CVE-2005-2095 – SquirrelMail < 1.4.5-RC1 - Arbitrary Variable Overwrite
https://notcve.org/view.php?id=CVE-2005-2095
options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which allows remote attackers to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files. options_identities.php en SquirrelMail 1.4.4 y anteriores usa la función "extract" para procesar la variable "$_POST", lo que permite que atacantes remotos modifiquen o lean las preferencias de otros usuarios, lleven a cabo ataques XSS o escriban ficheros de su elección. • https://www.exploit-db.com/exploits/43830 http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html http://www.debian.org/security/2005/dsa-756 http://www.gulftech.org/?node=research&article_id=00090-07142005 http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.redhat.com/support/errata/RHSA-2005-595.html http://www.securityfocus.com/archive/1/405200 http:// •
CVE-2005-1769
https://notcve.org/view.php?id=CVE-2005-1769
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.4 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in (1) the URL or (2) an e-mail message. • http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html http://marc.info/?l=bugtraq&m=111893827711390&w=2 http://www.debian.org/security/2005/dsa-756 http://www.mandriva.com/security/advisories?name=MDKSA-2005:108 http://www.novell.com/linux/security/advisories/2005_18_sr.html http://www.redhat.com/support/errata/RHSA-2005-595.html http://www.squirrelmail.org/security/issue/2005-06 •
CVE-2005-0239
https://notcve.org/view.php?id=CVE-2005-0239
viewcert.php in the S/MIME plugin 0.4 and 0.5 for Squirrelmail allows remote attackers to execute arbitrary commands via shell metacharacters in the cert parameter. • http://www.idefense.com/application/poi/display?id=191&type=vulnerabilities&flashstatus=false http://www.kb.cert.org/vuls/id/502328 http://www.squirrelmail.org/plugin_view.php?id=54 https://exchange.xforce.ibmcloud.com/vulnerabilities/19242 •
CVE-2005-0184
https://notcve.org/view.php?id=CVE-2005-0184
Directory traversal vulnerability in ftpfile in the Vacation plugin 0.15 and earlier for Squirrelmail allows local users to read arbitrary files via a .. (dot dot) in a get request. • http://marc.info/?l=bugtraq&m=110549426300953&w=2 http://secunia.com/advisories/13791 http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-01-03 http://securitytracker.com/id?1012866 http://www.securityfocus.com/bid/12222 http://www.squirrelmail.org/plugin_view.php?id=51 https://exchange.xforce.ibmcloud.com/vulnerabilities/18856 •
CVE-2005-0183
https://notcve.org/view.php?id=CVE-2005-0183
ftpfile in the Vacation plugin 0.15 and earlier for Squirrelmail allows local users to execute arbitrary commands via shell metacharacters in a command line argument. • http://marc.info/?l=bugtraq&m=110549426300953&w=2 http://secunia.com/advisories/13791 http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-01-03 http://securitytracker.com/id?1012866 http://www.securityfocus.com/bid/12222 http://www.squirrelmail.org/plugin_view.php?id=51 https://exchange.xforce.ibmcloud.com/vulnerabilities/18855 •