From dc454f0ed2e2706f745dd672c01d347ac6913143 Mon Sep 17 00:00:00 2001 From: Hiroki Sato Date: Sat, 18 Jun 2005 17:15:37 +0000 Subject: Document squirrelmail -- Several cross site scripting vulnerabilities. --- security/vuxml/vuln.xml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 4902898688da..972be64dbd78 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,39 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + squirrelmail -- Several cross site scripting vulnerabilities + + + squirrelmail + ja-squirrelmail + 1.4.01.4.4 + + + + +

A SquirrelMail Security Advisory reports:

+
+

Several cross site scripting (XSS) vulnerabilities have been discovered + in SquirrelMail versions 1.4.0 - 1.4.4.

+ +

The vulnerabilities are in two categories: the majority can be + exploited through URL manipulation, and some by sending a specially + crafted email to a victim. When done very carefully, + this can cause the session of the user to be hijacked.

+
+ +
+ + CAN-2005-1769 + http://www.squirrelmail.org/security/issue/2005-06-15 + + + 2005-06-15 + 2005-06-18 + +
+ acroread -- XML External Entity vulnerability -- cgit v1.2.3