:*:*:*
cpe:2.3:a:afterlogic:mailbee_webmail:3.3:*:pro:*:*:*:*:*
cpe:2.3:a:afterlogic:mailbee_webmail:3.4:*:pro:*:*:*:*:*

History

21 Nov 2024, 00:37

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=119161078031690&w=2 - () http://marc.info/?l=bugtraq&m=119161078031690&w=2 -
References () http://osvdb.org/37649 - () http://osvdb.org/37649 -
References () http://osvdb.org/37650 - () http://osvdb.org/37650 -
References () http://secunia.com/advisories/27073 - Vendor Advisory () http://secunia.com/advisories/27073 - Vendor Advisory
References () http://www.securityfocus.com/bid/25942 - () http://www.securityfocus.com/bid/25942 -
References () http://www.securitytracker.com/id?1018783 - () http://www.securitytracker.com/id?1018783 -
References () http://www.vupen.com/english/advisories/2007/3450 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/3450 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/36979 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/36979 -

Information

Published : 2007-10-09 18:17

Updated : 2024-11-21 00:37


NVD link : CVE-2007-5290

Mitre link : CVE-2007-5290

CVE.ORG link : CVE-2007-5290


JSON object : View

Products Affected

afterlogic

  • mailbee_webmail
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')