CVE-2004-0520 – SquirrelMail 1.x - Email Header HTML Injection
https://notcve.org/view.php?id=CVE-2004-0520
Cross-site scripting (XSS) vulnerability in mime.php for SquirrelMail before 1.4.3 allows remote attackers to insert arbitrary HTML and script via the content-type mail header, as demonstrated using read_body.php. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en mime.php de SquirrelMail anteriores a 1.4.3 permite a atacantes remotos insertar HTML y script de su elección mediante la cabecera de correo Content-Type, como se ha demostrado usando read_body.php. • https://www.exploit-db.com/exploits/24160 ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000858 http://marc.info/?l=bugtraq&m=108611554415078&w=2 http://marc.info/?l=squirrelmail-cvs&m=108532891231712 http://rhn.redhat.com/errata/RHSA-2004-240.html http://secunia.com/advisories/11870 http://secunia.com/advisories/12289 http://www.debian.org/security/2004/dsa-535 http://www.gentoo •
CVE-2002-2410
https://notcve.org/view.php?id=CVE-2002-2410
openwebmail.pl in Open WebMail 1.7 and 1.71 reveals sensitive information in error messages and generates different responses whether a user exists or not, which allows remote attackers to identify valid usernames via brute force attacks and obtain certain configuration and version information. • http://archives.neohapsis.com/archives/bugtraq/2002-11/0278.html http://www.iss.net/security_center/static/10684.php http://www.securityfocus.com/bid/6232 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2002-1385
https://notcve.org/view.php?id=CVE-2002-1385
openwebmail_init in Open WebMail 1.81 and earlier allows local users to execute arbitrary code via .. (dot dot) sequences in a login name, such as the name provided in the sessionid parameter for openwebmail-abook.pl, which is used to find a configuration file that specifies additional code to be executed. openwebmail_init en Open WebMail 1.81 y anteriores permiten a usuarios locales ejecutar código arbitrario mediante secuencias .. (punto punto) en un nombre de inicio de sesión, como el nombre suministrado en el parámetro sessionid de openwebmail-abook.pl, que es usado para encontrar un fichero de configuración que especifica código adicional para ser ejecutado. • http://marc.info/?l=bugtraq&m=104031696120743&w=2 http://marc.info/?l=bugtraq&m=104032263328026&w=2 http://sourceforge.net/forum/forum.php?thread_id=782605&forum_id=108435 http://www.securityfocus.com/bid/6425 https://exchange.xforce.ibmcloud.com/vulnerabilities/10904 •