Description
Multiple cross-site scripting (XSS) vulnerabilities in history-storage.aspx in AfterLogic WebMail Pro 4.7.10 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) HistoryStorageObjectName and (2) HistoryKey parameters.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Sébastien Duquette · htmlwebappsasp
https://www.exploit-db.com/exploits/33268
exploitdb
WORKING POC
VERIFIED
by Sébastien Duquette · textwebappsasp
https://www.exploit-db.com/exploits/9857
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/53672
Exploit x_refsource_misc
http://www.gardienvirtuel.com/fichiers/documents/publications/GVI_2009-01_EN.txt
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/36605
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/36964
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/58712
Scores
EPSS
0.0231
EPSS Percentile
84.8%
Details
CWE
CWE-79
Status
published
Products (2)
afterlogic/webmail_pro
4.5
afterlogic/webmail_pro
< 4.7.10
Published
Mar 26, 2010
Tracked Since
Feb 18, 2026