3 results (0.003 seconds)

CVSS: 4.3EPSS: 0%CPEs: 14EXPL: 0

Cross-site scripting (XSS) vulnerability in SqWebMail 5.0.4 allows remote attackers to inject arbitrary web script or HTML via a file attachment that is processed by the Display feature. NOTE: the severity of this issue has been disputed by the developer. • http://marc.info/?l=bugtraq&m=112490698219531&w=2 http://marc.info/?l=courier-users&m=112488135424849&w=2 http://secunia.com/advisories/16539 http://secunia.com/advisories/17156 http://secunia.com/secunia_research/2005-35/advisory http://www.debian.org/security/2005/dsa-793 http://www.securityfocus.com/bid/14650 http://www.ubuntu.com/usn/usn-201-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/21997 •

CVSS: 7.5EPSS: 8%CPEs: 9EXPL: 1

SqWebMail allows remote attackers to inject arbitrary web script or HTML via CRLF sequences in the redirect parameter followed by the desired script or HTML. • https://www.exploit-db.com/exploits/25534 http://secunia.com/advisories/15119 http://www.securityfocus.com/bid/13374 •

CVSS: 6.8EPSS: 91%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in the print_header_uc function for SqWebMail 4.0.4 and earlier, and possibly 3.x, allows remote attackers to inject arbitrary web script or HRML via (1) e-mail headers or (2) a message with a "message/delivery-status" MIME Content-Type. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la función print_header_uc de SqWebMail 4.0.4 y anteriores, y posiblemente 3.x, permite a atacantes remotos inyectar script web arbitrario o HTML mediante (1) cabeceras de correo electrónico o (2) un mensaje con un "message/delivery-status" MIME Content-Type. • https://www.exploit-db.com/exploits/24227 http://marc.info/?l=bugtraq&m=108786212220140&w=2 http://secunia.com/advisories/11918 http://www.debian.org/security/2004/dsa-533 http://www.gentoo.org/security/en/glsa/glsa-200408-02.xml http://www.securityfocus.com/bid/10588 https://exchange.xforce.ibmcloud.com/vulnerabilities/16467 •