CVE-2007-0651

Multiple cross-site scripting (XSS) vulnerabilities in MailEnable Professional before 2.37 allow remote attackers to inject arbitrary Javascript script via (1) e-mail messages and (2) the ID parameter to (a) right.asp, (b) Forms/MAI/list.asp, and (c) Forms/VCF/list.asp in mewebmail/base/default/lang/EN/.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mailenable:mailenable_professional:1.0.004:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.005:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.006:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.007:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.008:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.009:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.010:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.011:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.012:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.013:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.014:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.015:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.016:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.0.017:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.7:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.12:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.13:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.14:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.15:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.16:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.72:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.73:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.82:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.83:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.84:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.101:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.102:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.103:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.104:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.105:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.106:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.107:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.108:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.109:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.110:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.111:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.112:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.113:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.114:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.115:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:1.116:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:2.0:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:2.1:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:2.2:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:2.32:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:2.33:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:2.34:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:2.35:*:*:*:*:*:*:*
cpe:2.3:a:mailenable:mailenable_professional:2.351:*:*:*:*:*:*:*

History

21 Nov 2024, 00:26

Type Values Removed Values Added
References () http://osvdb.org/33188 - () http://osvdb.org/33188 -
References () http://osvdb.org/33189 - () http://osvdb.org/33189 -
References () http://osvdb.org/33190 - () http://osvdb.org/33190 -
References () http://secunia.com/advisories/23998 - Patch, Vendor Advisory () http://secunia.com/advisories/23998 - Patch, Vendor Advisory
References () http://secunia.com/secunia_research/2007-38/advisory/ - Patch, Vendor Advisory () http://secunia.com/secunia_research/2007-38/advisory/ - Patch, Vendor Advisory
References () http://securityreason.com/securityalert/2258 - () http://securityreason.com/securityalert/2258 -
References () http://www.mailenable.com/Professional20-ReleaseNotes.txt - () http://www.mailenable.com/Professional20-ReleaseNotes.txt -
References () http://www.securityfocus.com/archive/1/460063/100/0/threaded - () http://www.securityfocus.com/archive/1/460063/100/0/threaded -
References () http://www.securityfocus.com/bid/22554 - () http://www.securityfocus.com/bid/22554 -
References () http://www.vupen.com/english/advisories/2007/0595 - () http://www.vupen.com/english/advisories/2007/0595 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/32476 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/32476 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/32480 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/32480 -

Information

Published : 2007-02-15 23:28

Updated : 2024-11-21 00:26


NVD link : CVE-2007-0651

Mitre link : CVE-2007-0651

CVE.ORG link : CVE-2007-0651


JSON object : View

Products Affected

mailenable

  • mailenable_professional