4.3
CVSSv2

CVE-2005-2820

Published: 07/09/2005 Updated: 11/07/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in SqWebMail 5.0.4 allows remote malicious users to inject arbitrary web script or HTML via an e-mail message containing Internet Explorer "Conditional Comments" such as "[if]" and "[endif]".

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

inter7 sqwebmail 5.0.4

Vendor Advisories

Several Cross Site Scripting vulnerabilities were discovered in SqWebmail A remote attacker could exploit this to execute arbitrary JavaScript or other active HTML embeddable content in the web browser of an SqWebmail user by sending specially crafted emails to him ...
Jakob Balle discovered that with "Conditional Comments" in Internet Explorer it is possible to hide javascript code in comments that will be executed when the browser views a malicious email via sqwebmail Successful exploitation requires that the user is using Internet Explorer For the old stable distribution (woody) this problem has been fixed i ...