Vulnerable Systems:
*Hexamail Hexamail Server 4.4.5
Attacker-supplied HTML or JavaScript code can run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and control how the site is rendered to the user; other attacks are also possible.
Vendor Status:
Currently we are not aware of any vendor-supplied patches.
Disclosure Timeline:
Initial Release : Jun 04 2012