Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MailEnable versions prior to 10.55 contain a reflected cross-site scripting vulnerability in the webmail interface that allows remote attackers to execute arbitrary JavaScript in a victim's browser by crafting a malicious URL. Attackers can inject malicious code through the Attendees parameter in the FreeBusy.aspx form, which is not properly sanitized before being embedded into dynamically generated JavaScript. | |
| Title | MailEnable < 10.55 Reflected XSS via FreeBusy.aspx Attendees Parameter | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T19:46:36.029Z
Reserved: 2026-03-16T18:11:41.759Z
Link: CVE-2026-32851
Updated: 2026-03-23T19:46:27.709Z
Status : Received
Published: 2026-03-23T20:16:27.020
Modified: 2026-03-23T20:16:27.020
Link: CVE-2026-32851
No data.
OpenCVE Enrichment
No data.