CVE-2012-2586

Mailtraq 2.17.3.3150 - XSS

Title source: llm
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in Mailtraq 2.17.3.3150 allow remote attackers to inject arbitrary web script or HTML via an e-mail message subject with (1) a JavaScript alert function used in conjunction with the fromCharCode method or (2) a SCRIPT element; an e-mail message body with (3) a crafted SRC attribute of an IFRAME element, (4) a data: URL in the CONTENT attribute of an HTTP-EQUIV="refresh" META element, or (5) a Cascading Style Sheets (CSS) expression property in the STYLE attribute of an IMG element; or an e-mail message Date header with (6) a JavaScript alert function used in conjunction with the fromCharCode method, (7) a SCRIPT element, (8) a CSS expression property in the STYLE attribute of an arbitrary element, (9) a crafted SRC attribute of an IFRAME element, or (10) a data: URL in the CONTENT attribute of an HTTP-EQUIV="refresh" META element.

Exploits (1)

exploitdb WORKING POC VERIFIED
by loneferret · pythonwebappswindows
https://www.exploit-db.com/exploits/20353

References (1)

Core 1
Core References
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/20353/

Scores

EPSS 0.0037
EPSS Percentile 58.7%

Details

CWE
CWE-79
Status published
Products (1)
mailtraq/mailtraq 2.17.3.3150
Published Sep 19, 2012
Tracked Since Feb 18, 2026