Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer.
https://rhn.redhat.com/errata/RHSA-2007-0358.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11712
https://issues.rpath.com/browse/RPL-1353
http://www.vupen.com/english/advisories/2007/2732
http://www.vupen.com/english/advisories/2007/1748
http://www.squirrelmail.org/security/issue/2007-05-09
http://www.securitytracker.com/id?1018033
http://www.securityfocus.com/bid/25159
http://www.securityfocus.com/bid/23910
http://www.novell.com/linux/security/advisories/2007_13_sr.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:106
http://www.debian.org/security/2007/dsa-1290
http://secunia.com/advisories/26235
http://secunia.com/advisories/25787
http://secunia.com/advisories/25690
http://secunia.com/advisories/25320
http://secunia.com/advisories/25236
http://secunia.com/advisories/25200
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
http://jvndb.jvn.jp/ja/contents/2007/JVNDB-2007-000398.html