Page 8 of 38 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

SquirrelMail 1.2.7 and earlier allows remote attackers to determine the absolute pathname of the options.php script via a malformed optpage file argument, which generates an error message when the file cannot be included in the script. • http://archives.neohapsis.com/archives/bugtraq/2002-09/0246.html http://www.debian.org/security/2002/dsa-191 http://www.iss.net/security_center/static/10345.php http://www.redhat.com/support/errata/RHSA-2002-204.html http://www.securityfocus.com/bid/5949 •

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 3

Cross-site scripting vulnerabilities in SquirrelMail 1.2.7 and earlier allows remote attackers to execute script as other web users via (1) addressbook.php, (2) options.php, (3) search.php, or (4) help.php. • https://www.exploit-db.com/exploits/21811 http://archives.neohapsis.com/archives/bugtraq/2002-09/0246.html http://sourceforge.net/project/shownotes.php?group_id=311&release_id=110774 http://www.debian.org/security/2002/dsa-191 http://www.iss.net/security_center/static/10145.php http://www.redhat.com/support/errata/RHSA-2002-204.html http://www.securityfocus.com/bid/5763 •

CVSS: 10.0EPSS: 2%CPEs: 6EXPL: 2

SquirrelMail 1.2.5 and earlier allows authenticated SquirrelMail users to execute arbitrary commands by modifying the THEME variable in a cookie. SquirreMail 1.2.5 y anteriores permite a usuarios autenticados ejecutar código arbitrario modificando la variable THEME en una cookie • https://www.exploit-db.com/exploits/21358 http://archives.neohapsis.com/archives/bugtraq/2002-03/0350.html http://archives.neohapsis.com/archives/bugtraq/2002-03/0386.html http://www.iss.net/security_center/static/8671.php http://www.securityfocus.com/bid/4385 •