Squirrelmail

Squirrelmail

65 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.74%
  • Published 17.03.2018 14:29:00
  • Last modified 21.11.2024 04:14:15

A directory traversal flaw in SquirrelMail 1.4.22 allows an authenticated attacker to exfiltrate (or potentially delete) files from the hosting server, related to ../ in the att_local_name field in Deliver.class.php.

Exploit
  • EPSS 12.36%
  • Published 20.04.2017 14:59:00
  • Last modified 20.04.2025 01:37:25

SquirrelMail 1.4.22 (and other versions before 20170427_0200-SVN) allows post-authentication remote code execution via a sendmail.cf file that is mishandled in a popen call. It's possible to exploit this vulnerability to execute arbitrary shell comma...

  • EPSS 0.77%
  • Published 18.01.2013 11:48:39
  • Last modified 11.04.2025 00:51:21

functions/imap_general.php in SquirrelMail, as used in Red Hat Enterprise Linux (RHEL) 4 and 5, does not properly handle 8-bit characters in passwords, which allows remote attackers to cause a denial of service (disk consumption) by making many IMAP ...

  • EPSS 0.2%
  • Published 17.07.2011 20:55:01
  • Last modified 11.04.2025 00:51:21

Multiple cross-site request forgery (CSRF) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to hijack the authentication of unspecified victims via vectors involving (1) the empty trash implementation and (2) the Index Order ...

  • EPSS 0.47%
  • Published 17.07.2011 20:55:01
  • Last modified 11.04.2025 00:51:21

CRLF injection vulnerability in SquirrelMail 1.4.21 and earlier allows remote attackers to modify or add preference values via a \n (newline) character, a different vulnerability than CVE-2010-4555.

  • EPSS 0.6%
  • Published 14.07.2011 23:55:02
  • Last modified 11.04.2025 00:51:21

Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message.

  • EPSS 0.9%
  • Published 14.07.2011 23:55:01
  • Last modified 11.04.2025 00:51:21

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) drop-down selection lists, (2) the > (greater than) character in the Squirr...

  • EPSS 0.47%
  • Published 14.07.2011 23:55:01
  • Last modified 11.04.2025 00:51:21

functions/page_header.php in SquirrelMail 1.4.21 and earlier does not prevent page rendering inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.

  • EPSS 4.16%
  • Published 19.08.2010 18:00:05
  • Last modified 11.04.2025 00:51:21

functions/imap_general.php in SquirrelMail before 1.4.21 does not properly handle 8-bit characters in passwords, which allows remote attackers to cause a denial of service (disk consumption) by making many IMAP login attempts with different usernames...

  • EPSS 0.13%
  • Published 22.06.2010 17:30:01
  • Last modified 11.04.2025 00:51:21

The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.