cpe:/a:mailenable:mailenable_professional:1.0.004 cpe:/a:mailenable:mailenable_professional:1.0.005 cpe:/a:mailenable:mailenable_professional:1.0.006 cpe:/a:mailenable:mailenable_professional:1.0.007 cpe:/a:mailenable:mailenable_professional:1.0.008 cpe:/a:mailenable:mailenable_professional:1.0.009 cpe:/a:mailenable:mailenable_professional:1.0.010 cpe:/a:mailenable:mailenable_professional:1.0.011 cpe:/a:mailenable:mailenable_professional:1.0.012 cpe:/a:mailenable:mailenable_professional:1.0.013 cpe:/a:mailenable:mailenable_professional:1.0.014 cpe:/a:mailenable:mailenable_professional:1.0.015 cpe:/a:mailenable:mailenable_professional:1.0.016 cpe:/a:mailenable:mailenable_professional:1.0.017 cpe:/a:mailenable:mailenable_professional:1.1 cpe:/a:mailenable:mailenable_professional:1.2 cpe:/a:mailenable:mailenable_professional:1.2a cpe:/a:mailenable:mailenable_professional:1.5 cpe:/a:mailenable:mailenable_professional:1.6 cpe:/a:mailenable:mailenable_professional:1.7 cpe:/a:mailenable:mailenable_professional:1.12 cpe:/a:mailenable:mailenable_professional:1.13 cpe:/a:mailenable:mailenable_professional:1.14 cpe:/a:mailenable:mailenable_professional:1.15 cpe:/a:mailenable:mailenable_professional:1.16 cpe:/a:mailenable:mailenable_professional:1.17 cpe:/a:mailenable:mailenable_professional:1.18 cpe:/a:mailenable:mailenable_professional:1.19 cpe:/a:mailenable:mailenable_professional:1.51 cpe:/a:mailenable:mailenable_professional:1.52 cpe:/a:mailenable:mailenable_professional:1.53 cpe:/a:mailenable:mailenable_professional:1.54 cpe:/a:mailenable:mailenable_professional:1.72 cpe:/a:mailenable:mailenable_professional:1.73 cpe:/a:mailenable:mailenable_professional:1.82 cpe:/a:mailenable:mailenable_professional:1.83 cpe:/a:mailenable:mailenable_professional:1.84 cpe:/a:mailenable:mailenable_professional:1.101 cpe:/a:mailenable:mailenable_professional:1.102 cpe:/a:mailenable:mailenable_professional:1.103 cpe:/a:mailenable:mailenable_professional:1.104 cpe:/a:mailenable:mailenable_professional:1.105 cpe:/a:mailenable:mailenable_professional:1.106 cpe:/a:mailenable:mailenable_professional:1.107 cpe:/a:mailenable:mailenable_professional:1.108 cpe:/a:mailenable:mailenable_professional:1.109 cpe:/a:mailenable:mailenable_professional:1.110 cpe:/a:mailenable:mailenable_professional:1.111 cpe:/a:mailenable:mailenable_professional:1.112 cpe:/a:mailenable:mailenable_professional:1.113 cpe:/a:mailenable:mailenable_professional:1.114 cpe:/a:mailenable:mailenable_professional:1.115 cpe:/a:mailenable:mailenable_professional:1.116 cpe:/a:mailenable:mailenable_professional:2.0 cpe:/a:mailenable:mailenable_professional:2.1 cpe:/a:mailenable:mailenable_professional:2.2 cpe:/a:mailenable:mailenable_professional:2.32 cpe:/a:mailenable:mailenable_professional:2.33 cpe:/a:mailenable:mailenable_professional:2.34 cpe:/a:mailenable:mailenable_professional:2.35 cpe:/a:mailenable:mailenable_professional:2.351 CVE-2007-0652 2007-02-15T18:28:00.000-05:00 2011-03-07T21:50:28.453-05:00 5.1 NETWORK HIGH NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2007-02-18T19:47:00.000-05:00 ALLOWS_USER_ACCESS BUGTRAQ 20070214 Secunia Research: MailEnable Web Mail Client MultipleVulnerabilities BID 22554 SREASON 2258 SECUNIA 23998 OSVDB 33191 VUPEN ADV-2007-0595 MISC http://secunia.com/secunia_research/2007-38/advisory/ Cross-site request forgery (CSRF) vulnerability in MailEnable Professional before 2.37 allows remote attackers to modify arbitrary configurations and perform unauthorized actions as arbitrary users via a link or IMG tag.