Squirrelmail Squirrelmail : OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All Family: All Windows Unix IOS Pixos
Title Definition Id Class Family
** DISPUTED ** PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if re... oval:org.mitre.oval:def:11670 Vulnerability unix
A certain Red Hat patch for SquirrelMail 1.4.8 sets the same SQMSESSID cookie value for all sessions, which allows remot... oval:org.mitre.oval:def:10366 Vulnerability unix
CRLF injection vulnerability in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary IMAP commands vi... oval:org.mitre.oval:def:11470 Vulnerability unix
Cross-site request forgery (CSRF) vulnerability in compose.php in SquirrelMail 1.4.0 through 1.4.9a allows remote attack... oval:org.mitre.oval:def:11448 Vulnerability unix
Cross-site scripting (XSS) vulnerability in mime.php for SquirrelMail before 1.4.3 allows remote attackers to insert arb... oval:org.mitre.oval:def:10766 Vulnerability unix
Cross-site scripting (XSS) vulnerability in SquirrelMail before 1.4.17 allows remote attackers to inject arbitrary web s... oval:org.mitre.oval:def:9764 Vulnerability unix
Cross-site scripting (XSS) vulnerability in the decoding of encoded text in certain headers in mime.php for SquirrelMail... oval:org.mitre.oval:def:9592 Vulnerability unix
Cross-site scripting (XSS) vulnerability in webmail.php in SquirrelMail before 1.4.4 allows remote attackers to inject a... oval:org.mitre.oval:def:10568 Vulnerability unix
Dynamic variable evaluation vulnerability in compose.php in SquirrelMail 1.4.0 to 1.4.7 allows remote attackers to overw... oval:org.mitre.oval:def:11533 Vulnerability unix
functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets ... oval:org.mitre.oval:def:10441 Vulnerability unix
Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-... oval:org.mitre.oval:def:9548 Vulnerability unix
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary sc... oval:org.mitre.oval:def:10274 Vulnerability unix
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.4 allow remote attackers to inject... oval:org.mitre.oval:def:9852 Vulnerability unix
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject... oval:org.mitre.oval:def:9988 Vulnerability unix
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote at... oval:org.mitre.oval:def:11624 Vulnerability unix
Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote... oval:org.mitre.oval:def:11712 Vulnerability unix
Multiple cross-site request forgery (CSRF) vulnerabilities in SquirrelMail 1.4.19 and earlier, and NaSMail before 1.7, a... oval:org.mitre.oval:def:10668 Vulnerability unix
options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which... oval:org.mitre.oval:def:10500 Vulnerability unix
PHP remote file inclusion vulnerability in webmail.php in SquirrelMail before 1.4.4 allows remote attackers to execute a... oval:org.mitre.oval:def:10670 Vulnerability unix
prefs.php in SquirrelMail before 1.4.4, with register_globals enabled, allows remote attackers to inject local code into... oval:org.mitre.oval:def:9587 Vulnerability unix
Session fixation vulnerability in SquirrelMail before 1.4.18 allows remote attackers to hijack web sessions via a crafte... oval:org.mitre.oval:def:10107 Vulnerability unix
SqirrelMail Cross-site Scripting Vulnerabilities oval:org.mitre.oval:def:614 Vulnerability unix
SQL injection vulnerability in SquirrelMail before 1.4.3 RC1 allows remote attackers to execute unauthorized SQL stateme... oval:org.mitre.oval:def:11446 Vulnerability unix
Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie ... oval:org.mitre.oval:def:10548 Vulnerability unix
SquirrelMail Cross-site Scripting Vulnerability I oval:org.mitre.oval:def:1006 Vulnerability unix
SquirrelMail Cross-site Scripting Vulnerability II oval:org.mitre.oval:def:1012 Vulnerability unix
SquirrelMail SQL Injection Vulnerability oval:org.mitre.oval:def:1033 Vulnerability unix
The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remo... oval:org.mitre.oval:def:10986 Vulnerability unix
webmail.php in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary web pages into the right frame vi... oval:org.mitre.oval:def:10419 Vulnerability unix
Total number of results : 29
Page : 1 (This Page)

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html