squirrelmail CVE Vulnerabilities & Metrics

Focus on squirrelmail vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About squirrelmail Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with squirrelmail. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total squirrelmail CVEs: 12
Earliest CVE date: 02 Jul 2001, 04:00 UTC
Latest CVE date: 20 Jun 2020, 13:15 UTC

Latest CVE reference: CVE-2020-14933

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical squirrelmail CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.74

Max CVSS: 10.0

Critical CVEs (≥9): 3

CVSS Range vs. Count

Range Count
0.0-3.9 1
4.0-6.9 55
7.0-8.9 12
9.0-10.0 3

CVSS Distribution Chart

Top 5 Highest CVSS squirrelmail CVEs

These are the five CVEs with the highest CVSS scores for squirrelmail, sorted by severity first and recency.

All CVEs for squirrelmail

CVE-2020-14933 squirrelmail vulnerability CVSS: 6.5 20 Jun 2020, 13:15 UTC

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).

CVE-2020-14932 squirrelmail vulnerability CVSS: 7.5 20 Jun 2020, 13:15 UTC

compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php.

CVE-2012-5623 squirrelmail vulnerability CVSS: 5.0 13 Feb 2020, 19:15 UTC

Squirrelmail 4.0 uses the outdated MD5 hash algorithm for passwords.

CVE-2019-12970 squirrelmail vulnerability CVSS: 4.3 01 Jul 2019, 11:15 UTC

XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element.

CVE-2018-14955 squirrelmail vulnerability CVSS: 4.3 05 Aug 2018, 18:29 UTC

The mail message display page in SquirrelMail through 1.4.22 has XSS via SVG animations (animate to attribute).

CVE-2018-14954 squirrelmail vulnerability CVSS: 4.3 05 Aug 2018, 18:29 UTC

The mail message display page in SquirrelMail through 1.4.22 has XSS via the formaction attribute.

CVE-2018-14953 squirrelmail vulnerability CVSS: 4.3 05 Aug 2018, 18:29 UTC

The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<math xlink:href=" attack.

CVE-2018-14952 squirrelmail vulnerability CVSS: 4.3 05 Aug 2018, 18:29 UTC

The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<math><maction xlink:href=" attack.

CVE-2018-14951 squirrelmail vulnerability CVSS: 4.3 05 Aug 2018, 18:29 UTC

The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<form action='data:text" attack.

CVE-2018-14950 squirrelmail vulnerability CVSS: 4.3 05 Aug 2018, 18:29 UTC

The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<svg><a xlink:href=" attack.

CVE-2018-8741 squirrelmail vulnerability CVSS: 6.5 17 Mar 2018, 14:29 UTC

A directory traversal flaw in SquirrelMail 1.4.22 allows an authenticated attacker to exfiltrate (or potentially delete) files from the hosting server, related to ../ in the att_local_name field in Deliver.class.php.

CVE-2017-7692 squirrelmail vulnerability CVSS: 9.0 20 Apr 2017, 14:59 UTC

SquirrelMail 1.4.22 (and other versions before 20170427_0200-SVN) allows post-authentication remote code execution via a sendmail.cf file that is mishandled in a popen call. It's possible to exploit this vulnerability to execute arbitrary shell commands on the remote server. The problem is in the Deliver_SendMail.class.php with the initStream function that uses escapeshellcmd() to sanitize the sendmail command before executing it. The use of escapeshellcmd() is not correct in this case since it doesn't escape whitespaces, allowing the injection of arbitrary command parameters. The problem is in -f$envelopefrom within the sendmail command line. Hence, if the target server uses sendmail and SquirrelMail is configured to use it as a command-line program, it's possible to trick sendmail into using an attacker-provided configuration file that triggers the execution of an arbitrary command. For exploitation, the attacker must upload a sendmail.cf file as an email attachment, and inject the sendmail.cf filename with the -C option within the "Options > Personal Informations > Email Address" setting.

CVE-2012-2124 squirrelmail vulnerability CVSS: 5.0 18 Jan 2013, 11:48 UTC

functions/imap_general.php in SquirrelMail, as used in Red Hat Enterprise Linux (RHEL) 4 and 5, does not properly handle 8-bit characters in passwords, which allows remote attackers to cause a denial of service (disk consumption) by making many IMAP login attempts with different usernames, leading to the creation of many preference files. NOTE: this issue exists because of an incorrect fix for CVE-2010-2813.

CVE-2011-2753 squirrelmail vulnerability CVSS: 6.8 17 Jul 2011, 20:55 UTC

Multiple cross-site request forgery (CSRF) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to hijack the authentication of unspecified victims via vectors involving (1) the empty trash implementation and (2) the Index Order (aka options_order) page, a different issue than CVE-2010-4555.

CVE-2011-2752 squirrelmail vulnerability CVSS: 5.8 17 Jul 2011, 20:55 UTC

CRLF injection vulnerability in SquirrelMail 1.4.21 and earlier allows remote attackers to modify or add preference values via a \n (newline) character, a different vulnerability than CVE-2010-4555.

CVE-2011-2023 squirrelmail vulnerability CVSS: 4.3 14 Jul 2011, 23:55 UTC

Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message.

CVE-2010-4555 squirrelmail vulnerability CVSS: 4.3 14 Jul 2011, 23:55 UTC

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) drop-down selection lists, (2) the > (greater than) character in the SquirrelSpell spellchecking plugin, and (3) errors associated with the Index Order (aka options_order) page.

CVE-2010-4554 squirrelmail vulnerability CVSS: 4.3 14 Jul 2011, 23:55 UTC

functions/page_header.php in SquirrelMail 1.4.21 and earlier does not prevent page rendering inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.

CVE-2010-2813 squirrelmail vulnerability CVSS: 5.0 19 Aug 2010, 18:00 UTC

functions/imap_general.php in SquirrelMail before 1.4.21 does not properly handle 8-bit characters in passwords, which allows remote attackers to cause a denial of service (disk consumption) by making many IMAP login attempts with different usernames, leading to the creation of many preferences files.

CVE-2010-1637 squirrelmail vulnerability CVSS: 4.0 22 Jun 2010, 17:30 UTC

The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.

CVE-2009-2964 squirrelmail vulnerability CVSS: 6.8 25 Aug 2009, 17:30 UTC

Multiple cross-site request forgery (CSRF) vulnerabilities in SquirrelMail 1.4.19 and earlier, and NaSMail before 1.7, allow remote attackers to hijack the authentication of unspecified victims via features such as send message and change preferences, related to (1) functions/mailbox_display.php, (2) src/addrbook_search_html.php, (3) src/addressbook.php, (4) src/compose.php, (5) src/folders.php, (6) src/folders_create.php, (7) src/folders_delete.php, (8) src/folders_rename_do.php, (9) src/folders_rename_getname.php, (10) src/folders_subscribe.php, (11) src/move_messages.php, (12) src/options.php, (13) src/options_highlight.php, (14) src/options_identities.php, (15) src/options_order.php, (16) src/search.php, and (17) src/vcard.php.

CVE-2009-1381 squirrelmail vulnerability CVSS: 6.8 22 May 2009, 20:30 UTC

The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.19-1 on Debian GNU/Linux, and possibly other operating systems and versions, allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program. NOTE: this issue exists because of an incomplete fix for CVE-2009-1579.

CVE-2009-1581 squirrelmail vulnerability CVSS: 4.3 14 May 2009, 17:30 UTC

functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message.

CVE-2009-1580 squirrelmail vulnerability CVSS: 5.8 14 May 2009, 17:30 UTC

Session fixation vulnerability in SquirrelMail before 1.4.18 allows remote attackers to hijack web sessions via a crafted cookie.

CVE-2009-1579 squirrelmail vulnerability CVSS: 6.8 14 May 2009, 17:30 UTC

The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.

CVE-2009-1578 squirrelmail vulnerability CVSS: 4.3 14 May 2009, 17:30 UTC

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING).

CVE-2009-0030 squirrelmail vulnerability CVSS: 6.5 21 Jan 2009, 20:30 UTC

A certain Red Hat patch for SquirrelMail 1.4.8 sets the same SQMSESSID cookie value for all sessions, which allows remote authenticated users to access other users' folder lists and configuration data in opportunistic circumstances by using the standard webmail.php interface. NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-3663.

CVE-2008-2379 squirrelmail vulnerability CVSS: 4.3 05 Dec 2008, 00:30 UTC

Cross-site scripting (XSS) vulnerability in SquirrelMail before 1.4.17 allows remote attackers to inject arbitrary web script or HTML via a crafted hyperlink in an HTML part of an e-mail message.

CVE-2008-3663 squirrelmail vulnerability CVSS: 5.0 24 Sep 2008, 14:56 UTC

Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

CVE-2007-6348 squirrelmail vulnerability CVSS: 6.8 14 Dec 2007, 19:46 UTC

SquirrelMail 1.4.11 and 1.4.12, as distributed on sourceforge.net before 20071213, has been externally modified to create a Trojan Horse that introduces a PHP remote file inclusion vulnerability, which allows remote attackers to execute arbitrary code.

CVE-2007-3778 squirrelmail vulnerability CVSS: 7.5 15 Jul 2007, 22:30 UTC

The G/PGP (GPG) Plugin 2.0, and 2.1dev before 20060912, for Squirrelmail allows remote attackers to execute arbitrary commands via shell metacharacters in the messageSignedText parameter to the gpg_check_sign_pgp_mime function in gpg_hook_functions.php. NOTE: a parameter value can be set in the contents of an e-mail message.

CVE-2006-4169 squirrelmail vulnerability CVSS: 5.5 15 Jul 2007, 22:30 UTC

Multiple directory traversal vulnerabilities in the G/PGP (GPG) Plugin 2.0, and 2.1dev before 20070614, for Squirrelmail allow remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the help parameter to (1) gpg_help.php or (2) gpg_help_base.php.

CVE-2007-3779 squirrelmail vulnerability CVSS: 4.3 15 Jul 2007, 22:30 UTC

PHP local file inclusion vulnerability in gpg_pop_init.php in the G/PGP (GPG) Plugin before 20070707 for Squirrelmail allows remote attackers to include and execute arbitrary local files, related to the MOD parameter.

CVE-2007-3636 squirrelmail vulnerability CVSS: 7.5 10 Jul 2007, 00:30 UTC

Multiple unspecified vulnerabilities in the G/PGP (GPG) Plugin 2.1 for Squirrelmail allow remote attackers to execute arbitrary commands via unspecified vectors. NOTE: this information is based upon a vague pre-advisory from a reliable researcher.

CVE-2007-3634 squirrelmail vulnerability CVSS: 6.5 10 Jul 2007, 00:30 UTC

Unspecified vulnerability in the G/PGP (GPG) Plugin 2.0 for Squirrelmail 1.4.10a allows remote authenticated users to execute arbitrary commands via unspecified vectors, possibly related to the passphrase variable in the gpg_sign_attachment function, aka ZD-00000004. this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine.

CVE-2007-3635 squirrelmail vulnerability CVSS: 4.3 10 Jul 2007, 00:30 UTC

Multiple unspecified vulnerabilities in the G/PGP (GPG) Plugin before 2.1 for Squirrelmail might allow "local authenticated users" to inject certain commands via unspecified vectors. NOTE: this might overlap CVE-2005-1924, CVE-2006-4169, or CVE-2007-3634.

CVE-2007-2631 squirrelmail vulnerability CVSS: 7.5 13 May 2007, 23:19 UTC

Cross-site request forgery (CSRF) vulnerability in SquirrelMail 1.4.8-4.fc6 and earlier allows remote attackers to perform unspecified actions as arbitrary users via unspecified vectors. NOTE: this issue might overlap CVE-2007-2589 or CVE-2002-1648.

CVE-2007-2589 squirrelmail vulnerability CVSS: 5.0 11 May 2007, 04:20 UTC

Cross-site request forgery (CSRF) vulnerability in compose.php in SquirrelMail 1.4.0 through 1.4.9a allows remote attackers to send e-mails from arbitrary users via certain data in the SRC attribute of an IMG element.

CVE-2007-1262 squirrelmail vulnerability CVSS: 4.3 11 May 2007, 04:20 UTC

Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer.

CVE-2006-6142 squirrelmail vulnerability CVSS: 6.8 05 Dec 2006, 11:28 UTC

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) mailto parameter in (a) webmail.php, the (2) session and (3) delete_draft parameters in (b) compose.php, and (4) unspecified vectors involving "a shortcoming in the magicHTML filter."

CVE-2006-4019 squirrelmail vulnerability CVSS: 6.4 11 Aug 2006, 21:04 UTC

Dynamic variable evaluation vulnerability in compose.php in SquirrelMail 1.4.0 to 1.4.7 allows remote attackers to overwrite arbitrary program variables and read or write the attachments and preferences of other users.

CVE-2006-3665 squirrelmail vulnerability CVSS: 4.3 18 Jul 2006, 15:47 UTC

SquirrelMail 1.4.6 and earlier, with register_globals enabled, allows remote attackers to hijack cookies in src/redirect.php via unknown vectors. NOTE: while "cookie theft" is frequently associated with XSS, the vendor disclosure is too vague to be certain of this.

CVE-2006-3174 squirrelmail vulnerability CVSS: 2.6 23 Jun 2006, 00:02 UTC

Cross-site scripting (XSS) vulnerability in search.php in SquirrelMail 1.5.1 and earlier, when register_globals is enabled, allows remote attackers to inject arbitrary HTML via the mailbox parameter.

CVE-2006-2842 squirrelmail vulnerability CVSS: 7.5 06 Jun 2006, 20:06 UTC

PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable

CVE-2006-0377 squirrelmail vulnerability CVSS: 5.0 24 Feb 2006, 00:02 UTC

CRLF injection vulnerability in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary IMAP commands via newline characters in the mailbox parameter of the sqimap_mailbox_select command, aka "IMAP injection."

CVE-2006-0188 squirrelmail vulnerability CVSS: 4.3 24 Feb 2006, 00:02 UTC

webmail.php in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary web pages into the right frame via a URL in the right_frame parameter. NOTE: this has been called a cross-site scripting (XSS) issue, but it is different than what is normally identified as XSS.

CVE-2006-0195 squirrelmail vulnerability CVSS: 4.3 24 Feb 2006, 00:02 UTC

Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) "/*" and "*/" comments, or (2) a newline in a "url" specifier, which is processed by certain web browsers including Internet Explorer.

CVE-2005-3128 squirrelmail vulnerability CVSS: 4.3 04 Oct 2005, 22:02 UTC

Cross-site scripting (XSS) vulnerability in add.php in Address Add Plugin 1.9 and 2.0 for Squirrelmail allows remote attackers to inject arbitrary web script or HTML via the IMG tag.

CVE-2005-2095 squirrelmail vulnerability CVSS: 4.3 13 Jul 2005, 04:00 UTC

options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which allows remote attackers to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files.

CVE-2005-1769 squirrelmail vulnerability CVSS: 4.3 16 Jun 2005, 04:00 UTC

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.4 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in (1) the URL or (2) an e-mail message.

CVE-2005-0239 squirrelmail vulnerability CVSS: 7.5 02 May 2005, 04:00 UTC

viewcert.php in the S/MIME plugin 0.4 and 0.5 for Squirrelmail allows remote attackers to execute arbitrary commands via shell metacharacters in the cert parameter.

CVE-2004-1036 squirrelmail vulnerability CVSS: 6.8 01 Mar 2005, 05:00 UTC

Cross-site scripting (XSS) vulnerability in the decoding of encoded text in certain headers in mime.php for SquirrelMail 1.4.3a and earlier, and 1.5.1-cvs before 23rd October 2004, allows remote attackers to execute arbitrary web script or HTML.

CVE-2005-0152 squirrelmail vulnerability CVSS: 7.5 02 Feb 2005, 05:00 UTC

PHP remote file inclusion vulnerability in Squirrelmail 1.2.6 allows remote attackers to execute arbitrary code via "URL manipulation."

CVE-2005-0075 squirrelmail vulnerability CVSS: 5.0 29 Jan 2005, 05:00 UTC

prefs.php in SquirrelMail before 1.4.4, with register_globals enabled, allows remote attackers to inject local code into the SquirrelMail code via custom preference handlers.

CVE-2005-0104 squirrelmail vulnerability CVSS: 4.3 29 Jan 2005, 05:00 UTC

Cross-site scripting (XSS) vulnerability in webmail.php in SquirrelMail before 1.4.4 allows remote attackers to inject arbitrary web script or HTML via certain integer variables.

CVE-2005-0103 squirrelmail vulnerability CVSS: 7.5 24 Jan 2005, 05:00 UTC

PHP remote file inclusion vulnerability in webmail.php in SquirrelMail before 1.4.4 allows remote attackers to execute arbitrary PHP code by modifying a URL parameter to reference a URL on a remote web server that contains the code.

CVE-2004-0521 squirrelmail vulnerability CVSS: 10.0 18 Aug 2004, 04:00 UTC

SQL injection vulnerability in SquirrelMail before 1.4.3 RC1 allows remote attackers to execute unauthorized SQL statements, with unknown impact, probably via abook_database.php.

CVE-2004-0519 squirrelmail vulnerability CVSS: 6.8 18 Aug 2004, 04:00 UTC

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.

CVE-2004-0520 squirrelmail vulnerability CVSS: 6.8 18 Aug 2004, 04:00 UTC

Cross-site scripting (XSS) vulnerability in mime.php for SquirrelMail before 1.4.3 allows remote attackers to insert arbitrary HTML and script via the content-type mail header, as demonstrated using read_body.php.

CVE-2004-0639 squirrelmail vulnerability CVSS: 6.8 06 Aug 2004, 04:00 UTC

Multiple cross-site scripting (XSS) vulnerabilities in Squirrelmail 1.2.10 and earlier allow remote attackers to inject arbitrary HTML or script via (1) the $mailer variable in read_body.php, (2) the $senderNames_part variable in mailbox_display.php, and possibly other vectors including (3) the $event_title variable or (4) the $event_text variable.

CVE-2003-0160 squirrelmail vulnerability CVSS: 5.8 02 Apr 2003, 05:00 UTC

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.2.11 allow remote attackers to inject arbitrary HTML code and steal information from a client's web browser.

CVE-2002-1648 squirrelmail vulnerability CVSS: 7.5 31 Dec 2002, 05:00 UTC

Cross-site request forgery (CSRF) vulnerability in compose.php in SquirrelMail before 1.2.3 allows remote attackers to send email as other users via an IMG URL with modified send_to and subject parameters.

CVE-2002-1650 squirrelmail vulnerability CVSS: 7.5 31 Dec 2002, 05:00 UTC

The spell checker plugin (check_me.mod.php) for SquirrelMail before 1.2.3 allows remote attackers to execute arbitrary commands via a modified sqspell_command parameter.

CVE-2002-1649 squirrelmail vulnerability CVSS: 4.3 31 Dec 2002, 05:00 UTC

Cross-site scripting (XSS) vulnerability in read_body.php in SquirrelMail before 1.2.3 allows remote attackers to execute arbitrary Javascript via a javascript: URL in an IMG tag.

CVE-2002-2086 squirrelmail vulnerability CVSS: 4.3 31 Dec 2002, 05:00 UTC

Multiple cross-site scripting (XSS) vulnerabilities in magicHTML of SquirrelMail before 1.2.6 allow remote attackers to inject arbitrary web script or HTML via (1) "<<script" in unspecified input fields or (2) a javascript: URL in the src attribute of an IMG tag.

CVE-2002-1341 squirrelmail vulnerability CVSS: 6.8 18 Dec 2002, 05:00 UTC

Cross-site scripting (XSS) vulnerability in read_body.php for SquirrelMail 1.2.10, 1.2.9, and earlier allows remote attackers to insert script and HTML via the (1) mailbox and (2) passed_id parameters.

CVE-2002-1276 squirrelmail vulnerability CVSS: 4.3 29 Nov 2002, 05:00 UTC

An incomplete fix for a cross-site scripting (XSS) vulnerability in SquirrelMail 1.2.8 calls the strip_tags function on the PHP_SELF value but does not save the result back to that variable, leaving it open to cross-site scripting attacks.

CVE-2002-1131 squirrelmail vulnerability CVSS: 7.5 04 Oct 2002, 04:00 UTC

Cross-site scripting vulnerabilities in SquirrelMail 1.2.7 and earlier allows remote attackers to execute script as other web users via (1) addressbook.php, (2) options.php, (3) search.php, or (4) help.php.

CVE-2002-1132 squirrelmail vulnerability CVSS: 5.0 04 Oct 2002, 04:00 UTC

SquirrelMail 1.2.7 and earlier allows remote attackers to determine the absolute pathname of the options.php script via a malformed optpage file argument, which generates an error message when the file cannot be included in the script.

CVE-2002-0516 squirrelmail vulnerability CVSS: 10.0 12 Aug 2002, 04:00 UTC

SquirrelMail 1.2.5 and earlier allows authenticated SquirrelMail users to execute arbitrary commands by modifying the THEME variable in a cookie.

CVE-2001-1159 squirrelmail vulnerability CVSS: 7.5 02 Jul 2001, 04:00 UTC

load_prefs.php and supporting include files in SquirrelMail 1.0.4 and earlier do not properly initialize certain PHP variables, which allows remote attackers to (1) view sensitive files via the config_php and data_dir options, and (2) execute arbitrary code by using options_order.php to upload a message that could be interpreted as PHP.