CVE-2004-0591

Cross-site scripting (XSS) vulnerability in the print_header_uc function for SqWebMail 4.0.4 and earlier, and possibly 3.x, allows remote attackers to inject arbitrary web script or HRML via (1) e-mail headers or (2) a message with a "message/delivery-status" MIME Content-Type.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inter7:sqwebmail:4.0.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=108786212220140&w=2 - () http://marc.info/?l=bugtraq&m=108786212220140&w=2 -
References () http://secunia.com/advisories/11918/ - Patch, Vendor Advisory () http://secunia.com/advisories/11918/ - Patch, Vendor Advisory
References () http://www.debian.org/security/2004/dsa-533 - Patch, Vendor Advisory () http://www.debian.org/security/2004/dsa-533 - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200408-02.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200408-02.xml - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/10588 - Exploit, Patch () http://www.securityfocus.com/bid/10588 - Exploit, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16467 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16467 -

Information

Published : 2004-08-06 04:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0591

Mitre link : CVE-2004-0591

CVE.ORG link : CVE-2004-0591


JSON object : View

Products Affected

inter7

  • sqwebmail