| Donations News
 About
 Support
 Security
 Screen shots
 Download
 Plugins
 Documentation
 Sponsors
 Bounties
 
 
 
 
   
 Junk Email Filter
 
 
 
 
 
 
 
 | SecurityPossible XSS through right_frame parameter in webmail.php
	Date:2006-02-01Description:The right_frame parameter in webmail.php was not properly sanitized, and could allow for an attacker to replace the right frame of a tricked user with content from another host within the SquirrelMail interface. Some of the attack vectors are only possible with Internet Explorer.Affected Versions:<= 1.4.5Register Globals:Register_globals does not have to be on for this issue.	CVE ID(s):CVE-2006-0188Patch:view patchCredits:Thanks to Martijn Brinkers and Ben Maurer who both found out about this issue separately.This page last updated:2007-07-03 12:59:40 |