First published: Tue Dec 05 2006(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) mailto parameter in (a) webmail.php, the (2) session and (3) delete_draft parameters in (b) compose.php, and (4) unspecified vectors involving "a shortcoming in the magicHTML filter."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squirrelmail Squirrelmail | =1.4.2 | |
Squirrelmail Squirrelmail | =1.4.6_rc1 | |
Squirrelmail Squirrelmail | =1.4.3_r3 | |
Squirrelmail Squirrelmail | =1.4.6 | |
Squirrelmail Squirrelmail | =1.4.7 | |
Squirrelmail Squirrelmail | =1.4.3_rc1 | |
Squirrelmail Squirrelmail | =1.4.4_rc1 | |
Squirrelmail Squirrelmail | =1.4.3 | |
Squirrelmail Squirrelmail | =1.4.1 | |
Squirrelmail Squirrelmail | =1.4.6_cvs | |
Squirrelmail Squirrelmail | =1.4 | |
Squirrelmail Squirrelmail | =1.4_rc1 | |
Squirrelmail Squirrelmail | =1.4.4 | |
Squirrelmail Squirrelmail | =1.4.3aa | |
Squirrelmail Squirrelmail | =1.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.