CVE-2002-1341
https://notcve.org/view.php?id=CVE-2002-1341
Cross-site scripting (XSS) vulnerability in read_body.php for SquirrelMail 1.2.10, 1.2.9, and earlier allows remote attackers to insert script and HTML via the (1) mailbox and (2) passed_id parameters. Vulnerabilidad de secuencias de comandos en sitios cruzados en read_body.php de SquirrelMail 1.2.10, 1.2.9, y anteriores, permite a atacantes remotos la inserción de rutinas y código HTML mediante: mailbox parámetros passed_id • http://f0kp.iplus.ru/bz/008.txt http://marc.info/?l=bugtraq&m=103893844126484&w=2 http://marc.info/?l=bugtraq&m=103911130503272&w=2 http://marc.info/?l=bugtraq&m=104004924002662&w=2 http://secunia.com/advisories/8220 http://www.debian.org/security/2002/dsa-220 http://www.redhat.com/support/errata/RHSA-2003-042.html http://www.securityfocus.com/bid/6302 https://exchange.xforce.ibmcloud.com/vulnerabilities/10754 •
CVE-2002-1276
https://notcve.org/view.php?id=CVE-2002-1276
An incomplete fix for a cross-site scripting (XSS) vulnerability in SquirrelMail 1.2.8 calls the strip_tags function on the PHP_SELF value but does not save the result back to that variable, leaving it open to cross-site scripting attacks. Un arreglo incompleto de una vulnerabilidad de scripting en sitios cruzados (XSS) en SquirreMail 1.2.8 llama a la función strip_tags en el valor PHP_SELF pero no vuelve a guardar el resultado en esa variable, dejandolo abierto a ataques XSS. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=167471 http://secunia.com/advisories/8220 http://www.debian.org/security/2002/dsa-191 http://www.iss.net/security_center/static/10634.php http://www.redhat.com/support/errata/RHSA-2003-042.html http://www.securityfocus.com/bid/7019 •
CVE-2002-1132
https://notcve.org/view.php?id=CVE-2002-1132
SquirrelMail 1.2.7 and earlier allows remote attackers to determine the absolute pathname of the options.php script via a malformed optpage file argument, which generates an error message when the file cannot be included in the script. • http://archives.neohapsis.com/archives/bugtraq/2002-09/0246.html http://www.debian.org/security/2002/dsa-191 http://www.iss.net/security_center/static/10345.php http://www.redhat.com/support/errata/RHSA-2002-204.html http://www.securityfocus.com/bid/5949 •
CVE-2002-1131 – SquirrelMail 1.2.6/1.2.7 - Multiple Cross-Site Scripting Vulnerabilities
https://notcve.org/view.php?id=CVE-2002-1131
Cross-site scripting vulnerabilities in SquirrelMail 1.2.7 and earlier allows remote attackers to execute script as other web users via (1) addressbook.php, (2) options.php, (3) search.php, or (4) help.php. • https://www.exploit-db.com/exploits/21811 http://archives.neohapsis.com/archives/bugtraq/2002-09/0246.html http://sourceforge.net/project/shownotes.php?group_id=311&release_id=110774 http://www.debian.org/security/2002/dsa-191 http://www.iss.net/security_center/static/10145.php http://www.redhat.com/support/errata/RHSA-2002-204.html http://www.securityfocus.com/bid/5763 •
CVE-2002-0516 – SquirrelMail 1.2.x - Theme Remote Command Execution
https://notcve.org/view.php?id=CVE-2002-0516
SquirrelMail 1.2.5 and earlier allows authenticated SquirrelMail users to execute arbitrary commands by modifying the THEME variable in a cookie. SquirreMail 1.2.5 y anteriores permite a usuarios autenticados ejecutar código arbitrario modificando la variable THEME en una cookie • https://www.exploit-db.com/exploits/21358 http://archives.neohapsis.com/archives/bugtraq/2002-03/0350.html http://archives.neohapsis.com/archives/bugtraq/2002-03/0386.html http://www.iss.net/security_center/static/8671.php http://www.securityfocus.com/bid/4385 •