CVE-2012-2591 – emailarchitect enterprise email server 10.0 - Persistent Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2012-2591
Multiple cross-site scripting (XSS) vulnerabilities in EmailArchitect Email Server 10.0 and 10.0.0.3 allow remote attackers to inject arbitrary web script or HTML via the (1) From or (2) Date field in an email. Múltiples vulnerabilidades de XSS en EmailArchitect Email Server 10.0 y 10.0.0.3 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del campo (1) From o (2) Date en un email. EmailArchitect Enterprise Email Server version 10.0 suffers from a stored cross site scripting vulnerability. • https://www.exploit-db.com/exploits/20349 http://osvdb.org/84520 http://packetstormsecurity.org/files/115354/EmailArchitect-Enterprise-Email-Server-10.0-Cross-Site-Scripting.html http://secunia.com/advisories/50203 http://www.exploit-db.com/exploits/20349 http://www.securityfocus.com/bid/54896 https://exchange.xforce.ibmcloud.com/vulnerabilities/77514 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2006-3108
https://notcve.org/view.php?id=CVE-2006-3108
Cross-site scripting (XSS) vulnerability in EmailArchitect Email Server 6.1 allows remote attackers to inject arbitrary Javascript via an HTML div tag with a carriage return between the onmouseover attribute and its value, which bypasses the mail filter. Vulnerabilidad cross-site scripting (XSS) en Servidor de correo electrónico Emailarchitect v6.1 permite a atacantes remotos la ejecución de JavaScript arbitrario a través de una etiqueta div HTML con un retorno de carro entre el atributo onmouseover y su valor, que no pasa por el filtro de correo. • http://securitytracker.com/id?1016243 •
CVE-2006-2974
https://notcve.org/view.php?id=CVE-2006-2974
Multiple cross-site scripting (XSS) vulnerabilities in EmailArchitect Email Server 6.1.0.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) errCode and (2) uid parameter in (a) default.asp and (3) dname parameter in (b) /admin/dns.asp and (c) /additional/regdomain_done.asp. • http://secunia.com/advisories/20516 http://securitytracker.com/id?1016237 http://www.vupen.com/english/advisories/2006/2213 https://exchange.xforce.ibmcloud.com/vulnerabilities/27005 •