Mailenable

Mailenable

46 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 09.12.2025 18:15:50
  • Zuletzt bearbeitet 09.12.2025 21:37:41

MailEnable versions prior to 10.54 contain a reflected cross-site scripting (XSS) vulnerability in the FieldBcc parameter of /Mondo/lang/sys/Forms/AddressBook.aspx. The FieldBcc value is not properly sanitized when processed via a GET request and is ...

  • EPSS 0.02%
  • Veröffentlicht 09.12.2025 18:15:50
  • Zuletzt bearbeitet 09.12.2025 21:37:54

MailEnable versions prior to 10.54 contain a reflected cross-site scripting (XSS) vulnerability in the AddressesTo parameter of /Mondo/lang/sys/Forms/AddressBook.aspx. The AddressesTo value is not properly sanitized when processed via a GET request a...

  • EPSS 0.02%
  • Veröffentlicht 09.12.2025 18:15:50
  • Zuletzt bearbeitet 09.12.2025 21:38:20

MailEnable versions prior to 10.54 contain a reflected cross-site scripting (XSS) vulnerability in the AddressesCc parameter of /Mondo/lang/sys/Forms/AddressBook.aspx. The AddressesCc value is not properly sanitized when processed via a GET request a...

  • EPSS 0.02%
  • Veröffentlicht 09.12.2025 18:15:49
  • Zuletzt bearbeitet 09.12.2025 21:38:49

MailEnable versions prior to 10.54 contain a reflected cross-site scripting (XSS) vulnerability in the Message parameter of /Mobile/Compose.aspx. The Message value is not properly sanitized when processed via a GET request and is reflected into a Jav...

  • EPSS 0.01%
  • Veröffentlicht 09.12.2025 18:15:49
  • Zuletzt bearbeitet 10.12.2025 19:05:04

MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAINFY.DLL from its application directo without sufficient inte...

Exploit
  • EPSS 11.45%
  • Veröffentlicht 03.06.2025 00:00:00
  • Zuletzt bearbeitet 09.06.2025 18:04:33

Cross Site Scripting (XSS) vulnerability in MailEnable before v10 allows a remote attacker to execute arbitrary code via the failure.aspx component

  • EPSS 0.33%
  • Veröffentlicht 13.01.2023 21:15:15
  • Zuletzt bearbeitet 07.04.2025 19:15:43

Authenticated mail users, under specific circumstances, could add files with unsanitized content in public folders where the IIS user had permission to access. That action, could lead an attacker to store arbitrary code on that files and execute RCE ...

  • EPSS 0.11%
  • Veröffentlicht 08.07.2019 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:23:50

MailEnable Enterprise Premium 10.23 was vulnerable to stored and reflected cross-site scripting (XSS) attacks. Because the session cookie did not use the HttpOnly flag, it was possible to hijack the session cookie by exploiting this vulnerability.

  • EPSS 0.19%
  • Veröffentlicht 08.07.2019 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:23:50

MailEnable Enterprise Premium 10.23 did not use appropriate access control checks in a number of areas. As a result, it was possible to perform a number of actions, when logged in as a user, that that user should not have had permission to perform. I...

  • EPSS 0.21%
  • Veröffentlicht 08.07.2019 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:23:50

MailEnable Enterprise Premium 10.23 was vulnerable to multiple directory traversal issues, with which authenticated users could add, remove, or potentially read files in arbitrary folders accessible by the IIS user. This could lead to reading other u...