4.3
CVSSv2

CVE-2006-0195

Published: 24/02/2006 Updated: 11/10/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote malicious users to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) "/*" and "*/" comments, or (2) a newline in a "url" specifier, which is processed by certain web browsers including Internet Explorer.

Vulnerable Product Search on Vulmon Subscribe to Product

squirrelmail squirrelmail 1.4.3a

squirrelmail squirrelmail 1.4.4

squirrelmail squirrelmail 1.4.3_r3

squirrelmail squirrelmail 1.4.3_rc1

squirrelmail squirrelmail 1.4

squirrelmail squirrelmail 1.4.1

squirrelmail squirrelmail 1.4.4_rc1

squirrelmail squirrelmail 1.4.5

squirrelmail squirrelmail 1.4.2

squirrelmail squirrelmail 1.4.3

squirrelmail squirrelmail 1.4.6_rc1

squirrelmail squirrelmail 1.4_rc1

Vendor Advisories

Debian Bug report logs - #354063 CVE-2006-0377: IMAP injection attempts Package: squirrelmail; Maintainer for squirrelmail is Jeroen van Wolffelaar <jeroen@wolffelaarnl>; Source for squirrelmail is src:squirrelmail (PTS, buildd, popcon) Reported by: Geoff Crompton <geoffcrompton@strategicdatacomau> Date: Thu, 23 ...
Debian Bug report logs - #354064 CVE-2006-0188: possible XSS through right_main parameter of webmailphp Package: squirrelmail; Maintainer for squirrelmail is Jeroen van Wolffelaar <jeroen@wolffelaarnl>; Source for squirrelmail is src:squirrelmail (PTS, buildd, popcon) Reported by: Geoff Crompton <geoffcrompton@strategi ...
Debian Bug report logs - #354062 CVE-2006-0195: XSS re comments in styles Package: squirrelmail; Maintainer for squirrelmail is Jeroen van Wolffelaar <jeroen@wolffelaarnl>; Source for squirrelmail is src:squirrelmail (PTS, buildd, popcon) Reported by: Geoff Crompton <geoffcrompton@strategicdatacomau> Date: Thu, 2 ...