CVE-2008-2379

Cross-site scripting (XSS) vulnerability in SquirrelMail before 1.4.17 allows remote attackers to inject arbitrary web script or HTML via a crafted hyperlink in an HTML part of an e-mail message.
References
Link Resource
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
http://secunia.com/advisories/32143 Vendor Advisory
http://secunia.com/advisories/33054
http://secunia.com/advisories/33071
http://secunia.com/advisories/33937
http://security-net.biz/wsw/index.php?p=254&n=190
http://support.apple.com/kb/HT3438
http://www.debian.org/security/2008/dsa-1682
http://www.securityfocus.com/bid/32603
http://www.squirrelmail.org/index.php
http://www.vupen.com/english/advisories/2008/3332
https://exchange.xforce.ibmcloud.com/vulnerabilities/47024
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9764
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00223.html
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00449.html
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
http://secunia.com/advisories/32143 Vendor Advisory
http://secunia.com/advisories/33054
http://secunia.com/advisories/33071
http://secunia.com/advisories/33937
http://security-net.biz/wsw/index.php?p=254&n=190
http://support.apple.com/kb/HT3438
http://www.debian.org/security/2008/dsa-1682
http://www.securityfocus.com/bid/32603
http://www.squirrelmail.org/index.php
http://www.vupen.com/english/advisories/2008/3332
https://exchange.xforce.ibmcloud.com/vulnerabilities/47024
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9764
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00223.html
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00449.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.3:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.3pre1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.3pre2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.4:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.4pre1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.4pre2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.5:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.5pre1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:0.5pre2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.0:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.0pre1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.0pre2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.0pre3:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.0_rc3:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.0_rc1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.0_rc2a:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.5_rc1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.9:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.9a:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.10a:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.11:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.12:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.15:*:*:*:*:*:*:*
cpe:2.3:a:squirrelmail:squirrelmail:1.4.15_rc1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:46

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html - () http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html -
References () http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html -
References () http://secunia.com/advisories/32143 - Vendor Advisory () http://secunia.com/advisories/32143 - Vendor Advisory
References () http://secunia.com/advisories/33054 - () http://secunia.com/advisories/33054 -
References () http://secunia.com/advisories/33071 - () http://secunia.com/advisories/33071 -
References () http://secunia.com/advisories/33937 - () http://secunia.com/advisories/33937 -
References () http://security-net.biz/wsw/index.php?p=254&n=190 - () http://security-net.biz/wsw/index.php?p=254&n=190 -
References () http://support.apple.com/kb/HT3438 - () http://support.apple.com/kb/HT3438 -
References () http://www.debian.org/security/2008/dsa-1682 - () http://www.debian.org/security/2008/dsa-1682 -
References () http://www.securityfocus.com/bid/32603 - () http://www.securityfocus.com/bid/32603 -
References () http://www.squirrelmail.org/index.php - () http://www.squirrelmail.org/index.php -
References () http://www.vupen.com/english/advisories/2008/3332 - () http://www.vupen.com/english/advisories/2008/3332 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/47024 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/47024 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9764 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9764 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00223.html - () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00223.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00449.html - () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00449.html -

Information

Published : 2008-12-05 00:30

Updated : 2024-11-21 00:46


NVD link : CVE-2008-2379

Mitre link : CVE-2008-2379

CVE.ORG link : CVE-2008-2379


JSON object : View

Products Affected

squirrelmail

  • squirrelmail
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')