Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-1637

Опубликовано: 20 мая 2010
Источник: redhat
CVSS2: 3.5

Описание

The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.

Отчет

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 3squirrelmailWill not fix
Red Hat Enterprise Linux 4squirrelmailFixedRHSA-2012:010308.02.2012
Red Hat Enterprise Linux 5squirrelmailFixedRHSA-2012:010308.02.2012

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=606459SquirrelMail: Mail Fetch plugin -- port-scans via non-standard POP3 server ports

3.5 Low

CVSS2

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 15 лет назад

The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.

CVSS3: 6.5
nvd
больше 15 лет назад

The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.

CVSS3: 6.5
debian
больше 15 лет назад

The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote ...

CVSS3: 6.5
github
больше 3 лет назад

The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.

oracle-oval
почти 14 лет назад

ELSA-2012-0103: squirrelmail security update (MODERATE)

3.5 Low

CVSS2