Oval Definition:oval:org.mitre.oval:tst:32265
Comment:squirrelmail is earlier than 0:1.4.6-5.el3
Type:rpminfo_testNamespace:linux
Check_Existence:at_least_one_existsCheck:at least one
State Operator:AND
References
Object:oval:org.mitre.oval:obj:14331
State:oval:org.mitre.oval:ste:9826
Referencing Definitions
Definition IDClassTitleLast Modified
oval:org.mitre.oval:def:9548
V
Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) "/*" and "*/" comments, or (2) a newline in a "url" specifier, which is processed by certain web browsers including Internet Explorer.
2013-04-29
oval:org.mitre.oval:def:10419
V
webmail.php in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary web pages into the right frame via a URL in the right_frame parameter. NOTE: this has been called a cross-site scripting (XSS) issue, but it is different than what is normally identified as XSS.
2013-04-29
oval:org.mitre.oval:def:11470
V
CRLF injection vulnerability in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary IMAP commands via newline characters in the mailbox parameter of the sqimap_mailbox_select command, aka "IMAP injection."
2013-04-29
BACK