4.3
CVE-2006-0195
- EPSS 2.74%
- Published 24.02.2006 00:02:00
- Last modified 03.04.2025 01:03:51
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) "/*" and "*/" comments, or (2) a newline in a "url" specifier, which is processed by certain web browsers including Internet Explorer.
Data is provided by the National Vulnerability Database (NVD)
Squirrelmail ≫ Squirrelmail Version1.4
Squirrelmail ≫ Squirrelmail Version1.4.1
Squirrelmail ≫ Squirrelmail Version1.4.2
Squirrelmail ≫ Squirrelmail Version1.4.3
Squirrelmail ≫ Squirrelmail Version1.4.3_r3
Squirrelmail ≫ Squirrelmail Version1.4.3_rc1
Squirrelmail ≫ Squirrelmail Version1.4.3a
Squirrelmail ≫ Squirrelmail Version1.4.4
Squirrelmail ≫ Squirrelmail Version1.4.4_rc1
Squirrelmail ≫ Squirrelmail Version1.4.5
Squirrelmail ≫ Squirrelmail Version1.4.6_rc1
Squirrelmail ≫ Squirrelmail Version1.4_rc1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 2.74% | 0.855 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|