Executive Summary

Informations
Name CVE-2005-2724 First vendor Publication 2005-08-30
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cross-site scripting (XSS) vulnerability in SqWebMail 5.0.4 allows remote attackers to inject arbitrary web script or HTML via a file attachment that is processed by the Display feature. NOTE: the severity of this issue has been disputed by the developer.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2724

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 14

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 793-1 (courier)
File : nvt/deb_793_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
18948 SqWebMail Attached File Arbitrary Script Insertion

SqWebMail contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate file content when displaying an attachment. This may allow a user to create a specially crafted attachment that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

Nessus® Vulnerability Scanner

Date Description
2006-01-15 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-201-1.nasl - Type : ACT_GATHER_INFO
2005-09-06 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-793.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://marc.info/?l=bugtraq&m=112490698219531&w=2
http://marc.info/?l=courier-users&m=112488135424849&w=2
http://secunia.com/advisories/16539/
http://secunia.com/advisories/17156
http://secunia.com/secunia_research/2005-35/advisory/
http://www.debian.org/security/2005/dsa-793
http://www.securityfocus.com/bid/14650
http://www.ubuntu.com/usn/usn-201-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/21997
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2024-11-28 23:21:56
  • Multiple Updates
2024-11-28 12:07:22
  • Multiple Updates
2021-05-04 12:03:09
  • Multiple Updates
2021-04-22 01:03:24
  • Multiple Updates
2020-05-23 00:16:47
  • Multiple Updates
2017-07-11 12:01:59
  • Multiple Updates
2016-10-18 12:01:46
  • Multiple Updates
2016-04-26 13:46:04
  • Multiple Updates
2014-02-17 10:32:37
  • Multiple Updates
2013-05-11 11:30:44
  • Multiple Updates