7.5
CVE-2005-0103
- EPSS 3.45%
- Published 24.01.2005 05:00:00
- Last modified 03.04.2025 01:03:51
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
PHP remote file inclusion vulnerability in webmail.php in SquirrelMail before 1.4.4 allows remote attackers to execute arbitrary PHP code by modifying a URL parameter to reference a URL on a remote web server that contains the code.
Data is provided by the National Vulnerability Database (NVD)
Squirrelmail ≫ Squirrelmail Version1.0.4
Squirrelmail ≫ Squirrelmail Version1.0.5
Squirrelmail ≫ Squirrelmail Version1.2.0
Squirrelmail ≫ Squirrelmail Version1.2.1
Squirrelmail ≫ Squirrelmail Version1.2.2
Squirrelmail ≫ Squirrelmail Version1.2.3
Squirrelmail ≫ Squirrelmail Version1.2.4
Squirrelmail ≫ Squirrelmail Version1.2.5
Squirrelmail ≫ Squirrelmail Version1.2.6
Squirrelmail ≫ Squirrelmail Version1.2.7
Squirrelmail ≫ Squirrelmail Version1.2.8
Squirrelmail ≫ Squirrelmail Version1.2.9
Squirrelmail ≫ Squirrelmail Version1.2.10
Squirrelmail ≫ Squirrelmail Version1.2.11
Squirrelmail ≫ Squirrelmail Version1.4
Squirrelmail ≫ Squirrelmail Version1.4.0
Squirrelmail ≫ Squirrelmail Version1.4.1
Squirrelmail ≫ Squirrelmail Version1.4.2
Squirrelmail ≫ Squirrelmail Version1.4.3
Squirrelmail ≫ Squirrelmail Version1.4.3_rc1
Squirrelmail ≫ Squirrelmail Version1.4.3a
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 3.45% | 0.871 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.