MailEnable Enterprise Premium 10.23 was vulnerable to stored and reflected cross-site scripting (XSS) attacks. Because the session cookie did not use the HttpOnly flag, it was possible to hijack the session cookie by exploiting this vulnerability.
2019-07-08T22:15:11.813
2024-11-21T04:23:50.417
Modified
CVSSv3.0: 6.1 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:P/A:N
8.6
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | mailenable | mailenable | < 6.90 | Yes |
| Application | mailenable | mailenable | < 7.62 | Yes |
| Application | mailenable | mailenable | < 8.64 | Yes |
| Application | mailenable | mailenable | < 9.83 | Yes |
| Application | mailenable | mailenable | < 10.24 | Yes |