Description
mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash), leak sensitive pathname information in the resulting error message, and execute a cross-site scripting (XSS) attack via an HTTP request that contains a / (backslash) and arbitrary webscript before the requested file, which leaks the pathname and does not quote the script in the resulting Visual Basic error message.
Exploits (1)
References (4)
Core 4
Core References
Various Sources x_refsource_misc
http://www.procheckup.com/security_info/vuln_pr0411.html
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/11598
Third Party Advisory, US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/596046
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/17951
Scores
EPSS
0.0270
EPSS Percentile
85.9%
Details
Status
published
Products (1)
tips/mailpost
5.1.1_sv
Published
Jan 10, 2005
Tracked Since
Feb 18, 2026