Description
Cross-site scripting (XSS) vulnerability in neomail.pl in NeoMail 1.29 allows remote attackers to inject arbitrary web script or HTML via the sessionid parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by O.U.T.L.A.W · textwebappscgi
https://www.exploit-db.com/exploits/27761
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/432398/100/0/threaded
Various Sources x_refsource_misc
http://www.aria-security.net/hm/neomail.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/26127
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/827
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17728
Exploit, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19906
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1590
Scores
EPSS
0.0885
EPSS Percentile
92.6%
Details
Status
published
Products (1)
neomail/neomail
1.29
Published
May 02, 2006
Tracked Since
Feb 18, 2026