Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-96wg-f4w5-jcvj

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php.

compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php.

EPSS

Процентиль: 64%
0.00468
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php.

CVSS3: 6.3
redhat
больше 5 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php.

CVSS3: 9.8
nvd
больше 5 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php.

CVSS3: 9.8
debian
больше 5 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtoda ...

EPSS

Процентиль: 64%
0.00468
Низкий