CVE-2002-0738 in MHonArcinfo

Summary

MHonArc 2.5.2 and earlier does not properly filter Javascript from archived e-mail messages, which could allow remote attackers to execute script in web clients by (1) splitting the SCRIPT tag into smaller pieces, (2) including the script in a SRC argument to an IMG tag, or (3) using "&={script}" syntax.

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Disclosure

08/12/2002

Entries

1: VDB-18624

CPE

ready

CVSS

6.3

EPSS

0.01141

Activities

Very Low

Sources

Want to stay up to date on a daily basis?

Enable the mail alert feature now!