Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) "/*" and "*/" comments, or (2) a newline in a "url" specifier, which is processed by certain web browsers including Internet Explorer.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2006-02-23 16:02
Updated : 2017-10-10 18:30
NVD link : CVE-2006-0195
Mitre link : CVE-2006-0195
JSON object : View
CWE
Products Affected
squirrelmail
- squirrelmail