CVE-2004-2447

1st Class Mail Server 4.01 - XSS

Title source: llm
STIX 2.1

Description

Cross-site scripting (XSS) vulnerability in 1st Class Mail Server 4.01 allows remote attackers to inject arbitrary web script or HTML via the Mailbox parameter to (1) viewmail.tagz, (2) the index script under /user/, (3) members.tagz, (4) general.tagz, (5) advanced.tagz, or (6) list.tagz.

Exploits (6)

exploitdb WRITEUP VERIFIED
by dr_insane · textwebappscgi
https://www.exploit-db.com/exploits/23937
exploitdb WRITEUP VERIFIED
by dr_insane · textwebappscgi
https://www.exploit-db.com/exploits/23939
exploitdb WRITEUP VERIFIED
by dr_insane · textwebappscgi
https://www.exploit-db.com/exploits/23942
exploitdb WRITEUP VERIFIED
by dr_insane · textwebappscgi
https://www.exploit-db.com/exploits/23938
exploitdb WRITEUP VERIFIED
by dr_insane · textwebappscgi
https://www.exploit-db.com/exploits/23940
exploitdb WRITEUP VERIFIED
by dr_insane · textwebappscgi
https://www.exploit-db.com/exploits/23941

References (10)

Core 10
Core References
Exploit, Vendor Advisory vdb-entry x_refsource_sectrack
http://securitytracker.com/alerts/2004/Apr/1009705.html
Exploit vdb-entry x_refsource_osvdb
http://www.osvdb.org/5017
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/15815
Exploit vdb-entry x_refsource_osvdb
http://www.osvdb.org/5014
Exploit vdb-entry x_refsource_osvdb
http://www.osvdb.org/5013
Exploit vdb-entry x_refsource_osvdb
http://www.osvdb.org/5015
Exploit, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/11330
Exploit vdb-entry x_refsource_osvdb
http://www.osvdb.org/5016
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/10089
Exploit vdb-entry x_refsource_osvdb
http://www.osvdb.org/5012

Scores

EPSS 0.0081
EPSS Percentile 74.3%

Details

Status published
Products (1)
1st_class_internet_solutions/1st_class_mail_server 4.01
Published Dec 31, 2004
Tracked Since Feb 18, 2026