Vulnerability Details : CVE-2006-3229
Cross-site scripting (XSS) vulnerability in Open WebMail (OWM) 2.52, and other versions released before 05/12/2006, allows remote attackers to inject arbitrary web script or HTML via the (1) To and (2) From fields in openwebmail-main.pl, and possibly (3) other unspecified vectors related to "openwebmailerror calls that need to display HTML."
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2006-3229
Probability of exploitation activity in the next 30 days: 0.48%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 73 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-3229
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
nvd@nist.gov |
References for CVE-2006-3229
- http://openwebmail.org/openwebmail/doc/changes.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27309
- http://www.attrition.org/pipermail/vim/2006-June/000902.html
-
http://openwebmail.acatysmoof.com/dev/svn/index.pl/openwebmail/diff/trunk/src/cgi-bin/openwebmail/openwebmail-main.pl?rev1=235;rev2=236
Products affected by CVE-2006-3229
- cpe:2.3:a:open_webmail:open_webmail:*:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:1.81:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:1.7:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:1.71:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:1.8:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:2.30:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:2.31:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:2.32:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:1.90:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:2.20:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:2.21:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:2.41:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:open_webmail:open_webmail:2.51:*:*:*:*:*:*:*