Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-2023 (GCVE-0-2011-2023)
Vulnerability from cvelistv5 – Published: 2011-07-14 23:00 – Updated: 2024-08-06 22:46- n/a
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:46:00.972Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-2291",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2291"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5130"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.squirrelmail.org/security/issue/2011-07-10"
},
{
"name": "MDVSA-2011:123",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:123"
},
{
"name": "APPLE-SA-2012-02-01-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720695"
},
{
"name": "RHSA-2012:0103",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0103.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision\u0026revision=14121"
},
{
"name": "1025766",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1025766"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-07-10T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-08-27T09:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "DSA-2291",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2291"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5130"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.squirrelmail.org/security/issue/2011-07-10"
},
{
"name": "MDVSA-2011:123",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:123"
},
{
"name": "APPLE-SA-2012-02-01-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720695"
},
{
"name": "RHSA-2012:0103",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0103.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision\u0026revision=14121"
},
{
"name": "1025766",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1025766"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-2023",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-2291",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2291"
},
{
"name": "http://support.apple.com/kb/HT5130",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5130"
},
{
"name": "http://www.squirrelmail.org/security/issue/2011-07-10",
"refsource": "CONFIRM",
"url": "http://www.squirrelmail.org/security/issue/2011-07-10"
},
{
"name": "MDVSA-2011:123",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:123"
},
{
"name": "APPLE-SA-2012-02-01-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=720695",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720695"
},
{
"name": "RHSA-2012:0103",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0103.html"
},
{
"name": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision\u0026revision=14121",
"refsource": "CONFIRM",
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision\u0026revision=14121"
},
{
"name": "1025766",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025766"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-2023",
"datePublished": "2011-07-14T23:00:00.000Z",
"dateReserved": "2011-05-09T00:00:00.000Z",
"dateUpdated": "2024-08-06T22:46:00.972Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2011-2023
Vulnerability from fkie_nvd - Published: 2011-07-14 23:55 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CE87803-6C17-4FC8-9091-920E25E28C3B",
"versionEndIncluding": "1.4.21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C2F0267-47D5-436F-B9F6-505CEC582AD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "565E131D-56A9-46AB-800D-12B097FE3B7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4FAB6F43-2DAE-4E02-8F0A-EE4D4FB3E005",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "86DB6243-3A4A-419E-B6C5-D61F5B0A1E7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2805F37-B8E6-4647-9E90-50763C7E4952",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "284E543F-6AC3-45CD-8448-3A1D4D3DD469",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7E957E-81C0-4FA3-9944-5E514874BED8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.3pre1:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF0DACB-F875-448B-86DF-D40531A2A762",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.3pre2:*:*:*:*:*:*:*",
"matchCriteriaId": "651432C3-1EE9-4BBA-A1CF-DCC9F19954D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E11C84D0-13B5-4298-B9F3-BF5C6F927793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.4pre1:*:*:*:*:*:*:*",
"matchCriteriaId": "DEE72FA1-E635-436B-A650-A8D4040925B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.4pre2:*:*:*:*:*:*:*",
"matchCriteriaId": "512F2AB5-EB24-4846-B924-377D040C131A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "25F42A76-BF06-4DA9-8667-0E81D17B5B9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.5pre1:*:*:*:*:*:*:*",
"matchCriteriaId": "02410BAB-C1D7-4883-A27B-C13A72707CE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:0.5pre2:*:*:*:*:*:*:*",
"matchCriteriaId": "8509AAEE-225C-4907-884D-F9796ACA40F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DD41781D-1F7E-43A7-AD59-ADFE1D04D825",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78650B7E-9638-46FF-9656-38E8DFE3FA93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94CBBB8E-E0AB-4F7B-A55E-F7BD5F83EAAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1E1172-9D9E-439E-BD4B-4EF372344F59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "67E9817E-FF56-4FD0-B6C7-F4EEB25AD0CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5EBF40C5-6272-427C-97A1-3CE3B1D47B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DB15C5DD-2D76-47ED-883C-D1901B96F391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0pre1:*:*:*:*:*:*:*",
"matchCriteriaId": "E3E249ED-76DA-44B3-A3A7-788F4B1A19DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0pre2:*:*:*:*:*:*:*",
"matchCriteriaId": "ABD0A21F-CD80-4B01-B5D3-9B2281E4F143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.0pre3:*:*:*:*:*:*:*",
"matchCriteriaId": "BA516843-2A45-4705-9669-4B719F722192",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6DA068C0-8067-4A94-9F74-0D1DACF9A9EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "49F37AD5-120E-4FEA-ADA5-F6C3434B9BA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C059835E-8FD9-40DF-BA6F-7E313E49F511",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5E28A825-56F4-4EC5-9D62-661C0F4B477F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "545CD944-7C64-49E3-A32E-3388B5F3ECF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A55A98B3-34ED-4A90-BB78-50CB56B1B51F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9F7F3531-E0EE-48AA-BCB4-872BEB853531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CC5143ED-D4C5-4830-9C96-0B54D03679CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9B765AEC-09E9-456C-8B57-09927E55D119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0AAFC3B0-DCE3-4190-B279-E095C666FA34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9291A565-0BD6-4B5E-B45F-9DE65AB8159D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B6F53A84-FC66-4963-A728-7285F63D4761",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "69A941FF-423E-49C5-AE1F-FE7ED016CA3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "75E2349D-4B4C-469C-82CE-09C4B526BCFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B34FDB1D-881B-4343-A76E-F23B93A0469A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4DCB20-2A7F-4EE4-BAFA-AD74CD4456AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "052914F8-B52C-4AB4-8F85-68D788B588C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "617C554F-8E7D-4F8A-AF63-C193934C8215",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "15F11950-A2E4-4F57-BF87-57788B841A21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F886B99-E996-4BF7-9BE3-14A6713A997F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "65801122-2E5D-4244-9D37-5483F5C731F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5A29559D-0DB8-40C8-A6E6-4F37DDD27571",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "026730B8-3919-4100-8607-C640ADBDD662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D4D1297B-EE36-46E2-8722-34F385A54751",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2C179A3C-8C8C-429B-BACA-8ADAE4170465",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9C3A6CFE-CFA4-4B48-9738-063A2B1025FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:rc2a:*:*:*:*:*:*",
"matchCriteriaId": "2664D22F-B0E6-48AB-BBBA-C653C1AF77A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0-r1:*:*:*:*:*:*:*",
"matchCriteriaId": "5F6B4BA8-1379-44CF-B87D-9DA66B5F2484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD31177-05BB-4623-AED7-765DB7E44E47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "20247A22-9AB9-4BCE-BF28-350B52FBC62D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r1:*:*:*:*:*:*:*",
"matchCriteriaId": "AB0ABD26-2EA3-4884-BA0B-FFB88177CFDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r2:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC479F3-6F3B-46CB-9D28-2DB7D76FDAE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r3:*:*:*:*:*:*:*",
"matchCriteriaId": "8EDC2C56-E977-452F-9263-541091356B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r4:*:*:*:*:*:*:*",
"matchCriteriaId": "B743DEC2-1ED2-4CAC-87F4-4EFDF16159FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r5:*:*:*:*:*:*:*",
"matchCriteriaId": "5CCE37B1-932D-4A4A-B4CA-056E26D78659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "79E6734C-EE1C-40B6-9759-15298707A6F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:r3:*:*:*:*:*:*",
"matchCriteriaId": "F66D66B1-992E-4EE0-A189-0974B96FE721",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "70484027-647C-47DF-85FD-3323F4685613",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD4071B2-3D4F-4755-98B1-E28CEB05EA8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3aa:*:*:*:*:*:*:*",
"matchCriteriaId": "C4AAFE2B-77AB-4AC3-A22C-C3C256E2E45A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BF6591E5-5F36-4663-85A6-9D870FD49FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "03D847B0-DE1D-49D7-9ED4-30C0A82209AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4CFD4D-EAC3-4325-A87F-9D5F4C513208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A53D0058-6216-4136-8F0A-A6B4AD475DA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3A884536-4D27-4350-B815-AB4E625879DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4429B95B-273A-45F3-A066-9AF548AC3FC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_cvs:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD09187-16B2-4A0C-907C-40375E865EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BD89F143-EEBF-472D-9653-E7534F5799FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "796C453E-D59A-4988-BD91-24F31646D8FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.8.4fc6:*:*:*:*:*:*:*",
"matchCriteriaId": "2A901766-B49B-4983-98AB-880B333C284B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B9851AD9-5093-4482-A632-487C6D104C9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.9a:*:*:*:*:*:*:*",
"matchCriteriaId": "5BA5BA42-F53A-4E0D-B04C-D70D2291E408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "18AF3BC6-E33B-44BD-A2F6-A7F5244AA4FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.10a:*:*:*:*:*:*:*",
"matchCriteriaId": "77776503-3258-400D-8404-233EAFA940AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "682BC5E2-F2C5-4B6F-8EF0-E05152BB9B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC24558-B7C1-4DE7-BC24-AF092DF0DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "537E4C91-91F9-469B-BF7D-5B05624D637A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0986D113-C9F9-4645-8968-D165EC6B917D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.15:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3893B3D9-BAA3-4FCD-BC58-C4B664E688B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.15rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC5C975-D1EE-4248-9DA9-81C10E28B7F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B8608AE1-7930-47CF-B2E8-9E86E2FB5A20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "34EB1B08-4377-4496-A278-19616238900F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF9DF8F-368B-44A0-9258-49298E41E0E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.19:*:*:*:*:*:*:*",
"matchCriteriaId": "14735797-F6A9-42C8-9E05-9A427AD69EFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.20:*:*:*:*:*:*:*",
"matchCriteriaId": "BD44ECE5-7C33-4200-9F36-2E8D5D7DB2D5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en functions/mime.php en SquirrelMail anterior a v.1.4.22 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de un elemento STYLE en un correo electr\u00f3nico."
}
],
"id": "CVE-2011-2023",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-07-14T23:55:02.113",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0103.html"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1025766"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision\u0026revision=14121"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT5130"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2011/dsa-2291"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:123"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.squirrelmail.org/security/issue/2011-07-10"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720695"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0103.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1025766"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision\u0026revision=14121"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT5130"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2291"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.squirrelmail.org/security/issue/2011-07-10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720695"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2011-2023
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-2023",
"description": "Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message.",
"id": "GSD-2011-2023",
"references": [
"https://www.debian.org/security/2011/dsa-2291",
"https://access.redhat.com/errata/RHSA-2012:0103",
"https://linux.oracle.com/cve/CVE-2011-2023.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-2023"
],
"details": "Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message.",
"id": "GSD-2011-2023",
"modified": "2023-12-13T01:19:06.878394Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-2023",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-2291",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2291"
},
{
"name": "http://support.apple.com/kb/HT5130",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5130"
},
{
"name": "http://www.squirrelmail.org/security/issue/2011-07-10",
"refsource": "CONFIRM",
"url": "http://www.squirrelmail.org/security/issue/2011-07-10"
},
{
"name": "MDVSA-2011:123",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:123"
},
{
"name": "APPLE-SA-2012-02-01-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=720695",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720695"
},
{
"name": "RHSA-2012:0103",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0103.html"
},
{
"name": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision\u0026revision=14121",
"refsource": "CONFIRM",
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision\u0026revision=14121"
},
{
"name": "1025766",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025766"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.15:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.4pre2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0-r1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.3pre2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.15rc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:r3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.9a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.3pre1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:rc2a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.0pre1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.0pre2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.5pre1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.5pre2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_cvs:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.10a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.4.21",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.0pre3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:0.4pre1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.8.4fc6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3aa:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-2023"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.squirrelmail.org/security/issue/2011-07-10",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.squirrelmail.org/security/issue/2011-07-10"
},
{
"name": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision\u0026revision=14121",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision\u0026revision=14121"
},
{
"name": "1025766",
"refsource": "SECTRACK",
"tags": [],
"url": "http://securitytracker.com/id?1025766"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=720695",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720695"
},
{
"name": "DSA-2291",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2011/dsa-2291"
},
{
"name": "MDVSA-2011:123",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:123"
},
{
"name": "http://support.apple.com/kb/HT5130",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT5130"
},
{
"name": "APPLE-SA-2012-02-01-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"name": "RHSA-2012:0103",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0103.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2012-02-14T04:06Z",
"publishedDate": "2011-07-14T23:55Z"
}
}
}
CERTA-2011-AVI-410
Vulnerability from certfr_avis - Published: 2011-07-25 - Updated: 2011-07-25
Plusieurs vulnérabilités autorisant une personne malintentionnée à injecter indirectement du code arbitraire à distance et à obtenir des informations sensibles ont été découvertes dans SquirrelMail.
Description
Plusieurs vulnérabilités affectent SquirrelMail. Trois d'entre elles autorisent une personne malintentionnée à injecter indirectement du code à distance :
- CVE-2010-4554 et CVE-2011-2753 : de multiples erreurs autorisent l'injection de script ou de code HTML à distance via différents vecteurs : les boîtes de dialogue déroulantes, le plugin de correction orthographique SquirellSpell, la page Index Order et la fonction empty trash.
- CVE-2011-2023 : le script functions/mime.php ne gère pas correctement certaines balises de style autorisant ainsi une injection de script ou de code HTML ;
La dernière vulnérabilité (CVE-2010-4554) permet à une personne malveillante d'accéder à des données sensibles de l'utilisateur (telles que son mot de passe) via un vol de clic (clickjacking).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
SquirrelMail 1.x.x versions antérieures à 1.4.21.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eSquirrelMail 1.x.x versions ant\u00e9rieures \u00e0 1.4.21.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s affectent SquirrelMail. Trois d\u0027entre elles\nautorisent une personne malintentionn\u00e9e \u00e0 injecter indirectement du code\n\u00e0 distance :\n\n- CVE-2010-4554 et CVE-2011-2753 : de multiples erreurs autorisent\n l\u0027injection de script ou de code HTML \u00e0 distance via diff\u00e9rents\n vecteurs : les bo\u00eetes de dialogue d\u00e9roulantes, le plugin de\n correction orthographique SquirellSpell, la page Index Order et la\n fonction empty trash.\n- CVE-2011-2023 : le script functions/mime.php ne g\u00e8re pas\n correctement certaines balises de style autorisant ainsi une\n injection de script ou de code HTML ;\n\nLa derni\u00e8re vuln\u00e9rabilit\u00e9 (CVE-2010-4554) permet \u00e0 une personne\nmalveillante d\u0027acc\u00e9der \u00e0 des donn\u00e9es sensibles de l\u0027utilisateur (telles\nque son mot de passe) via un vol de clic (clickjacking).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-4555",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4555"
},
{
"name": "CVE-2011-2753",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2753"
},
{
"name": "CVE-2010-4554",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4554"
},
{
"name": "CVE-2011-2023",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2023"
}
],
"initial_release_date": "2011-07-25T00:00:00",
"last_revision_date": "2011-07-25T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Fedora Fedora-2011-9309 du 13 juillet 2011 :",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062983.html"
}
],
"reference": "CERTA-2011-AVI-410",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s autorisant une personne malintentionn\u00e9e \u00e0\ninjecter indirectement du code arbitraire \u00e0 distance et \u00e0 obtenir des\ninformations sensibles ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eSquirrelMail\u003c/span\u003e.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans SquirrelMail",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Fedora Fedora-2011-9309 du 13 juillet 2011",
"url": null
}
]
}
CERTA-2012-AVI-054
Vulnerability from certfr_avis - Published: 2012-02-03 - Updated: 2012-02-03
Plusieurs vulnérabilités sont présentes dans Mac OS X Lion.
Description
Plusieurs vulnérabilités existent dans Mac OS X Lion dont certaines, particulièrement critiques, permettent à une personne malintentionnée d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Mac OS X Lion, versions antérieures à 10.7.3.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eMac OS X Lion, versions ant\u00e9rieures \u00e0 10.7.3.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s existent dans Mac OS X Lion dont certaines,\nparticuli\u00e8rement critiques, permettent \u00e0 une personne malintentionn\u00e9e\nd\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2011-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2202"
},
{
"name": "CVE-2011-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2483"
},
{
"name": "CVE-2011-0200",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0200"
},
{
"name": "CVE-2011-3459",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3459"
},
{
"name": "CVE-2011-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3348"
},
{
"name": "CVE-2010-4555",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4555"
},
{
"name": "CVE-2011-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3446"
},
{
"name": "CVE-2011-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3182"
},
{
"name": "CVE-2011-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3268"
},
{
"name": "CVE-2011-3453",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3453"
},
{
"name": "CVE-2010-2813",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2813"
},
{
"name": "CVE-2011-3256",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3256"
},
{
"name": "CVE-2011-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3444"
},
{
"name": "CVE-2011-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3450"
},
{
"name": "CVE-2011-1657",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1657"
},
{
"name": "CVE-2011-3422",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3422"
},
{
"name": "CVE-2011-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3449"
},
{
"name": "CVE-2011-3328",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3328"
},
{
"name": "CVE-2011-3249",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3249"
},
{
"name": "CVE-2011-3267",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3267"
},
{
"name": "CVE-2011-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1921"
},
{
"name": "CVE-2011-3448",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3448"
},
{
"name": "CVE-2011-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1148"
},
{
"name": "CVE-2011-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3441"
},
{
"name": "CVE-2011-1783",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1783"
},
{
"name": "CVE-2010-4554",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4554"
},
{
"name": "CVE-2011-3246",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3246"
},
{
"name": "CVE-2011-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0241"
},
{
"name": "CVE-2011-3452",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3452"
},
{
"name": "CVE-2011-2192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2192"
},
{
"name": "CVE-2011-3460",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3460"
},
{
"name": "CVE-2011-3252",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3252"
},
{
"name": "CVE-2011-3248",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3248"
},
{
"name": "CVE-2011-3457",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3457"
},
{
"name": "CVE-2011-3463",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3463"
},
{
"name": "CVE-2011-2937",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2937"
},
{
"name": "CVE-2011-3458",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3458"
},
{
"name": "CVE-2011-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1752"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3462",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3462"
},
{
"name": "CVE-2010-1637",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1637"
},
{
"name": "CVE-2011-2204",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2204"
},
{
"name": "CVE-2011-3250",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3250"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2011-2023",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2023"
},
{
"name": "CVE-2011-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1938"
},
{
"name": "CVE-2011-3447",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3447"
},
{
"name": "CVE-2011-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3189"
}
],
"initial_release_date": "2012-02-03T00:00:00",
"last_revision_date": "2012-02-03T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-054",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-02-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans \u003cspan class=\"textit\"\u003eMac OS\nX Lion\u003c/span\u003e.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5130 du 01 f\u00e9vrier 2012",
"url": "http://support.apple.com/kb/HT5130"
}
]
}
GHSA-P9FX-GWHC-6M8M
Vulnerability from github – Published: 2022-05-17 05:33 – Updated: 2022-05-17 05:33Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message.
{
"affected": [],
"aliases": [
"CVE-2011-2023"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-07-14T23:55:00Z",
"severity": "MODERATE"
},
"details": "Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message.",
"id": "GHSA-p9fx-gwhc-6m8m",
"modified": "2022-05-17T05:33:51Z",
"published": "2022-05-17T05:33:51Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2023"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=720695"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0103.html"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1025766"
},
{
"type": "WEB",
"url": "http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision\u0026revision=14121"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5130"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2011/dsa-2291"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:123"
},
{
"type": "WEB",
"url": "http://www.squirrelmail.org/security/issue/2011-07-10"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.