Show filters
154 Total Results
Displaying 71-80 of 154
Sort by:
Attacker Value
Unknown

CVE-2019-12970

Disclosure Date: July 01, 2019 (last updated November 27, 2024)
XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element.
0
Attacker Value
Unknown

CVE-2019-1000008

Disclosure Date: February 04, 2019 (last updated November 27, 2024)
All versions of Helm between Helm >=2.0.0 and < 2.12.2 contains a CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The commands `helm fetch --untar` and `helm lint some.tgz` that can result when chart archive files are unpacked a file may be unpacked outside of the target directory. This attack appears to be exploitable via a victim must run a helm command on a specially crafted chart archive. This vulnerability appears to have been fixed in 2.12.2.
0
Attacker Value
Unknown

CVE-2018-14954

Disclosure Date: August 05, 2018 (last updated November 08, 2023)
The mail message display page in SquirrelMail through 1.4.22 has XSS via the formaction attribute.
0
Attacker Value
Unknown

CVE-2018-14955

Disclosure Date: August 05, 2018 (last updated November 08, 2023)
The mail message display page in SquirrelMail through 1.4.22 has XSS via SVG animations (animate to attribute).
0
Attacker Value
Unknown

CVE-2018-14951

Disclosure Date: August 05, 2018 (last updated November 08, 2023)
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<form action='data:text" attack.
0
Attacker Value
Unknown

CVE-2018-14950

Disclosure Date: August 05, 2018 (last updated November 08, 2023)
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<svg><a xlink:href=" attack.
0
Attacker Value
Unknown

CVE-2018-14952

Disclosure Date: August 05, 2018 (last updated November 08, 2023)
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<math><maction xlink:href=" attack.
0
Attacker Value
Unknown

CVE-2018-14953

Disclosure Date: August 05, 2018 (last updated November 08, 2023)
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<math xlink:href=" attack.
0
Attacker Value
Unknown

CVE-2018-8741

Disclosure Date: March 17, 2018 (last updated November 08, 2023)
A directory traversal flaw in SquirrelMail 1.4.22 allows an authenticated attacker to exfiltrate (or potentially delete) files from the hosting server, related to ../ in the att_local_name field in Deliver.class.php.
0
Attacker Value
Unknown

CVE-2017-7692

Disclosure Date: April 20, 2017 (last updated November 26, 2024)
SquirrelMail 1.4.22 (and other versions before 20170427_0200-SVN) allows post-authentication remote code execution via a sendmail.cf file that is mishandled in a popen call. It's possible to exploit this vulnerability to execute arbitrary shell commands on the remote server. The problem is in the Deliver_SendMail.class.php with the initStream function that uses escapeshellcmd() to sanitize the sendmail command before executing it. The use of escapeshellcmd() is not correct in this case since it doesn't escape whitespaces, allowing the injection of arbitrary command parameters. The problem is in -f$envelopefrom within the sendmail command line. Hence, if the target server uses sendmail and SquirrelMail is configured to use it as a command-line program, it's possible to trick sendmail into using an attacker-provided configuration file that triggers the execution of an arbitrary command. For exploitation, the attacker must upload a sendmail.cf file as an email attachment, and inject the …
0