CVE-2002-1495 : Detail

CVE-2002-1495

0.25%V3
Network
2003-03-18
04h00 +00:00
2003-03-21
09h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Cross-site scripting (XSS) vulnerability in JAWmail 1.0-rc1 allows remote attackers to insert arbitrary script or HTML via (1) attached file names in the Read Mail feature, (2) text/html mails that are displayed in a pop-up window, and (3) certain malicious attributes within otherwise safe tags, such as onMouseOver.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 21817

Publication date : 2002-09-22 22h00 +00:00
Author : Ulf Harnhammar
EDB Verified : Yes

source: https://www.securityfocus.com/bid/5771/info Problems with JAWMail could make it possible to execute arbitrary script code in a vulnerable client. JAWMail does not sufficiently filter malicious HTML code from e-mails. As a result, when a user opens an email in JAWMail that contains malicious HTML code, the code contained in the mail would be executed in the browser of the mail user. <b onMouseOver="alert(document.cookie)">bolder</b>

Products Mentioned

Configuraton 0

Rudi_benkovic>>Jawmail >> Version 1.0

    Rudi_benkovic>>Jawmail >> Version 1.0.1

      Rudi_benkovic>>Jawmail >> Version 1.0_rc1

        References

        http://www.securityfocus.com/bid/5771
        Tags : vdb-entry, x_refsource_BID