InMailX Outlook Plugin < 3.22.0101 is vulnerable to Cross Site Scripting (XSS). InMailX Connection names are not sanitzed in the Outlook tab, which allows a local user or network administrator to execute HTML / Javascript in the Outlook of users.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.inmailx.com/products/inmailx | Product Vendor Advisory | 
| https://gist.github.com/0xVavaldi/9b7afbfe56938294480f7613805d3b7f | |
| http://www.inmailx.com/products/inmailx | Product Vendor Advisory | 
| https://gist.github.com/TheWorkingDeveloper/9b7afbfe56938294480f7613805d3b7f | 
Configurations
                    History
                    21 Nov 2024, 06:55
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
|
| References | () http://www.inmailx.com/products/inmailx - Product, Vendor Advisory | 
01 Nov 2024, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
    
        
        
  | 
Information
                Published : 2022-07-26 22:15
Updated : 2024-11-21 06:55
NVD link : CVE-2022-27105
Mitre link : CVE-2022-27105
CVE.ORG link : CVE-2022-27105
JSON object : View
Products Affected
                digitus
- inmailx
 
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
