First published: Wed Sep 07 2005(Updated: )
Cross-site scripting (XSS) vulnerability in SqWebMail 5.0.4 allows remote attackers to inject arbitrary web script or HTML via an e-mail message containing Internet Explorer "Conditional Comments" such as "[if]" and "[endif]".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Inter7 Vpopmail (vchkpw) | =5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2820 is considered a moderate severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2005-2820, update SqWebMail to a version that addresses this vulnerability.
The potential impacts of CVE-2005-2820 include unauthorized script execution in the context of the user's browser.
Users of SqWebMail version 5.0.4 are affected by CVE-2005-2820.
CVE-2005-2820 allows attackers to inject arbitrary web scripts through specially crafted e-mail messages using Internet Explorer Conditional Comments.