Mirapoint Web Mail - 'Expression()' HTML Injection
Author: LegendaryZion type: webapps platform: php port: date_added: 2006-10-31 date_updated: 2013-10-12 verified: 1 codes: CVE-2006-5712;OSVDB-33820 tags: aliases: screenshot_url: application_url: raw file: 28891.txt
source: https://www.securityfocus.com/bid/20840/info Mirapoint Web Mail is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker can exploit this issue to execute arbitrary JavaScript in the victim's browser. <IMG style="width: expression(alert('expression'));">