MailEnable 'ForgottonPassword.aspx' Cross Site Scripting Vulnerability

Attackers can exploit this issue by enticing an unsuspecting victim to follow a malicious URI.

The following example URI is available:

http://example.com/mewebmail/Mondo/lang/sys/ForgottenPassword.aspx?Username=[xss]


 

Privacy Statement
Copyright 2010, SecurityFocus