4.3
CVSSv2

CVE-2005-2769

Published: 02/09/2005 Updated: 26/10/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in SqWebMail 5.0.4 and possibly other versions allows remote malicious users to inject arbitrary web script or HTML via an HTML e-mail containing tags with strings that contain ">" or other special characters, which is not properly sanitized by SqWebMail.

Vulnerable Product Search on Vulmon Subscribe to Product

inter7 sqwebmail 5.0.4

Vendor Advisories

Several Cross Site Scripting vulnerabilities were discovered in SqWebmail A remote attacker could exploit this to execute arbitrary JavaScript or other active HTML embeddable content in the web browser of an SqWebmail user by sending specially crafted emails to him ...
Jakob Balle discovered a vulnerability in the handling of attachments in sqwebmail, a web mail application provided by the courier mail suite, which can be exploited by an attacker to conduct script insertion attacks For the old stable distribution (woody) this problem has been fixed in version 0373-26 For the stable distribution (sarge) this ...

Exploits

source: wwwsecurityfocuscom/bid/14676/info SqWebMail is affected by a vulnerability that may allow remote attackers to inject and execute arbitrary script code in a user's browser This may allow for various attacks including session hijacking due to the theft of user credentials SqWebMail 504 is reportedly vulnerable to this issue ...