Description
Multiple cross-site scripting (XSS) vulnerabilities in Uebimiau Webmail allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to redirect.php or (2) the selected_theme parameter to demo/pop3/error.php.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Michal Majchrowicz · textwebappsphp
https://www.exploit-db.com/exploits/30097
References (5)
Core 5
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/24210
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/34553
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/37464
Exploit mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063629.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/37463
Scores
EPSS
0.0236
EPSS Percentile
85.0%
Details
Status
published
Products (3)
uebimiau/uebimiau
2.7.2
uebimiau/uebimiau
2.7.9
uebimiau/uebimiau
2.7.10
Published
Jun 11, 2007
Tracked Since
Feb 18, 2026