XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element.
Max CVSS
6.1
EPSS Score
1.25%
Published
2019-07-01
Updated
2019-07-30
The mail message display page in SquirrelMail through 1.4.22 has XSS via SVG animations (animate to attribute).
Max CVSS
6.1
EPSS Score
0.20%
Published
2018-08-05
Updated
2019-08-15
The mail message display page in SquirrelMail through 1.4.22 has XSS via the formaction attribute.
Max CVSS
6.1
EPSS Score
0.20%
Published
2018-08-05
Updated
2019-08-15
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<math xlink:href=" attack.
Max CVSS
6.1
EPSS Score
0.20%
Published
2018-08-05
Updated
2019-08-15
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<math><maction xlink:href=" attack.
Max CVSS
6.1
EPSS Score
0.20%
Published
2018-08-05
Updated
2019-08-15
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<form action='data:text" attack.
Max CVSS
6.1
EPSS Score
0.20%
Published
2018-08-05
Updated
2019-08-15
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<svg><a xlink:href=" attack.
Max CVSS
6.1
EPSS Score
0.20%
Published
2018-08-05
Updated
2019-08-15
Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message.
Max CVSS
4.3
EPSS Score
0.32%
Published
2011-07-14
Updated
2012-02-14
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) drop-down selection lists, (2) the > (greater than) character in the SquirrelSpell spellchecking plugin, and (3) errors associated with the Index Order (aka options_order) page.
Max CVSS
4.3
EPSS Score
0.32%
Published
2011-07-14
Updated
2017-08-17
functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message.
Max CVSS
4.3
EPSS Score
0.49%
Published
2009-05-14
Updated
2017-09-29
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING).
Max CVSS
4.3
EPSS Score
0.48%
Published
2009-05-14
Updated
2017-09-29
Cross-site scripting (XSS) vulnerability in SquirrelMail before 1.4.17 allows remote attackers to inject arbitrary web script or HTML via a crafted hyperlink in an HTML part of an e-mail message.
Max CVSS
4.3
EPSS Score
0.33%
Published
2008-12-05
Updated
2017-09-29
Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer.
Max CVSS
4.3
EPSS Score
1.87%
Published
2007-05-11
Updated
2017-10-11
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) mailto parameter in (a) webmail.php, the (2) session and (3) delete_draft parameters in (b) compose.php, and (4) unspecified vectors involving "a shortcoming in the magicHTML filter."
Max CVSS
6.8
EPSS Score
1.99%
Published
2006-12-05
Updated
2017-10-11
SquirrelMail 1.4.6 and earlier, with register_globals enabled, allows remote attackers to hijack cookies in src/redirect.php via unknown vectors. NOTE: while "cookie theft" is frequently associated with XSS, the vendor disclosure is too vague to be certain of this.
Max CVSS
4.3
EPSS Score
0.30%
Published
2006-07-18
Updated
2017-07-20
Cross-site scripting (XSS) vulnerability in search.php in SquirrelMail 1.5.1 and earlier, when register_globals is enabled, allows remote attackers to inject arbitrary HTML via the mailbox parameter.
Max CVSS
2.6
EPSS Score
1.88%
Published
2006-06-23
Updated
2017-07-20
Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) "/*" and "*/" comments, or (2) a newline in a "url" specifier, which is processed by certain web browsers including Internet Explorer.
Max CVSS
4.3
EPSS Score
1.20%
Published
2006-02-24
Updated
2017-10-11
webmail.php in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary web pages into the right frame via a URL in the right_frame parameter. NOTE: this has been called a cross-site scripting (XSS) issue, but it is different than what is normally identified as XSS.
Max CVSS
4.3
EPSS Score
1.20%
Published
2006-02-24
Updated
2017-10-11
Cross-site scripting (XSS) vulnerability in add.php in Address Add Plugin 1.9 and 2.0 for Squirrelmail allows remote attackers to inject arbitrary web script or HTML via the IMG tag.
Max CVSS
4.3
EPSS Score
0.92%
Published
2005-10-04
Updated
2017-07-11
options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which allows remote attackers to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files.
Max CVSS
4.3
EPSS Score
0.56%
Published
2005-07-13
Updated
2017-10-11
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.4 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in (1) the URL or (2) an e-mail message.
Max CVSS
4.3
EPSS Score
1.61%
Published
2005-06-16
Updated
2017-10-11
Cross-site scripting (XSS) vulnerability in webmail.php in SquirrelMail before 1.4.4 allows remote attackers to inject arbitrary web script or HTML via certain integer variables.
Max CVSS
4.3
EPSS Score
0.61%
Published
2005-01-29
Updated
2017-10-11
Cross-site scripting (XSS) vulnerability in the decoding of encoded text in certain headers in mime.php for SquirrelMail 1.4.3a and earlier, and 1.5.1-cvs before 23rd October 2004, allows remote attackers to execute arbitrary web script or HTML.
Max CVSS
6.8
EPSS Score
2.70%
Published
2005-03-01
Updated
2017-10-11
Multiple cross-site scripting (XSS) vulnerabilities in Squirrelmail 1.2.10 and earlier allow remote attackers to inject arbitrary HTML or script via (1) the $mailer variable in read_body.php, (2) the $senderNames_part variable in mailbox_display.php, and possibly other vectors including (3) the $event_title variable or (4) the $event_text variable.
Max CVSS
6.8
EPSS Score
3.29%
Published
2004-08-06
Updated
2017-07-11
Cross-site scripting (XSS) vulnerability in mime.php for SquirrelMail before 1.4.3 allows remote attackers to insert arbitrary HTML and script via the content-type mail header, as demonstrated using read_body.php.
Max CVSS
6.8
EPSS Score
1.84%
Published
2004-08-18
Updated
2017-10-11
32 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!