4
CVSSv2

CVE-2010-1637

Published: 22/06/2010 Updated: 08/02/2024
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

The Mail Fetch plugin in SquirrelMail 1.4.20 and previous versions allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.

Vulnerable Product Search on Vulmon Subscribe to Product

squirrelmail squirrelmail

fedoraproject fedora 11

fedoraproject fedora 13

fedoraproject fedora 12

apple mac os x server

apple mac os x

redhat enterprise linux server 5.0

redhat enterprise linux workstation 5.0

redhat enterprise linux desktop 5.0

Vendor Advisories

Synopsis Moderate: squirrelmail security update Type/Severity Security Advisory: Moderate Topic An updated squirrelmail package that fixes several security issues is nowavailable for Red Hat Enterprise Linux 4 and 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact ...

Github Repositories

Go package of CWE IDs and metadata

cwe Go package of CWE IDs and metadata The list is generated from a CSV from the Comprehensive CWE Dictionary Example Here's CWE-918: "CWE-918": { Name: "Server-Side Request Forgery (SSRF)", WeaknessAbstraction: "Base", Status: "Incomplete", Description: "The web server receives

References