cve-2004-0519
Vulnerability from cvelistv5
Published
2004-06-03 04:00
Modified
2024-08-08 00:17
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.ascPatch
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000858
cve@mitre.orghttp://marc.info/?l=bugtraq&m=108334862800260
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2004-240.htmlPatch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/11531Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/11686Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/11870Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/12289Patch
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200405-16.xmlVendor Advisory
cve@mitre.orghttp://www.debian.org/security/2004/dsa-535Patch, Vendor Advisory
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_19_sr.htmlVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/advisories/6827Patch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/361857
cve@mitre.orghttp://www.securityfocus.com/bid/10246Exploit, Patch
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=1733Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/16025
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1006
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10274
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.ascPatch
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000858
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=108334862800260
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2004-240.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11531Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11686Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11870Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/12289Patch
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200405-16.xmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-535Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_19_sr.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/6827Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/361857
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/10246Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=1733Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/16025
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1006
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10274
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:17:15.176Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "12289",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/12289"
          },
          {
            "name": "squirrel-composephp-xss(16025)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16025"
          },
          {
            "name": "20040430 Re: SquirrelMail Cross Scripting Attacks....",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/361857"
          },
          {
            "name": "SUSE-SR:2005:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
          },
          {
            "name": "oval:org.mitre.oval:def:1006",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1006"
          },
          {
            "name": "FEDORA-2004-160",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/advisories/6827"
          },
          {
            "name": "11531",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11531"
          },
          {
            "name": "11686",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11686"
          },
          {
            "name": "11870",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11870"
          },
          {
            "name": "DSA-535",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2004/dsa-535"
          },
          {
            "name": "RHSA-2004:240",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2004-240.html"
          },
          {
            "name": "FEDORA-2004-1733",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1733"
          },
          {
            "name": "GLSA-200405-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200405-16.xml"
          },
          {
            "name": "oval:org.mitre.oval:def:10274",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10274"
          },
          {
            "name": "20040429 SquirrelMail Cross Scripting Attacks....",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108334862800260"
          },
          {
            "name": "20040604-01-U",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc"
          },
          {
            "name": "CLA-2004:858",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000858"
          },
          {
            "name": "10246",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10246"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-04-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "12289",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/12289"
        },
        {
          "name": "squirrel-composephp-xss(16025)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16025"
        },
        {
          "name": "20040430 Re: SquirrelMail Cross Scripting Attacks....",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/361857"
        },
        {
          "name": "SUSE-SR:2005:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
        },
        {
          "name": "oval:org.mitre.oval:def:1006",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1006"
        },
        {
          "name": "FEDORA-2004-160",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.securityfocus.com/advisories/6827"
        },
        {
          "name": "11531",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11531"
        },
        {
          "name": "11686",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11686"
        },
        {
          "name": "11870",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11870"
        },
        {
          "name": "DSA-535",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2004/dsa-535"
        },
        {
          "name": "RHSA-2004:240",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2004-240.html"
        },
        {
          "name": "FEDORA-2004-1733",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1733"
        },
        {
          "name": "GLSA-200405-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200405-16.xml"
        },
        {
          "name": "oval:org.mitre.oval:def:10274",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10274"
        },
        {
          "name": "20040429 SquirrelMail Cross Scripting Attacks....",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=108334862800260"
        },
        {
          "name": "20040604-01-U",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc"
        },
        {
          "name": "CLA-2004:858",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000858"
        },
        {
          "name": "10246",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10246"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0519",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "12289",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/12289"
            },
            {
              "name": "squirrel-composephp-xss(16025)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16025"
            },
            {
              "name": "20040430 Re: SquirrelMail Cross Scripting Attacks....",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/361857"
            },
            {
              "name": "SUSE-SR:2005:019",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
            },
            {
              "name": "oval:org.mitre.oval:def:1006",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1006"
            },
            {
              "name": "FEDORA-2004-160",
              "refsource": "FEDORA",
              "url": "http://www.securityfocus.com/advisories/6827"
            },
            {
              "name": "11531",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11531"
            },
            {
              "name": "11686",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11686"
            },
            {
              "name": "11870",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11870"
            },
            {
              "name": "DSA-535",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2004/dsa-535"
            },
            {
              "name": "RHSA-2004:240",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2004-240.html"
            },
            {
              "name": "FEDORA-2004-1733",
              "refsource": "FEDORA",
              "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1733"
            },
            {
              "name": "GLSA-200405-16",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200405-16.xml"
            },
            {
              "name": "oval:org.mitre.oval:def:10274",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10274"
            },
            {
              "name": "20040429 SquirrelMail Cross Scripting Attacks....",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=108334862800260"
            },
            {
              "name": "20040604-01-U",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc"
            },
            {
              "name": "CLA-2004:858",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000858"
            },
            {
              "name": "10246",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10246"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0519",
    "datePublished": "2004-06-03T04:00:00",
    "dateReserved": "2004-06-02T00:00:00",
    "dateUpdated": "2024-08-08T00:17:15.176Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29DC217F-C257-4A3C-9CBD-08010C30BEC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67E9817E-FF56-4FD0-B6C7-F4EEB25AD0CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EBF40C5-6272-427C-97A1-3CE3B1D47B12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A55A98B3-34ED-4A90-BB78-50CB56B1B51F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC5143ED-D4C5-4830-9C96-0B54D03679CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B765AEC-09E9-456C-8B57-09927E55D119\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AAFC3B0-DCE3-4190-B279-E095C666FA34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9291A565-0BD6-4B5E-B45F-9DE65AB8159D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6F53A84-FC66-4963-A728-7285F63D4761\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69A941FF-423E-49C5-AE1F-FE7ED016CA3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B34FDB1D-881B-4343-A76E-F23B93A0469A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E4DCB20-2A7F-4EE4-BAFA-AD74CD4456AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"052914F8-B52C-4AB4-8F85-68D788B588C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"617C554F-8E7D-4F8A-AF63-C193934C8215\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15F11950-A2E4-4F57-BF87-57788B841A21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"026730B8-3919-4100-8607-C640ADBDD662\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AD31177-05BB-4623-AED7-765DB7E44E47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20247A22-9AB9-4BCE-BF28-350B52FBC62D\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.\"}, {\"lang\": \"es\", \"value\": \"Multiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en SquirrelMail 1.4.2 permiten a atacantes remotos ejecutar script de su elecci\\u00f3n como otro usuario y posiblemente robar informaci\\u00f3n de autenticaci\\u00f3n mediante m\\u00faltiples vectores de ataque, incluyendo el par\\u00e1metro mailbox en compose.php.\"}]",
      "id": "CVE-2004-0519",
      "lastModified": "2024-11-20T23:48:46.290",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}",
      "published": "2004-08-18T04:00:00.000",
      "references": "[{\"url\": \"ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000858\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=108334862800260\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2004-240.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/11531\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/11686\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/11870\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/12289\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200405-16.xml\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2004/dsa-535\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.novell.com/linux/security/advisories/2005_19_sr.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/advisories/6827\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/361857\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/10246\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://bugzilla.fedora.us/show_bug.cgi?id=1733\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/16025\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1006\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10274\", \"source\": \"cve@mitre.org\"}, {\"url\": \"ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000858\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=108334862800260\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2004-240.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/11531\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/11686\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/11870\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/12289\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200405-16.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2004/dsa-535\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.novell.com/linux/security/advisories/2005_19_sr.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/advisories/6827\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/361857\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/10246\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://bugzilla.fedora.us/show_bug.cgi?id=1733\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/16025\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1006\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10274\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2004-0519\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2004-08-18T04:00:00.000\",\"lastModified\":\"2024-11-20T23:48:46.290\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.\"},{\"lang\":\"es\",\"value\":\"Multiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en SquirrelMail 1.4.2 permiten a atacantes remotos ejecutar script de su elecci\u00f3n como otro usuario y posiblemente robar informaci\u00f3n de autenticaci\u00f3n mediante m\u00faltiples vectores de ataque, incluyendo el par\u00e1metro mailbox en compose.php.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29DC217F-C257-4A3C-9CBD-08010C30BEC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E9817E-FF56-4FD0-B6C7-F4EEB25AD0CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EBF40C5-6272-427C-97A1-3CE3B1D47B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A55A98B3-34ED-4A90-BB78-50CB56B1B51F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC5143ED-D4C5-4830-9C96-0B54D03679CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B765AEC-09E9-456C-8B57-09927E55D119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AAFC3B0-DCE3-4190-B279-E095C666FA34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9291A565-0BD6-4B5E-B45F-9DE65AB8159D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F53A84-FC66-4963-A728-7285F63D4761\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69A941FF-423E-49C5-AE1F-FE7ED016CA3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B34FDB1D-881B-4343-A76E-F23B93A0469A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E4DCB20-2A7F-4EE4-BAFA-AD74CD4456AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"052914F8-B52C-4AB4-8F85-68D788B588C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"617C554F-8E7D-4F8A-AF63-C193934C8215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15F11950-A2E4-4F57-BF87-57788B841A21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026730B8-3919-4100-8607-C640ADBDD662\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AD31177-05BB-4623-AED7-765DB7E44E47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20247A22-9AB9-4BCE-BF28-350B52FBC62D\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000858\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108334862800260\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2004-240.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/11531\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/11686\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/11870\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/12289\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200405-16.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2004/dsa-535\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_19_sr.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/advisories/6827\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/361857\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/10246\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://bugzilla.fedora.us/show_bug.cgi?id=1733\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/16025\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1006\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10274\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000858\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108334862800260\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2004-240.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/11531\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/11686\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/11870\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/12289\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200405-16.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2004/dsa-535\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_19_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/advisories/6827\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/361857\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/10246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://bugzilla.fedora.us/show_bug.cgi?id=1733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/16025\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10274\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.