Filtered by vendor Squirrelmail
                         Subscriptions
                    
                    
                
                    Total
                    77 CVE
                
            | CVE | Vendors | Products | Updated | CVSS v3.1 | 
|---|---|---|---|---|
| CVE-2003-0160 | 2 Redhat, Squirrelmail | 2 Linux, Squirrelmail | 2025-04-03 | N/A | 
| Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.2.11 allow remote attackers to inject arbitrary HTML code and steal information from a client's web browser. | ||||
| CVE-2005-0152 | 1 Squirrelmail | 1 Squirrelmail | 2025-04-03 | N/A | 
| PHP remote file inclusion vulnerability in Squirrelmail 1.2.6 allows remote attackers to execute arbitrary code via "URL manipulation." | ||||
| CVE-2004-0519 | 3 Redhat, Sgi, Squirrelmail | 3 Enterprise Linux, Propack, Squirrelmail | 2025-04-03 | N/A | 
| Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php. | ||||
| CVE-2005-0184 | 1 Squirrelmail | 1 Vacation Plugin | 2025-04-03 | N/A | 
| Directory traversal vulnerability in ftpfile in the Vacation plugin 0.15 and earlier for Squirrelmail allows local users to read arbitrary files via a .. (dot dot) in a get request. | ||||
| CVE-2006-3665 | 1 Squirrelmail | 1 Squirrelmail | 2025-04-03 | N/A | 
| SquirrelMail 1.4.6 and earlier, with register_globals enabled, allows remote attackers to hijack cookies in src/redirect.php via unknown vectors. NOTE: while "cookie theft" is frequently associated with XSS, the vendor disclosure is too vague to be certain of this. | ||||
| CVE-2006-2842 | 2 Redhat, Squirrelmail | 2 Enterprise Linux, Squirrelmail | 2025-04-03 | N/A | 
| PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable | ||||
| CVE-2020-14933 | 1 Squirrelmail | 1 Squirrelmail | 2024-11-21 | 8.8 High | 
| compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded). | ||||
| CVE-2020-14932 | 1 Squirrelmail | 1 Squirrelmail | 2024-11-21 | 9.8 Critical | 
| compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php. | ||||
| CVE-2019-12970 | 1 Squirrelmail | 1 Squirrelmail | 2024-11-21 | N/A | 
| XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element. | ||||
| CVE-2018-8741 | 2 Debian, Squirrelmail | 2 Debian Linux, Squirrelmail | 2024-11-21 | N/A | 
| A directory traversal flaw in SquirrelMail 1.4.22 allows an authenticated attacker to exfiltrate (or potentially delete) files from the hosting server, related to ../ in the att_local_name field in Deliver.class.php. | ||||
| CVE-2018-14955 | 1 Squirrelmail | 1 Squirrelmail | 2024-11-21 | N/A | 
| The mail message display page in SquirrelMail through 1.4.22 has XSS via SVG animations (animate to attribute). | ||||
| CVE-2018-14954 | 1 Squirrelmail | 1 Squirrelmail | 2024-11-21 | N/A | 
| The mail message display page in SquirrelMail through 1.4.22 has XSS via the formaction attribute. | ||||
| CVE-2018-14953 | 1 Squirrelmail | 1 Squirrelmail | 2024-11-21 | N/A | 
| The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<math xlink:href=" attack. | ||||
| CVE-2018-14952 | 1 Squirrelmail | 1 Squirrelmail | 2024-11-21 | N/A | 
| The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<math><maction xlink:href=" attack. | ||||
| CVE-2018-14951 | 1 Squirrelmail | 1 Squirrelmail | 2024-11-21 | N/A | 
| The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<form action='data:text" attack. | ||||
| CVE-2018-14950 | 1 Squirrelmail | 1 Squirrelmail | 2024-11-21 | N/A | 
| The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<svg><a xlink:href=" attack. | ||||
| CVE-2012-5623 | 1 Squirrelmail | 1 Change Passwd | 2024-11-21 | 7.5 High | 
| Squirrelmail 4.0 uses the outdated MD5 hash algorithm for passwords. | ||||