Multiple cross-site scripting (XSS) vulnerabilities in MailEnable Professional before 2.37 allow remote attackers to inject arbitrary Javascript script via (1) e-mail messages and (2) the ID parameter to (a) right.asp, (b) Forms/MAI/list.asp, and (c) Forms/VCF/list.asp in mewebmail/base/default/lang/EN/.
Link | Tags |
---|---|
http://securityreason.com/securityalert/2258 | third party advisory |
http://secunia.com/advisories/23998 | third party advisory patch vendor advisory |
http://www.mailenable.com/Professional20-ReleaseNotes.txt | |
http://osvdb.org/33189 | vdb entry |
http://osvdb.org/33190 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32480 | vdb entry |
http://www.securityfocus.com/archive/1/460063/100/0/threaded | mailing list |
http://osvdb.org/33188 | vdb entry |
http://www.vupen.com/english/advisories/2007/0595 | vdb entry |
http://secunia.com/secunia_research/2007-38/advisory/ | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32476 | vdb entry |
http://www.securityfocus.com/bid/22554 | vdb entry |