CVE-2007-1262
Published May 11, 2007
Last updated 7 years ago
Overview
- Description
- Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C179A3C-8C8C-429B-BACA-8ADAE4170465" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AD31177-05BB-4623-AED7-765DB7E44E47" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20247A22-9AB9-4BCE-BF28-350B52FBC62D" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79E6734C-EE1C-40B6-9759-15298707A6F5" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_r3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6733B8C-5A9E-45CE-8938-F39A69EB0DC1" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B08E51F1-3764-4146-89C1-20B9B8EE1222" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD4071B2-3D4F-4755-98B1-E28CEB05EA8B" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3aa:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4AAFE2B-77AB-4AC3-A22C-C3C256E2E45A" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF6591E5-5F36-4663-85A6-9D870FD49FC7" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D062B70A-E5FF-403B-8BD1-777D6462B7CC" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D4CFD4D-EAC3-4325-A87F-9D5F4C513208" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A884536-4D27-4350-B815-AB4E625879DC" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_cvs:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CD09187-16B2-4A0C-907C-40375E865EBE" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7ED3CC3-E0A8-4C20-9EF7-405CD32E9EF7" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD89F143-EEBF-472D-9653-E7534F5799FF" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "796C453E-D59A-4988-BD91-24F31646D8FC" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9851AD9-5093-4482-A632-487C6D104C9D" }, { "criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.9a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BA5BA42-F53A-4E0D-B04C-D70D2291E408" } ], "operator": "OR" } ] } ]