Vulnerability Details : CVE-2005-2820
Cross-site scripting (XSS) vulnerability in SqWebMail 5.0.4 allows remote attackers to inject arbitrary web script or HTML via an e-mail message containing Internet Explorer "Conditional Comments" such as "[if]" and "[endif]".
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2005-2820
- cpe:2.3:a:inter7:sqwebmail:5.0.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2820
0.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2820
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
References for CVE-2005-2820
-
http://www.debian.org/security/2005/dsa-820
[SECURITY] [DSA 820-1] New courier packages fix cross-site scripting
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/22158
SqWebMail HTML comment cross-site scripting CVE-2005-2820 Vulnerability Report
-
http://www.securiteam.com/unixfocus/5RP0220GUS.html
Vulnerability Security Testing & DAST | Fortra's Beyond Security
-
http://www.ubuntu.com/usn/usn-201-1
USN-201-1: SqWebmail vulnerabilities | Ubuntu security notices | Ubuntu
-
http://marc.info/?l=bugtraq&m=112607033030475&w=2
'Secunia Research: SqWebMail Conditional Comments Script Insertion' - MARC
Jump to