CVE-2012-2588

MailEnable Enterprise 6.5 - XSS

Title source: llm
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in MailEnable Enterprise 6.5 allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, or (3) Subject header or (4) body in an SMTP e-mail message.

Exploits (1)

exploitdb WORKING POC VERIFIED
by loneferret · pythonwebappswindows
https://www.exploit-db.com/exploits/20351

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/77547
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/54900
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/84589
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/50205
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/20351

Scores

EPSS 0.0041
EPSS Percentile 61.7%

Details

CWE
CWE-79
Status published
Products (1)
mailenable/mailenable 6.5
Published Sep 19, 2014
Tracked Since Feb 18, 2026