CVE-2006-2138

Neomail - XSS

Title source: rule
STIX 2.1

Description

Cross-site scripting (XSS) vulnerability in neomail.pl in NeoMail 1.29 allows remote attackers to inject arbitrary web script or HTML via the sessionid parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by O.U.T.L.A.W · textwebappscgi
https://www.exploit-db.com/exploits/27761

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/432398/100/0/threaded
Various Sources x_refsource_misc
http://www.aria-security.net/hm/neomail.txt
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/26127
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/827
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/17728
Exploit, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19906
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1590

Scores

EPSS 0.0885
EPSS Percentile 92.6%

Details

Status published
Products (1)
neomail/neomail 1.29
Published May 02, 2006
Tracked Since Feb 18, 2026