Cross-site scripting (XSS) vulnerability in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) retid parameter in badlogin.php, (2) Content-Type headers in HTML mails, and (3) HTML mail attachments.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0580.html - | |
References | () http://secunia.com/advisories/16665 - Vendor Advisory | |
References | () http://secunia.com/secunia_research/2005-58/advisory/ - Vendor Advisory | |
References | () http://www.osvdb.org/20926 - | |
References | () http://www.osvdb.org/20927 - | |
References | () http://www.osvdb.org/20928 - | |
References | () http://www.securityfocus.com/bid/15493 - | |
References | () http://www.vupen.com/english/advisories/2005/2485 - |
Information
Published : 2005-11-19 01:03
Updated : 2024-11-21 00:02
NVD link : CVE-2005-3692
Mitre link : CVE-2005-3692
CVE.ORG link : CVE-2005-3692
JSON object : View
Products Affected
amax_information_technologies
- magic_winmail_server
CWE