First published: Tue Feb 15 2005(Updated: )
Cross-site scripting (XSS) vulnerability in Open WebMail 2.x allows remote attackers to inject arbitrary HTML or web script via the domain name parameter (logindomain) in the login page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open Webmail | =2.01 | |
Open Webmail | =2.50 | |
Open Webmail | =2.41 | |
Open Webmail | =2.00 | |
Open Webmail | =2.30 | |
Open Webmail | =2.21 | |
Open Webmail | =2.10 | |
Open Webmail | =2.20 | |
Open Webmail | =2.40 | |
Open Webmail | =2.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0445 has a moderate severity level due to its potential for cross-site scripting attacks.
To fix CVE-2005-0445, upgrade Open WebMail to version 2.51 or later, which addresses this vulnerability.
Open WebMail versions 2.00, 2.01, 2.10, 2.20, 2.21, 2.30, 2.32, 2.40, 2.41, and 2.50 are affected by CVE-2005-0445.
CVE-2005-0445 is a cross-site scripting (XSS) vulnerability that allows attackers to inject arbitrary HTML or web scripts.
Yes, CVE-2005-0445 can be exploited remotely by attackers through the login page of Open WebMail.