Multiple cross-site scripting (XSS) vulnerabilities in Squirrelmail 1.2.10 and earlier allow remote attackers to inject arbitrary HTML or script via (1) the $mailer variable in read_body.php, (2) the $senderNames_part variable in mailbox_display.php, and possibly other vectors including (3) the $event_title variable or (4) the $event_text variable.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=257973 - | |
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000858 - | |
References | () http://marc.info/?l=bugtraq&m=108611554415078&w=2 - | |
References | () http://www.debian.org/security/2004/dsa-535 - Patch, Vendor Advisory | |
References | () http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/10450 - Exploit, Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16285 - |
Information
Published : 2004-08-06 04:00
Updated : 2024-11-20 23:49
NVD link : CVE-2004-0639
Mitre link : CVE-2004-0639
CVE.ORG link : CVE-2004-0639
JSON object : View
Products Affected
sgi
- propack
squirrelmail
- squirrelmail
open_webmail
- open_webmail
CWE