Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:FreeBSD Local Security Checks
Title:FreeBSD Ports: squirrelmail, ja-squirrelmail
The remote host is missing an update to the system
as announced in the referenced advisory.

The following packages are affected:

Cross-site scripting (XSS) vulnerability in the decoding of encoded
text in certain headers in mime.php for SquirrelMail 1.4.3a and
earlier, and 1.5.1-cvs before 23rd October 2004, allows remote
attackers to execute arbitrary web script or HTML.

prefs.php in SquirrelMail before 1.4.4, with register_globals enabled,
allows remote attackers to inject local code into the SquirrelMail
code via custom preference handlers.

PHP remote code injection vulnerability in webmail.php in SquirrelMail
before 1.4.4 allows remote attackers to execute arbitrary PHP code by
modifying a URL parameter to reference a URL on a remote web server
that contains the code.

Cross-site scripting (XSS) vulnerability in webmail.php in
SquirrelMail before 1.4.4 allows remote attackers to inject arbitrary
web script or HTML via certain integer variables.

Update your system with the appropriate patches or
software upgrades.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-1036
Bugtraq: 20041110 [SquirrelMail Security Advisory] Cross Site Scripting in encoded text (Google Search)
Conectiva Linux advisory: CLA-2004:905
XForce ISS Database: squirrelmail-mime-xss(18031)
Common Vulnerability Exposure (CVE) ID: CVE-2005-0075
Bugtraq: 20050129 SquirrelMail Security Advisory (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2005-0103
XForce ISS Database: squirrelmail-frame-file-include(19037)
Common Vulnerability Exposure (CVE) ID: CVE-2005-0104
Debian Security Information: DSA-662 (Google Search)
XForce ISS Database: squirrelmail-webmailphp-xss(19036)
CopyrightCopyright (c) 2005 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2022 E-Soft Inc. All rights reserved.