Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer.
docs.info.apple.com/article.html?artnum=306172
jvn.jp/en/jp/JVN09157962/index.html
jvndb.jvn.jp/ja/contents/2007/JVNDB-2007-000398.html
lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
osvdb.org/35887
osvdb.org/35888
secunia.com/advisories/25200
secunia.com/advisories/25236
secunia.com/advisories/25320
secunia.com/advisories/25690
secunia.com/advisories/25787
secunia.com/advisories/26235
www.debian.org/security/2007/dsa-1290
www.mandriva.com/security/advisories?name=MDKSA-2007:106
www.novell.com/linux/security/advisories/2007_13_sr.html
www.securityfocus.com/bid/23910
www.securityfocus.com/bid/25159
www.securitytracker.com/id?1018033
www.squirrelmail.org/security/issue/2007-05-09
www.vupen.com/english/advisories/2007/1748
www.vupen.com/english/advisories/2007/2732
issues.rpath.com/browse/RPL-1353
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11712
rhn.redhat.com/errata/RHSA-2007-0358.html