Total vulnerabilities in the database
Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) "/" and "/" comments, or (2) a newline in a "url" specifier, which is processed by certain web browsers including Internet Explorer.
Software | From | Fixed in |
---|---|---|
squirrelmail / squirrelmail | 1.4.2 | 1.4.2.x |
squirrelmail / squirrelmail | 1.4.6_rc1 | 1.4.6_rc1.x |
squirrelmail / squirrelmail | 1.4.3_r3 | 1.4.3_r3.x |
squirrelmail / squirrelmail | 1.4.3_rc1 | 1.4.3_rc1.x |
squirrelmail / squirrelmail | 1.4.4_rc1 | 1.4.4_rc1.x |
squirrelmail / squirrelmail | 1.4.3 | 1.4.3.x |
squirrelmail / squirrelmail | 1.4.1 | 1.4.1.x |
squirrelmail / squirrelmail | 1.4 | 1.4.x |
squirrelmail / squirrelmail | 1.4.3a | 1.4.3a.x |
squirrelmail / squirrelmail | 1.4_rc1 | 1.4_rc1.x |
squirrelmail / squirrelmail | 1.4.4 | 1.4.4.x |
squirrelmail / squirrelmail | 1.4.5 | 1.4.5.x |