Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-2095

Опубликовано: 13 июл. 2005
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 4.3

Описание

options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which allows remote attackers to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files.

РелизСтатусПримечание
dapper

released

1.4.6-1ubuntu0.1
devel

released

1.4.10a-2
edgy

released

1.4.8-1ubuntu0.1
feisty

released

1.4.9a-1ubuntu0.1
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 93%
0.09659
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
около 20 лет назад

options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which allows remote attackers to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files.

nvd
около 20 лет назад

options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which allows remote attackers to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files.

debian
около 20 лет назад

options_identities.php in SquirrelMail 1.4.4 and earlier uses the extr ...

github
больше 3 лет назад

options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which allows remote attackers to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files.

EPSS

Процентиль: 93%
0.09659
Низкий

4.3 Medium

CVSS2