exploit-db-mirror/platforms/php/webapps/21817.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

7 lines
No EOL
451 B
Text
Executable file

source: http://www.securityfocus.com/bid/5771/info
Problems with JAWMail could make it possible to execute arbitrary script code in a vulnerable client.
JAWMail does not sufficiently filter malicious HTML code from e-mails. As a result, when a user opens an email in JAWMail that contains malicious HTML code, the code contained in the mail would be executed in the browser of the mail user.
<b onMouseOver="alert(document.cookie)">bolder</b>