Vulnerabilites related to horde - application_framework
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Horde 3.0.4 before 3.0.4-RC2 allows remote attackers to inject arbitrary web script or HTML via the parent frame title.
Impacted products
Vendor Product Version
horde application_framework 3.0.4_rc1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.4_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAEAAF02-1B61-421A-887C-107B7234262B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Horde 3.0.4 before 3.0.4-RC2 allows remote attackers to inject arbitrary web script or HTML via the parent frame title."
    }
  ],
  "id": "CVE-2005-0961",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.49\u0026r2=1.515.2.93\u0026ty=h"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2005/000176.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14730"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2005_16_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.49\u0026r2=1.515.2.93\u0026ty=h"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2005/000176.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14730"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_16_sr.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the "help window" (help.php) in Horde Application Framework 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) module, (2) topic, or (3) module parameters.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3532FD-0E85-4EDC-A3A7-76F8BA915B6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D39B3B91-16B9-4B5B-AB4E-9BA568CC1E5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACBE1BB3-EAB6-4388-95C2-0513B0D6A327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B402F70-BAAD-44D6-B414-F615F973DC9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F2DA0C-C8A3-429C-83C7-B2983D3FF148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7535FE38-0FBD-48CC-9FDE-C7CA2C18CA24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A14A770E-60BC-4698-8BFC-5FB745A52279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.4_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "23A0AA21-C88D-45C4-9D95-414B2278E601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AE35AF8-CA38-42FB-BA32-057BCA2CA2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C91CA767-F49D-48E9-80CE-78B65DD14DF2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the \"help window\" (help.php) in Horde Application Framework 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) module, (2) topic, or (3) module parameters."
    }
  ],
  "id": "CVE-2004-2741",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://cvs.horde.org/diff.php/horde/templates/help/index.inc?r1=1.9.2.4\u0026r2=1.9.2.5\u0026ty=u"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2004/000107.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/12992"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1011959"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/11164"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/11546"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17881"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cvs.horde.org/diff.php/horde/templates/help/index.inc?r1=1.9.2.4\u0026r2=1.9.2.5\u0026ty=u"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2004/000107.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/12992"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1011959"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/11164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/11546"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17881"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-08-21 20:04
Modified
2025-04-03 01:03
Severity ?
Summary
index.php in Horde Application Framework before 3.1.2 allows remote attackers to include web pages from other sites, which could be useful for phishing attacks, via a URL in the url parameter, aka "cross-site referencing." NOTE: some sources have referred to this issue as XSS, but it is different than classic XSS.
References



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC8BBFC-263E-4735-847D-5544D18922E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB1F389-5D64-4B8C-B207-7D23F0C12DBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE8892DF-11F2-4991-97E8-D561DEAC4F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B46B6F5-055E-44EB-BB78-503811C0E57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "66B197B0-F3B7-40D6-9872-C1A94622C242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.4_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAEAAF02-1B61-421A-887C-107B7234262B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.4_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "01557585-CE92-49FB-B9BB-AAAE7D355BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2698E2D7-09BF-4490-B362-4245CD3087D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B40A46-117D-4D85-8CC8-27236A3280C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEFBECFF-D1A4-465D-B59F-E70246DE4BE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "57ABD1BD-6676-4B54-9F3E-FACF1346794F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "79EC6167-5D16-4236-8EBC-412EE1784802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4F6A2A-05B6-42EA-8F61-D0AB610A6757",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "index.php in Horde Application Framework before 3.1.2 allows remote attackers to include web pages from other sites, which could be useful for phishing attacks, via a URL in the url parameter, aka \"cross-site referencing.\" NOTE: some sources have referred to this issue as XSS, but it is different than classic XSS."
    },
    {
      "lang": "es",
      "value": "index.php en Horde Application Framework anerior a 3.1.2 permite a atacantes remotos incluir p\u00e1ginas web de otros sitios, lo que podr\u00eda ser \u00fatil para ataques de phishing, mediante una URL en el par\u00e1metro url, tambi\u00e9n conocido como \"referencia en sitios cruzados\" (cross-site referencing). NOTA: algunas fuetnes se han referido a este problema como XSS, pero es diferente del cl\u00e1sico XSS."
    }
  ],
  "id": "CVE-2006-4256",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-21T20:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.horde.org/archives/announce/2006/000292.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21500"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27565"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/1422"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016713"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1406"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2456"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/443360/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3309"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28411"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.horde.org/archives/announce/2006/000292.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21500"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/1422"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016713"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2456"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/443360/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3309"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28411"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-03-29 22:02
Modified
2025-04-03 01:03
Severity ?
Summary
Eval injection vulnerability in Horde Application Framework versions 3.0 before 3.0.10 and 3.1 before 3.1.1 allows remote attackers to execute arbitrary code via the help viewer.
References
cve@mitre.orghttp://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php&r1=2.85&r2=2.86
cve@mitre.orghttp://lists.horde.org/archives/announce/2006/000271.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2006/000272.html
cve@mitre.orghttp://secunia.com/advisories/19485Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19504Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19528Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19619Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19692Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1015841Patch
cve@mitre.orghttp://www.attrition.org/pipermail/vim/2006-March/000671.html
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1033
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1034
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200604-02.xml
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_07_sr.html
cve@mitre.orghttp://www.securityfocus.com/bid/17292Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1154Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/25516
af854a3a-2127-422b-91ae-364da2661108http://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php&r1=2.85&r2=2.86
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2006/000271.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2006/000272.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19485Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19504Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19528Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19619Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19692Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015841Patch
af854a3a-2127-422b-91ae-364da2661108http://www.attrition.org/pipermail/vim/2006-March/000671.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1033
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1034
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200604-02.xml
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_07_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/17292Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1154Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/25516



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC8BBFC-263E-4735-847D-5544D18922E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB1F389-5D64-4B8C-B207-7D23F0C12DBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE8892DF-11F2-4991-97E8-D561DEAC4F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B46B6F5-055E-44EB-BB78-503811C0E57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "66B197B0-F3B7-40D6-9872-C1A94622C242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.4_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAEAAF02-1B61-421A-887C-107B7234262B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.4_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "01557585-CE92-49FB-B9BB-AAAE7D355BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2698E2D7-09BF-4490-B362-4245CD3087D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B40A46-117D-4D85-8CC8-27236A3280C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEFBECFF-D1A4-465D-B59F-E70246DE4BE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "57ABD1BD-6676-4B54-9F3E-FACF1346794F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "79EC6167-5D16-4236-8EBC-412EE1784802",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eval injection vulnerability in Horde Application Framework versions 3.0 before 3.0.10 and 3.1 before 3.1.1 allows remote attackers to execute arbitrary code via the help viewer."
    }
  ],
  "id": "CVE-2006-1491",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-03-29T22:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php\u0026r1=2.85\u0026r2=2.86"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2006/000271.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.horde.org/archives/announce/2006/000272.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19485"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19504"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19528"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19619"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19692"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1015841"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.attrition.org/pipermail/vim/2006-March/000671.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1033"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1034"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200604-02.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_07_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/17292"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/1154"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25516"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php\u0026r1=2.85\u0026r2=2.86"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2006/000271.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.horde.org/archives/announce/2006/000272.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19485"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19504"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19528"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19692"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1015841"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.attrition.org/pipermail/vim/2006-March/000671.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1034"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200604-02.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_07_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/17292"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/1154"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25516"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-01-21 02:30
Modified
2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the XSS filter (framework/Text_Filter/Filter/xss.php) in Horde Application Framework 3.2.2 and 3.3, when Internet Explorer is being used, allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to style attributes.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "89477FCC-C925-418A-A3FF-F5B02736600C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDE2B06C-EDBD-4FA1-90AA-148E39EF5AE4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8682FAF3-98E3-485C-89CB-C0358C4E2AB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the XSS filter (framework/Text_Filter/Filter/xss.php) in Horde Application Framework 3.2.2 and 3.3, when Internet Explorer is being used, allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to style attributes."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el filtro XSS(framework/Text_Filter/Filter/xss.php) en Horde Application Framework v3.2.2 y v3.3, cunado Internet Explorer est\u00e1 siendo utilizado, permite a atacantes remotos inyectar secuencias de comando web o HTML a trav\u00e9s de vectores desconocidos relacionados con atributos \"style\"."
    }
  ],
  "id": "CVE-2008-5917",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-01-21T02:30:00.233",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://cvs.horde.org/diff.php/framework/Text_Filter/Filter/xss.php?r1=1.17\u0026r2=1.18"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000462.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000464.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/34418"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/34609"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://cvs.horde.org/diff.php/framework/Text_Filter/Filter/xss.php?r1=1.17\u0026r2=1.18"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000462.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000464.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34418"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34609"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-09-17 10:30
Modified
2025-04-09 00:30
Severity ?
Summary
The form library in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; reuses temporary filenames during the upload process which allows remote attackers, with privileges to write to the address book, to overwrite arbitrary files and execute PHP code via crafted Horde_Form_Type_image form field elements.
References
cve@mitre.orghttp://marc.info/?l=horde-announce&m=125291625030436&w=2Patch
cve@mitre.orghttp://marc.info/?l=horde-announce&m=125292088004087&w=2Patch
cve@mitre.orghttp://marc.info/?l=horde-announce&m=125292314007049&w=2Patch
cve@mitre.orghttp://marc.info/?l=horde-announce&m=125292339907481&w=2Patch
cve@mitre.orghttp://marc.info/?l=horde-announce&m=125294558611682&w=2Patch
cve@mitre.orghttp://marc.info/?l=horde-announce&m=125295852706029&w=2Patch
cve@mitre.orghttp://secunia.com/advisories/36665Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/36882Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1897
cve@mitre.orghttp://www.osvdb.org/58107
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/53202
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=horde-announce&m=125291625030436&w=2Patch
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=horde-announce&m=125292088004087&w=2Patch
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=horde-announce&m=125292314007049&w=2Patch
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=horde-announce&m=125292339907481&w=2Patch
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=horde-announce&m=125294558611682&w=2Patch
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=horde-announce&m=125295852706029&w=2Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36665Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36882Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1897
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/58107
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/53202



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1F91CDA-B425-4DB2-89E4-12267B600D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A8BB743-A760-4C72-880C-759E54FB7CF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "89477FCC-C925-418A-A3FF-F5B02736600C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5862181-4CE7-452F-8877-41E099440188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E601FE-94F1-48AD-A0F2-42824A3A4FC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDE2B06C-EDBD-4FA1-90AA-148E39EF5AE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5CF33A8-C497-4C86-8C5D-7181597BEC53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B312DB-14BE-425C-9B07-0CBED6F39E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2CF2865-CA12-4C4C-9BEC-7A97E6AAB377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF389AE4-D2AD-4992-BFBD-68FB1CBEE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BBB036-494E-41D4-BD04-40906FAB5C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19CC5154-42C5-4877-9147-5DFD61BD5CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AAEBBF-1696-4EAC-8837-68A03C2D2F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F626876D-99FC-4DE0-BEE0-35874C4E25F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A849DD3E-882A-4621-BB6C-315A76677BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB711B5E-9011-4BA2-917A-DB8545705E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "50DC1068-F426-497F-A5A0-E032BC3816F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C5A176-8C72-40EA-85AC-F11B40FD53A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F24E43-491B-4AD1-B905-66F7FC6DA98D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BBB036-494E-41D4-BD04-40906FAB5C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "37B76B27-ADF0-4E88-B92C-304FB38A356E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "965F245A-879A-4DF0-ABC5-588E78C4CBBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "3DCB29F9-3875-4264-8117-5751FEDC3350",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "59FC250F-EF0B-4604-99A2-3EEB8B2DEB77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19CC5154-42C5-4877-9147-5DFD61BD5CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AAEBBF-1696-4EAC-8837-68A03C2D2F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F626876D-99FC-4DE0-BEE0-35874C4E25F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A849DD3E-882A-4621-BB6C-315A76677BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB711B5E-9011-4BA2-917A-DB8545705E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "50DC1068-F426-497F-A5A0-E032BC3816F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C5A176-8C72-40EA-85AC-F11B40FD53A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F24E43-491B-4AD1-B905-66F7FC6DA98D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F577A169-8354-4218-B3C6-04DA4BDF1E3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The form library in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; reuses temporary filenames during the upload process which allows remote attackers, with privileges to write to the address book, to overwrite arbitrary files and execute PHP code via crafted Horde_Form_Type_image form field elements."
    },
    {
      "lang": "es",
      "value": "La biblioteca de formularios en Horde Application Framework versi\u00f3n 3.2 anterior a 3.2.5 y versi\u00f3n 3.3 anterior a 3.3.5; Groupware versi\u00f3n 1.1 anterior a 1.1.6 y versi\u00f3n 1.2 anterior a 1.2.4; y Groupware Webmail Edition versi\u00f3n 1.1 anterior a 1.1.6 y versi\u00f3n 1.2 anterior a 1.2.4; reutiliza los nombres de archivo temporales durante el proceso de carga, lo que permite a los atacantes remotos, con privilegios para escribir en la libreta de direcciones, sobrescribir archivos arbitrarios y ejecutar c\u00f3digo PHP por medio de elementos de campo de formulario Horde_Form_Type_image creados."
    }
  ],
  "id": "CVE-2009-3236",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-09-17T10:30:01.360",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=125291625030436\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=125292088004087\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=125292314007049\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=125292339907481\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=125294558611682\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=125295852706029\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36665"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36882"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1897"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/58107"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53202"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=125291625030436\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=125292088004087\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=125292314007049\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=125292339907481\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=125294558611682\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=125295852706029\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36665"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1897"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/58107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53202"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-12-21 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) phpshell.php, (2) cmdshell.php, or (3) sqlshell.php in admin/, related to the PHP_SELF variable.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.htmlExploit
cve@mitre.orghttp://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559&r2=1.515.2.589&ty=h
cve@mitre.orghttp://lists.horde.org/archives/announce/2009/000529.htmlPatch
cve@mitre.orghttp://marc.info/?l=horde-announce&m=126100750018478&w=2
cve@mitre.orghttp://marc.info/?l=horde-announce&m=126101076422179&w=2Patch
cve@mitre.orghttp://secunia.com/advisories/37709Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/37823Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1023365
cve@mitre.orghttp://www.securityfocus.com/archive/1/508531/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/37351Exploit
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/3549Patch, Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/3572Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/54817
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559&r2=1.515.2.589&ty=h
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2009/000529.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=horde-announce&m=126100750018478&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=horde-announce&m=126101076422179&w=2Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37709Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37823Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1023365
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/508531/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/37351Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3549Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3572Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/54817
Impacted products
Vendor Product Version
horde application_framework *
horde application_framework 2.0
horde application_framework 2.1
horde application_framework 2.1.3
horde application_framework 2.2
horde application_framework 2.2.1
horde application_framework 2.2.3
horde application_framework 2.2.4
horde application_framework 2.2.4_rc1
horde application_framework 2.2.5
horde application_framework 2.2.6
horde application_framework 3.0
horde application_framework 3.0.1
horde application_framework 3.0.2
horde application_framework 3.0.3
horde application_framework 3.0.4
horde application_framework 3.0.6
horde application_framework 3.0.7
horde application_framework 3.0.8
horde application_framework 3.0.9
horde application_framework 3.1
horde application_framework 3.1.1
horde application_framework 3.2
horde application_framework 3.2.1
horde application_framework 3.2.2
horde application_framework 3.2.3
horde application_framework 3.2.4
horde application_framework 3.3
horde application_framework 3.3.1
horde application_framework 3.3.2
horde application_framework 3.3.3
horde application_framework 3.3.4
horde groupware *
horde groupware 1.0
horde groupware 1.0.1
horde groupware 1.0.2
horde groupware 1.0.3
horde groupware 1.0.4
horde groupware 1.0.5
horde groupware 1.1
horde groupware 1.1.1
horde groupware 1.1.2
horde groupware 1.1.3
horde groupware 1.1.4
horde groupware 1.1.5
horde groupware 1.2
horde groupware 1.2
horde groupware 1.2.1
horde groupware 1.2.2
horde groupware 1.2.3
horde groupware *
horde groupware 1.0
horde groupware 1.0
horde groupware 1.0
horde groupware 1.0.1
horde groupware 1.0.2
horde groupware 1.0.3
horde groupware 1.0.4
horde groupware 1.0.5
horde groupware 1.0.6
horde groupware 1.0.7
horde groupware 1.0.8
horde groupware 1.1
horde groupware 1.1
horde groupware 1.1
horde groupware 1.1
horde groupware 1.1
horde groupware 1.1.1
horde groupware 1.1.2
horde groupware 1.1.3
horde groupware 1.1.4
horde groupware 1.1.5
horde groupware 1.1.6
horde groupware 1.2
horde groupware 1.2
horde groupware 1.2.1
horde groupware 1.2.2
horde groupware 1.2.3
horde groupware 1.2.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:application_framework:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD5438E-7D99-4286-81F3-1A304E9A7BDA",
              "versionEndIncluding": "3.3.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3532FD-0E85-4EDC-A3A7-76F8BA915B6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D39B3B91-16B9-4B5B-AB4E-9BA568CC1E5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACBE1BB3-EAB6-4388-95C2-0513B0D6A327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B402F70-BAAD-44D6-B414-F615F973DC9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F2DA0C-C8A3-429C-83C7-B2983D3FF148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7535FE38-0FBD-48CC-9FDE-C7CA2C18CA24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A14A770E-60BC-4698-8BFC-5FB745A52279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.4_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "23A0AA21-C88D-45C4-9D95-414B2278E601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AE35AF8-CA38-42FB-BA32-057BCA2CA2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C91CA767-F49D-48E9-80CE-78B65DD14DF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC8BBFC-263E-4735-847D-5544D18922E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB1F389-5D64-4B8C-B207-7D23F0C12DBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE8892DF-11F2-4991-97E8-D561DEAC4F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B46B6F5-055E-44EB-BB78-503811C0E57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "66B197B0-F3B7-40D6-9872-C1A94622C242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2698E2D7-09BF-4490-B362-4245CD3087D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B40A46-117D-4D85-8CC8-27236A3280C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEFBECFF-D1A4-465D-B59F-E70246DE4BE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "57ABD1BD-6676-4B54-9F3E-FACF1346794F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "79EC6167-5D16-4236-8EBC-412EE1784802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4F6A2A-05B6-42EA-8F61-D0AB610A6757",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1F91CDA-B425-4DB2-89E4-12267B600D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A8BB743-A760-4C72-880C-759E54FB7CF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "89477FCC-C925-418A-A3FF-F5B02736600C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5862181-4CE7-452F-8877-41E099440188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E601FE-94F1-48AD-A0F2-42824A3A4FC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDE2B06C-EDBD-4FA1-90AA-148E39EF5AE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5CF33A8-C497-4C86-8C5D-7181597BEC53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B312DB-14BE-425C-9B07-0CBED6F39E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2CF2865-CA12-4C4C-9BEC-7A97E6AAB377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF389AE4-D2AD-4992-BFBD-68FB1CBEE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5611B7D8-8AEF-42A8-8132-39CE773A7C18",
              "versionEndIncluding": "1.2.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C2653B-7F0B-4628-9E77-44744BC05463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B574D428-0A3A-47CA-A926-5C936F83919A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59C23FB-E223-4EED-8F69-3CC1EE7DF148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "904EEFF0-CF66-43E6-BAA9-1A6FB4115CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3AB0176-9CB3-4D49-B644-2C413C9B6E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BBB036-494E-41D4-BD04-40906FAB5C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19CC5154-42C5-4877-9147-5DFD61BD5CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AAEBBF-1696-4EAC-8837-68A03C2D2F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F626876D-99FC-4DE0-BEE0-35874C4E25F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A849DD3E-882A-4621-BB6C-315A76677BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB711B5E-9011-4BA2-917A-DB8545705E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "50DC1068-F426-497F-A5A0-E032BC3816F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C5A176-8C72-40EA-85AC-F11B40FD53A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F24E43-491B-4AD1-B905-66F7FC6DA98D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5611B7D8-8AEF-42A8-8132-39CE773A7C18",
              "versionEndIncluding": "1.2.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C2653B-7F0B-4628-9E77-44744BC05463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E55009DF-EDF1-4FAE-88E7-1CF33BFFEBC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "980162BB-48B3-4921-987A-6D18C62965A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B574D428-0A3A-47CA-A926-5C936F83919A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59C23FB-E223-4EED-8F69-3CC1EE7DF148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "904EEFF0-CF66-43E6-BAA9-1A6FB4115CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3AB0176-9CB3-4D49-B644-2C413C9B6E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95E9B57-2DB0-4692-A7D1-180EC3687D1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7D8683-8DD4-4EB0-A28F-0C556304BB2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F68E5D5-7812-4FB2-ACF9-76180B038D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BBB036-494E-41D4-BD04-40906FAB5C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "37B76B27-ADF0-4E88-B92C-304FB38A356E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "965F245A-879A-4DF0-ABC5-588E78C4CBBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "3DCB29F9-3875-4264-8117-5751FEDC3350",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "59FC250F-EF0B-4604-99A2-3EEB8B2DEB77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19CC5154-42C5-4877-9147-5DFD61BD5CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AAEBBF-1696-4EAC-8837-68A03C2D2F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F626876D-99FC-4DE0-BEE0-35874C4E25F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A849DD3E-882A-4621-BB6C-315A76677BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF1A6AE-0748-476B-ACE2-DA43A9443B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB711B5E-9011-4BA2-917A-DB8545705E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "50DC1068-F426-497F-A5A0-E032BC3816F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C5A176-8C72-40EA-85AC-F11B40FD53A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F24E43-491B-4AD1-B905-66F7FC6DA98D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F577A169-8354-4218-B3C6-04DA4BDF1E3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) phpshell.php, (2) cmdshell.php, or (3) sqlshell.php in admin/, related to the PHP_SELF variable."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en el interfaz de administraci\u00f3n en Horde Application Framework versiones anteriores a v3.3.6, Horde Groupware versiones anteriores a v1.2.5, y Horde Groupware Webmail Edition versiones anteriores a v1.2.5 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante el PATH_INFO en (1) phpshell.php, (2) cmdshell.php, o (3) sqlshell.php en admin/, relacionado con la variable PHP_SELF."
    }
  ],
  "id": "CVE-2009-3701",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-12-21T16:30:00.233",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2009/000529.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37709"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37823"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1023365"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/508531/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/37351"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3549"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3572"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54817"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2009/000529.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37709"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1023365"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/508531/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/37351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3549"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3572"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54817"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-12-21 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Text_Filter/lib/Horde/Text/Filter/Xss.php in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 does not properly handle data: URIs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via data:text/html values for the HREF attribute of an A element in an HTML e-mail message. NOTE: the vendor states that the issue is caused by "an XSS vulnerability in Firefox browsers."
Impacted products
Vendor Product Version
horde application_framework *
horde application_framework 2.0
horde application_framework 2.1
horde application_framework 2.1.3
horde application_framework 2.2
horde application_framework 2.2.1
horde application_framework 2.2.3
horde application_framework 2.2.4
horde application_framework 2.2.4_rc1
horde application_framework 2.2.5
horde application_framework 2.2.6
horde application_framework 3.0
horde application_framework 3.0.1
horde application_framework 3.0.2
horde application_framework 3.0.3
horde application_framework 3.0.4
horde application_framework 3.0.6
horde application_framework 3.0.7
horde application_framework 3.0.8
horde application_framework 3.0.9
horde application_framework 3.1
horde application_framework 3.1.1
horde application_framework 3.2
horde application_framework 3.2.1
horde application_framework 3.2.2
horde application_framework 3.2.3
horde application_framework 3.2.4
horde application_framework 3.3
horde application_framework 3.3.1
horde application_framework 3.3.2
horde application_framework 3.3.3
horde application_framework 3.3.4
horde groupware *
horde groupware 1.0
horde groupware 1.0.1
horde groupware 1.0.2
horde groupware 1.0.3
horde groupware 1.0.4
horde groupware 1.0.5
horde groupware 1.1
horde groupware 1.1.1
horde groupware 1.1.2
horde groupware 1.1.3
horde groupware 1.1.4
horde groupware 1.1.5
horde groupware 1.2
horde groupware 1.2
horde groupware 1.2.1
horde groupware 1.2.2
horde groupware 1.2.3
horde groupware *
horde groupware 1.0
horde groupware 1.0
horde groupware 1.0
horde groupware 1.0.1
horde groupware 1.0.2
horde groupware 1.0.3
horde groupware 1.0.4
horde groupware 1.0.5
horde groupware 1.0.6
horde groupware 1.0.7
horde groupware 1.0.8
horde groupware 1.1
horde groupware 1.1
horde groupware 1.1
horde groupware 1.1
horde groupware 1.1
horde groupware 1.1.1
horde groupware 1.1.2
horde groupware 1.1.3
horde groupware 1.1.4
horde groupware 1.1.5
horde groupware 1.1.6
horde groupware 1.2
horde groupware 1.2
horde groupware 1.2.1
horde groupware 1.2.2
horde groupware 1.2.3
horde groupware 1.2.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:application_framework:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD5438E-7D99-4286-81F3-1A304E9A7BDA",
              "versionEndIncluding": "3.3.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3532FD-0E85-4EDC-A3A7-76F8BA915B6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D39B3B91-16B9-4B5B-AB4E-9BA568CC1E5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACBE1BB3-EAB6-4388-95C2-0513B0D6A327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B402F70-BAAD-44D6-B414-F615F973DC9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F2DA0C-C8A3-429C-83C7-B2983D3FF148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7535FE38-0FBD-48CC-9FDE-C7CA2C18CA24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A14A770E-60BC-4698-8BFC-5FB745A52279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.4_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "23A0AA21-C88D-45C4-9D95-414B2278E601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AE35AF8-CA38-42FB-BA32-057BCA2CA2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C91CA767-F49D-48E9-80CE-78B65DD14DF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC8BBFC-263E-4735-847D-5544D18922E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB1F389-5D64-4B8C-B207-7D23F0C12DBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE8892DF-11F2-4991-97E8-D561DEAC4F5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B46B6F5-055E-44EB-BB78-503811C0E57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "66B197B0-F3B7-40D6-9872-C1A94622C242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2698E2D7-09BF-4490-B362-4245CD3087D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B40A46-117D-4D85-8CC8-27236A3280C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEFBECFF-D1A4-465D-B59F-E70246DE4BE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "57ABD1BD-6676-4B54-9F3E-FACF1346794F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "79EC6167-5D16-4236-8EBC-412EE1784802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4F6A2A-05B6-42EA-8F61-D0AB610A6757",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1F91CDA-B425-4DB2-89E4-12267B600D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A8BB743-A760-4C72-880C-759E54FB7CF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "89477FCC-C925-418A-A3FF-F5B02736600C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5862181-4CE7-452F-8877-41E099440188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3E601FE-94F1-48AD-A0F2-42824A3A4FC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDE2B06C-EDBD-4FA1-90AA-148E39EF5AE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5CF33A8-C497-4C86-8C5D-7181597BEC53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B312DB-14BE-425C-9B07-0CBED6F39E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2CF2865-CA12-4C4C-9BEC-7A97E6AAB377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:application_framework:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF389AE4-D2AD-4992-BFBD-68FB1CBEE50B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5611B7D8-8AEF-42A8-8132-39CE773A7C18",
              "versionEndIncluding": "1.2.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C2653B-7F0B-4628-9E77-44744BC05463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B574D428-0A3A-47CA-A926-5C936F83919A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59C23FB-E223-4EED-8F69-3CC1EE7DF148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "904EEFF0-CF66-43E6-BAA9-1A6FB4115CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3AB0176-9CB3-4D49-B644-2C413C9B6E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BBB036-494E-41D4-BD04-40906FAB5C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19CC5154-42C5-4877-9147-5DFD61BD5CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AAEBBF-1696-4EAC-8837-68A03C2D2F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F626876D-99FC-4DE0-BEE0-35874C4E25F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A849DD3E-882A-4621-BB6C-315A76677BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB711B5E-9011-4BA2-917A-DB8545705E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "50DC1068-F426-497F-A5A0-E032BC3816F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C5A176-8C72-40EA-85AC-F11B40FD53A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F24E43-491B-4AD1-B905-66F7FC6DA98D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5611B7D8-8AEF-42A8-8132-39CE773A7C18",
              "versionEndIncluding": "1.2.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C2653B-7F0B-4628-9E77-44744BC05463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E55009DF-EDF1-4FAE-88E7-1CF33BFFEBC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "980162BB-48B3-4921-987A-6D18C62965A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B574D428-0A3A-47CA-A926-5C936F83919A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59C23FB-E223-4EED-8F69-3CC1EE7DF148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "904EEFF0-CF66-43E6-BAA9-1A6FB4115CB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3AB0176-9CB3-4D49-B644-2C413C9B6E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95E9B57-2DB0-4692-A7D1-180EC3687D1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7D8683-8DD4-4EB0-A28F-0C556304BB2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F68E5D5-7812-4FB2-ACF9-76180B038D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BBB036-494E-41D4-BD04-40906FAB5C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "37B76B27-ADF0-4E88-B92C-304FB38A356E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "965F245A-879A-4DF0-ABC5-588E78C4CBBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "3DCB29F9-3875-4264-8117-5751FEDC3350",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "59FC250F-EF0B-4604-99A2-3EEB8B2DEB77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19CC5154-42C5-4877-9147-5DFD61BD5CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AAEBBF-1696-4EAC-8837-68A03C2D2F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F626876D-99FC-4DE0-BEE0-35874C4E25F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A849DD3E-882A-4621-BB6C-315A76677BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF1A6AE-0748-476B-ACE2-DA43A9443B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB711B5E-9011-4BA2-917A-DB8545705E23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "50DC1068-F426-497F-A5A0-E032BC3816F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C5A176-8C72-40EA-85AC-F11B40FD53A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F24E43-491B-4AD1-B905-66F7FC6DA98D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F577A169-8354-4218-B3C6-04DA4BDF1E3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Text_Filter/lib/Horde/Text/Filter/Xss.php in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 does not properly handle data: URIs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via data:text/html values for the HREF attribute of an A element in an HTML e-mail message.  NOTE: the vendor states that the issue is caused by \"an XSS vulnerability in Firefox browsers.\""
    },
    {
      "lang": "es",
      "value": "Text_Filter/lib/Horde/Text/Filter/Xss.php en Horde Application Framework versiones anteriores a v3.3.6, Horde Groupware versiones anteriores a v1.2.5, y Horde Groupware Webmail Edition versiones anteriores a v1.2.5 no maneja adecuadamente data: URIs, permitiendo a atacantes remotos dirigir ataques de secuencias de comandos en sitios cruzados (XSS) mediante valores data:text/html para el atributo HREF de un elemento A en un mensaje HTML de correo electr\u00f3nico. NOTA: el proveedor mantiene que el incidente est\u00e1 causado por \"una vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el navegador Firefox\"."
    }
  ],
  "id": "CVE-2009-4363",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-12-21T16:30:00.483",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.horde.org/ticket/8715"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.horde.org/view.php?actionID=view_file\u0026type=patch\u0026file=0002-Bug-8715-Fix-XSS-vulnerability%5B1%5D.patch\u0026ticket=8715"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2009/000529.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1023365"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.horde.org/ticket/8715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.horde.org/view.php?actionID=view_file\u0026type=patch\u0026file=0002-Bug-8715-Fix-XSS-vulnerability%5B1%5D.patch\u0026ticket=8715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2009/000529.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1023365"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2009-3236 (GCVE-0-2009-3236)
Vulnerability from cvelistv5
Published
2009-09-17 10:00
Modified
2024-08-07 06:22
Severity ?
CWE
  • n/a
Summary
The form library in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; reuses temporary filenames during the upload process which allows remote attackers, with privileges to write to the address book, to overwrite arbitrary files and execute PHP code via crafted Horde_Form_Type_image form field elements.
References
http://www.osvdb.org/58107vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/36882third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=horde-announce&m=125294558611682&w=2mailing-list, x_refsource_MLIST
http://secunia.com/advisories/36665third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1897vendor-advisory, x_refsource_DEBIAN
http://marc.info/?l=horde-announce&m=125292314007049&w=2mailing-list, x_refsource_MLIST
http://marc.info/?l=horde-announce&m=125295852706029&w=2mailing-list, x_refsource_MLIST
http://marc.info/?l=horde-announce&m=125291625030436&w=2mailing-list, x_refsource_MLIST
http://marc.info/?l=horde-announce&m=125292339907481&w=2mailing-list, x_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilities/53202vdb-entry, x_refsource_XF
http://marc.info/?l=horde-announce&m=125292088004087&w=2mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:22:23.949Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "58107",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/58107"
          },
          {
            "name": "36882",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36882"
          },
          {
            "name": "[horde-announce] 20090914 [announce] Horde Groupware 1.2.4 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=horde-announce\u0026m=125294558611682\u0026w=2"
          },
          {
            "name": "36665",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36665"
          },
          {
            "name": "DSA-1897",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1897"
          },
          {
            "name": "[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.1.6 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=horde-announce\u0026m=125292314007049\u0026w=2"
          },
          {
            "name": "[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.2.4 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=horde-announce\u0026m=125295852706029\u0026w=2"
          },
          {
            "name": "[horde-announce] 20090914 [announce] [SECURITY] Horde 3.2.5 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=horde-announce\u0026m=125291625030436\u0026w=2"
          },
          {
            "name": "[horde-announce] 20090914 [announce] [SECURITY] Horde 3.3.5 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=horde-announce\u0026m=125292339907481\u0026w=2"
          },
          {
            "name": "horde-application-form-file-overwrite(53202)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53202"
          },
          {
            "name": "[horde-announce] 20090914 [announce] Horde Groupware 1.1.6 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=horde-announce\u0026m=125292088004087\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-09-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The form library in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; reuses temporary filenames during the upload process which allows remote attackers, with privileges to write to the address book, to overwrite arbitrary files and execute PHP code via crafted Horde_Form_Type_image form field elements."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "58107",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/58107"
        },
        {
          "name": "36882",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36882"
        },
        {
          "name": "[horde-announce] 20090914 [announce] Horde Groupware 1.2.4 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=horde-announce\u0026m=125294558611682\u0026w=2"
        },
        {
          "name": "36665",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36665"
        },
        {
          "name": "DSA-1897",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1897"
        },
        {
          "name": "[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.1.6 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=horde-announce\u0026m=125292314007049\u0026w=2"
        },
        {
          "name": "[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.2.4 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=horde-announce\u0026m=125295852706029\u0026w=2"
        },
        {
          "name": "[horde-announce] 20090914 [announce] [SECURITY] Horde 3.2.5 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=horde-announce\u0026m=125291625030436\u0026w=2"
        },
        {
          "name": "[horde-announce] 20090914 [announce] [SECURITY] Horde 3.3.5 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=horde-announce\u0026m=125292339907481\u0026w=2"
        },
        {
          "name": "horde-application-form-file-overwrite(53202)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53202"
        },
        {
          "name": "[horde-announce] 20090914 [announce] Horde Groupware 1.1.6 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=horde-announce\u0026m=125292088004087\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-3236",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The form library in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; reuses temporary filenames during the upload process which allows remote attackers, with privileges to write to the address book, to overwrite arbitrary files and execute PHP code via crafted Horde_Form_Type_image form field elements."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "58107",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/58107"
            },
            {
              "name": "36882",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36882"
            },
            {
              "name": "[horde-announce] 20090914 [announce] Horde Groupware 1.2.4 (final)",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=horde-announce\u0026m=125294558611682\u0026w=2"
            },
            {
              "name": "36665",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36665"
            },
            {
              "name": "DSA-1897",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1897"
            },
            {
              "name": "[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.1.6 (final)",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=horde-announce\u0026m=125292314007049\u0026w=2"
            },
            {
              "name": "[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.2.4 (final)",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=horde-announce\u0026m=125295852706029\u0026w=2"
            },
            {
              "name": "[horde-announce] 20090914 [announce] [SECURITY] Horde 3.2.5 (final)",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=horde-announce\u0026m=125291625030436\u0026w=2"
            },
            {
              "name": "[horde-announce] 20090914 [announce] [SECURITY] Horde 3.3.5 (final)",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=horde-announce\u0026m=125292339907481\u0026w=2"
            },
            {
              "name": "horde-application-form-file-overwrite(53202)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53202"
            },
            {
              "name": "[horde-announce] 20090914 [announce] Horde Groupware 1.1.6 (final)",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=horde-announce\u0026m=125292088004087\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-3236",
    "datePublished": "2009-09-17T10:00:00",
    "dateReserved": "2009-09-16T00:00:00",
    "dateUpdated": "2024-08-07T06:22:23.949Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0961 (GCVE-0-2005-0961)
Vulnerability from cvelistv5
Published
2005-04-03 05:00
Modified
2024-08-07 21:35
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in Horde 3.0.4 before 3.0.4-RC2 allows remote attackers to inject arbitrary web script or HTML via the parent frame title.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:35:58.983Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2005/000176.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.49\u0026r2=1.515.2.93\u0026ty=h"
          },
          {
            "name": "SUSE-SR:2005:016",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_16_sr.html"
          },
          {
            "name": "14730",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14730"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-03-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Horde 3.0.4 before 3.0.4-RC2 allows remote attackers to inject arbitrary web script or HTML via the parent frame title."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-06-23T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://lists.horde.org/archives/announce/2005/000176.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.49\u0026r2=1.515.2.93\u0026ty=h"
        },
        {
          "name": "SUSE-SR:2005:016",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_16_sr.html"
        },
        {
          "name": "14730",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14730"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0961",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Horde 3.0.4 before 3.0.4-RC2 allows remote attackers to inject arbitrary web script or HTML via the parent frame title."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://lists.horde.org/archives/announce/2005/000176.html",
              "refsource": "CONFIRM",
              "url": "http://lists.horde.org/archives/announce/2005/000176.html"
            },
            {
              "name": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.49\u0026r2=1.515.2.93\u0026ty=h",
              "refsource": "CONFIRM",
              "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.49\u0026r2=1.515.2.93\u0026ty=h"
            },
            {
              "name": "SUSE-SR:2005:016",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_16_sr.html"
            },
            {
              "name": "14730",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14730"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0961",
    "datePublished": "2005-04-03T05:00:00",
    "dateReserved": "2005-04-03T00:00:00",
    "dateUpdated": "2024-08-07T21:35:58.983Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5917 (GCVE-0-2008-5917)
Vulnerability from cvelistv5
Published
2009-01-21 02:00
Modified
2024-08-07 11:13
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in the XSS filter (framework/Text_Filter/Filter/xss.php) in Horde Application Framework 3.2.2 and 3.3, when Internet Explorer is being used, allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to style attributes.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:13:13.320Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SR:2009:007",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"
          },
          {
            "name": "34418",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34418"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.horde.org/diff.php/framework/Text_Filter/Filter/xss.php?r1=1.17\u0026r2=1.18"
          },
          {
            "name": "[announce] Horde 3.2.3 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000462.html"
          },
          {
            "name": "34609",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34609"
          },
          {
            "name": "[announce] Horde 3.3.1 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000464.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the XSS filter (framework/Text_Filter/Filter/xss.php) in Horde Application Framework 3.2.2 and 3.3, when Internet Explorer is being used, allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to style attributes."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-04-01T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "SUSE-SR:2009:007",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"
        },
        {
          "name": "34418",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34418"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.horde.org/diff.php/framework/Text_Filter/Filter/xss.php?r1=1.17\u0026r2=1.18"
        },
        {
          "name": "[announce] Horde 3.2.3 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000462.html"
        },
        {
          "name": "34609",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34609"
        },
        {
          "name": "[announce] Horde 3.3.1 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000464.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-5917",
    "datePublished": "2009-01-21T02:00:00",
    "dateReserved": "2009-01-20T00:00:00",
    "dateUpdated": "2024-08-07T11:13:13.320Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4256 (GCVE-0-2006-4256)
Vulnerability from cvelistv5
Published
2006-08-21 20:00
Modified
2024-08-07 19:06
Severity ?
CWE
  • n/a
Summary
index.php in Horde Application Framework before 3.1.2 allows remote attackers to include web pages from other sites, which could be useful for phishing attacks, via a URL in the url parameter, aka "cross-site referencing." NOTE: some sources have referred to this issue as XSS, but it is different than classic XSS.
References
http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2456x_refsource_MISC
http://lists.horde.org/archives/announce/2006/000292.htmlmailing-list, x_refsource_MLIST
http://secunia.com/advisories/27565third-party-advisory, x_refsource_SECUNIA
http://securityreason.com/securityalert/1422third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/archive/1/443360/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/21500third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3309vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2007/dsa-1406vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/28411vdb-entry, x_refsource_XF
http://securitytracker.com/id?1016713vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:06.500Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2456"
          },
          {
            "name": "[horde-announce] 20060817 Horde 3.1.3 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2006/000292.html"
          },
          {
            "name": "27565",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27565"
          },
          {
            "name": "1422",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1422"
          },
          {
            "name": "20060816 [scip_Advisory 2456] Horde Framework and Horde IMP /index.php cross site referencing",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/443360/100/0/threaded"
          },
          {
            "name": "21500",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21500"
          },
          {
            "name": "ADV-2006-3309",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3309"
          },
          {
            "name": "DSA-1406",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1406"
          },
          {
            "name": "horde-index-xss(28411)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28411"
          },
          {
            "name": "1016713",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016713"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "index.php in Horde Application Framework before 3.1.2 allows remote attackers to include web pages from other sites, which could be useful for phishing attacks, via a URL in the url parameter, aka \"cross-site referencing.\" NOTE: some sources have referred to this issue as XSS, but it is different than classic XSS."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2456"
        },
        {
          "name": "[horde-announce] 20060817 Horde 3.1.3 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2006/000292.html"
        },
        {
          "name": "27565",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27565"
        },
        {
          "name": "1422",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1422"
        },
        {
          "name": "20060816 [scip_Advisory 2456] Horde Framework and Horde IMP /index.php cross site referencing",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/443360/100/0/threaded"
        },
        {
          "name": "21500",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21500"
        },
        {
          "name": "ADV-2006-3309",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3309"
        },
        {
          "name": "DSA-1406",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1406"
        },
        {
          "name": "horde-index-xss(28411)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28411"
        },
        {
          "name": "1016713",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016713"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4256",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "index.php in Horde Application Framework before 3.1.2 allows remote attackers to include web pages from other sites, which could be useful for phishing attacks, via a URL in the url parameter, aka \"cross-site referencing.\" NOTE: some sources have referred to this issue as XSS, but it is different than classic XSS."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2456",
              "refsource": "MISC",
              "url": "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2456"
            },
            {
              "name": "[horde-announce] 20060817 Horde 3.1.3 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2006/000292.html"
            },
            {
              "name": "27565",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27565"
            },
            {
              "name": "1422",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1422"
            },
            {
              "name": "20060816 [scip_Advisory 2456] Horde Framework and Horde IMP /index.php cross site referencing",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/443360/100/0/threaded"
            },
            {
              "name": "21500",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21500"
            },
            {
              "name": "ADV-2006-3309",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3309"
            },
            {
              "name": "DSA-1406",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1406"
            },
            {
              "name": "horde-index-xss(28411)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28411"
            },
            {
              "name": "1016713",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016713"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4256",
    "datePublished": "2006-08-21T20:00:00",
    "dateReserved": "2006-08-21T00:00:00",
    "dateUpdated": "2024-08-07T19:06:06.500Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1491 (GCVE-0-2006-1491)
Vulnerability from cvelistv5
Published
2006-03-29 22:00
Modified
2024-08-07 17:12
Severity ?
CWE
  • n/a
Summary
Eval injection vulnerability in Horde Application Framework versions 3.0 before 3.0.10 and 3.1 before 3.1.1 allows remote attackers to execute arbitrary code via the help viewer.
References
http://www.gentoo.org/security/en/glsa/glsa-200604-02.xmlvendor-advisory, x_refsource_GENTOO
http://www.debian.org/security/2006/dsa-1034vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/17292vdb-entry, x_refsource_BID
http://www.attrition.org/pipermail/vim/2006-March/000671.htmlmailing-list, x_refsource_VIM
http://secunia.com/advisories/19528third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/25516vdb-entry, x_refsource_XF
http://secunia.com/advisories/19485third-party-advisory, x_refsource_SECUNIA
http://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php&r1=2.85&r2=2.86x_refsource_CONFIRM
http://secunia.com/advisories/19692third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_07_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.vupen.com/english/advisories/2006/1154vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/19619third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1033vendor-advisory, x_refsource_DEBIAN
http://securitytracker.com/id?1015841vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/19504third-party-advisory, x_refsource_SECUNIA
http://lists.horde.org/archives/announce/2006/000272.htmlx_refsource_CONFIRM
http://lists.horde.org/archives/announce/2006/000271.htmlx_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:12:22.197Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200604-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200604-02.xml"
          },
          {
            "name": "DSA-1034",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1034"
          },
          {
            "name": "17292",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17292"
          },
          {
            "name": "20060330 Recent unspecified Horde vuln is eval injection",
            "tags": [
              "mailing-list",
              "x_refsource_VIM",
              "x_transferred"
            ],
            "url": "http://www.attrition.org/pipermail/vim/2006-March/000671.html"
          },
          {
            "name": "19528",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19528"
          },
          {
            "name": "horde-help-viewer-command-execution(25516)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25516"
          },
          {
            "name": "19485",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19485"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php\u0026r1=2.85\u0026r2=2.86"
          },
          {
            "name": "19692",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19692"
          },
          {
            "name": "SUSE-SR:2006:007",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_07_sr.html"
          },
          {
            "name": "ADV-2006-1154",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1154"
          },
          {
            "name": "19619",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19619"
          },
          {
            "name": "DSA-1033",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1033"
          },
          {
            "name": "1015841",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015841"
          },
          {
            "name": "19504",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19504"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2006/000272.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2006/000271.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Eval injection vulnerability in Horde Application Framework versions 3.0 before 3.0.10 and 3.1 before 3.1.1 allows remote attackers to execute arbitrary code via the help viewer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-200604-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200604-02.xml"
        },
        {
          "name": "DSA-1034",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1034"
        },
        {
          "name": "17292",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17292"
        },
        {
          "name": "20060330 Recent unspecified Horde vuln is eval injection",
          "tags": [
            "mailing-list",
            "x_refsource_VIM"
          ],
          "url": "http://www.attrition.org/pipermail/vim/2006-March/000671.html"
        },
        {
          "name": "19528",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19528"
        },
        {
          "name": "horde-help-viewer-command-execution(25516)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25516"
        },
        {
          "name": "19485",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19485"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php\u0026r1=2.85\u0026r2=2.86"
        },
        {
          "name": "19692",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19692"
        },
        {
          "name": "SUSE-SR:2006:007",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_07_sr.html"
        },
        {
          "name": "ADV-2006-1154",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1154"
        },
        {
          "name": "19619",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19619"
        },
        {
          "name": "DSA-1033",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1033"
        },
        {
          "name": "1015841",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015841"
        },
        {
          "name": "19504",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19504"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://lists.horde.org/archives/announce/2006/000272.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://lists.horde.org/archives/announce/2006/000271.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1491",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eval injection vulnerability in Horde Application Framework versions 3.0 before 3.0.10 and 3.1 before 3.1.1 allows remote attackers to execute arbitrary code via the help viewer."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200604-02",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200604-02.xml"
            },
            {
              "name": "DSA-1034",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1034"
            },
            {
              "name": "17292",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17292"
            },
            {
              "name": "20060330 Recent unspecified Horde vuln is eval injection",
              "refsource": "VIM",
              "url": "http://www.attrition.org/pipermail/vim/2006-March/000671.html"
            },
            {
              "name": "19528",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19528"
            },
            {
              "name": "horde-help-viewer-command-execution(25516)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25516"
            },
            {
              "name": "19485",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19485"
            },
            {
              "name": "http://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php\u0026r1=2.85\u0026r2=2.86",
              "refsource": "CONFIRM",
              "url": "http://cvs.horde.org/diff.php?f=horde%2Fservices%2Fhelp%2Findex.php\u0026r1=2.85\u0026r2=2.86"
            },
            {
              "name": "19692",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19692"
            },
            {
              "name": "SUSE-SR:2006:007",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_07_sr.html"
            },
            {
              "name": "ADV-2006-1154",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1154"
            },
            {
              "name": "19619",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19619"
            },
            {
              "name": "DSA-1033",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1033"
            },
            {
              "name": "1015841",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015841"
            },
            {
              "name": "19504",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19504"
            },
            {
              "name": "http://lists.horde.org/archives/announce/2006/000272.html",
              "refsource": "CONFIRM",
              "url": "http://lists.horde.org/archives/announce/2006/000272.html"
            },
            {
              "name": "http://lists.horde.org/archives/announce/2006/000271.html",
              "refsource": "CONFIRM",
              "url": "http://lists.horde.org/archives/announce/2006/000271.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1491",
    "datePublished": "2006-03-29T22:00:00",
    "dateReserved": "2006-03-29T00:00:00",
    "dateUpdated": "2024-08-07T17:12:22.197Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4363 (GCVE-0-2009-4363)
Vulnerability from cvelistv5
Published
2009-12-21 16:00
Modified
2024-09-17 01:20
Severity ?
CWE
  • n/a
Summary
Text_Filter/lib/Horde/Text/Filter/Xss.php in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 does not properly handle data: URIs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via data:text/html values for the HREF attribute of an A element in an HTML e-mail message. NOTE: the vendor states that the issue is caused by "an XSS vulnerability in Firefox browsers."
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:01:20.101Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[announce] 20091216 Horde Groupware 1.2.5 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
          },
          {
            "name": "[announce] 20091215 Horde 3.3.6 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2009/000529.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.horde.org/view.php?actionID=view_file\u0026type=patch\u0026file=0002-Bug-8715-Fix-XSS-vulnerability%5B1%5D.patch\u0026ticket=8715"
          },
          {
            "name": "[announce] 20091217 Horde Groupware Webmail Edition 1.2.5 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.horde.org/ticket/8715"
          },
          {
            "name": "1023365",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023365"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Text_Filter/lib/Horde/Text/Filter/Xss.php in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 does not properly handle data: URIs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via data:text/html values for the HREF attribute of an A element in an HTML e-mail message.  NOTE: the vendor states that the issue is caused by \"an XSS vulnerability in Firefox browsers.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-12-21T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[announce] 20091216 Horde Groupware 1.2.5 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
        },
        {
          "name": "[announce] 20091215 Horde 3.3.6 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2009/000529.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.horde.org/view.php?actionID=view_file\u0026type=patch\u0026file=0002-Bug-8715-Fix-XSS-vulnerability%5B1%5D.patch\u0026ticket=8715"
        },
        {
          "name": "[announce] 20091217 Horde Groupware Webmail Edition 1.2.5 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.horde.org/ticket/8715"
        },
        {
          "name": "1023365",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023365"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4363",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Text_Filter/lib/Horde/Text/Filter/Xss.php in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 does not properly handle data: URIs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via data:text/html values for the HREF attribute of an A element in an HTML e-mail message.  NOTE: the vendor states that the issue is caused by \"an XSS vulnerability in Firefox browsers.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[announce] 20091216 Horde Groupware 1.2.5 (final)",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
            },
            {
              "name": "[announce] 20091215 Horde 3.3.6 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2009/000529.html"
            },
            {
              "name": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h",
              "refsource": "CONFIRM",
              "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
            },
            {
              "name": "http://bugs.horde.org/view.php?actionID=view_file\u0026type=patch\u0026file=0002-Bug-8715-Fix-XSS-vulnerability%5B1%5D.patch\u0026ticket=8715",
              "refsource": "CONFIRM",
              "url": "http://bugs.horde.org/view.php?actionID=view_file\u0026type=patch\u0026file=0002-Bug-8715-Fix-XSS-vulnerability%5B1%5D.patch\u0026ticket=8715"
            },
            {
              "name": "[announce] 20091217 Horde Groupware Webmail Edition 1.2.5 (final)",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
            },
            {
              "name": "http://bugs.horde.org/ticket/8715",
              "refsource": "CONFIRM",
              "url": "http://bugs.horde.org/ticket/8715"
            },
            {
              "name": "1023365",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023365"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4363",
    "datePublished": "2009-12-21T16:00:00Z",
    "dateReserved": "2009-12-21T00:00:00Z",
    "dateUpdated": "2024-09-17T01:20:38.554Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-3701 (GCVE-0-2009-3701)
Vulnerability from cvelistv5
Published
2009-12-21 16:00
Modified
2024-08-07 06:38
Severity ?
CWE
  • n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) phpshell.php, (2) cmdshell.php, or (3) sqlshell.php in admin/, related to the PHP_SELF variable.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:38:30.163Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "37823",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37823"
          },
          {
            "name": "[announce] 20091216 Horde Groupware 1.2.5 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
          },
          {
            "name": "20091217 [ISecAuditors Security Advisories] Horde 3.3.5 \"PHP_SELF\" Cross-Site Scripting vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html"
          },
          {
            "name": "[announce] 20091215 Horde 3.3.6 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2009/000529.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
          },
          {
            "name": "ADV-2009-3549",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3549"
          },
          {
            "name": "20091217 [ISecAuditors Security Advisories] Horde 3.3.5 \"PHP_SELF\" Cross-Site Scripting vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/508531/100/0/threaded"
          },
          {
            "name": "horde-admininterface-xss(54817)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54817"
          },
          {
            "name": "37351",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37351"
          },
          {
            "name": "[announce] 20091217 Horde Groupware Webmail Edition 1.2.5 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
          },
          {
            "name": "37709",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37709"
          },
          {
            "name": "ADV-2009-3572",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3572"
          },
          {
            "name": "1023365",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023365"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) phpshell.php, (2) cmdshell.php, or (3) sqlshell.php in admin/, related to the PHP_SELF variable."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "37823",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37823"
        },
        {
          "name": "[announce] 20091216 Horde Groupware 1.2.5 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
        },
        {
          "name": "20091217 [ISecAuditors Security Advisories] Horde 3.3.5 \"PHP_SELF\" Cross-Site Scripting vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html"
        },
        {
          "name": "[announce] 20091215 Horde 3.3.6 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2009/000529.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
        },
        {
          "name": "ADV-2009-3549",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3549"
        },
        {
          "name": "20091217 [ISecAuditors Security Advisories] Horde 3.3.5 \"PHP_SELF\" Cross-Site Scripting vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/508531/100/0/threaded"
        },
        {
          "name": "horde-admininterface-xss(54817)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54817"
        },
        {
          "name": "37351",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37351"
        },
        {
          "name": "[announce] 20091217 Horde Groupware Webmail Edition 1.2.5 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
        },
        {
          "name": "37709",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37709"
        },
        {
          "name": "ADV-2009-3572",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3572"
        },
        {
          "name": "1023365",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023365"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-3701",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) phpshell.php, (2) cmdshell.php, or (3) sqlshell.php in admin/, related to the PHP_SELF variable."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "37823",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37823"
            },
            {
              "name": "[announce] 20091216 Horde Groupware 1.2.5 (final)",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
            },
            {
              "name": "20091217 [ISecAuditors Security Advisories] Horde 3.3.5 \"PHP_SELF\" Cross-Site Scripting vulnerability",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html"
            },
            {
              "name": "[announce] 20091215 Horde 3.3.6 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2009/000529.html"
            },
            {
              "name": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h",
              "refsource": "CONFIRM",
              "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
            },
            {
              "name": "ADV-2009-3549",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3549"
            },
            {
              "name": "20091217 [ISecAuditors Security Advisories] Horde 3.3.5 \"PHP_SELF\" Cross-Site Scripting vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/508531/100/0/threaded"
            },
            {
              "name": "horde-admininterface-xss(54817)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54817"
            },
            {
              "name": "37351",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37351"
            },
            {
              "name": "[announce] 20091217 Horde Groupware Webmail Edition 1.2.5 (final)",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
            },
            {
              "name": "37709",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37709"
            },
            {
              "name": "ADV-2009-3572",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3572"
            },
            {
              "name": "1023365",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023365"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-3701",
    "datePublished": "2009-12-21T16:00:00",
    "dateReserved": "2009-10-15T00:00:00",
    "dateUpdated": "2024-08-07T06:38:30.163Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-2741 (GCVE-0-2004-2741)
Vulnerability from cvelistv5
Published
2007-10-09 10:00
Modified
2024-08-08 01:36
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in the "help window" (help.php) in Horde Application Framework 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) module, (2) topic, or (3) module parameters.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:36:25.317Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "11164",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/11164"
          },
          {
            "name": "11546",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11546"
          },
          {
            "name": "12992",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/12992"
          },
          {
            "name": "[horde-announce] 20041026 Horde 2.2.7 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2004/000107.html"
          },
          {
            "name": "horde-help-window-xss(17881)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17881"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.horde.org/diff.php/horde/templates/help/index.inc?r1=1.9.2.4\u0026r2=1.9.2.5\u0026ty=u"
          },
          {
            "name": "1011959",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1011959"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-10-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the \"help window\" (help.php) in Horde Application Framework 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) module, (2) topic, or (3) module parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "11164",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/11164"
        },
        {
          "name": "11546",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11546"
        },
        {
          "name": "12992",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/12992"
        },
        {
          "name": "[horde-announce] 20041026 Horde 2.2.7 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2004/000107.html"
        },
        {
          "name": "horde-help-window-xss(17881)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17881"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.horde.org/diff.php/horde/templates/help/index.inc?r1=1.9.2.4\u0026r2=1.9.2.5\u0026ty=u"
        },
        {
          "name": "1011959",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1011959"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2741",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the \"help window\" (help.php) in Horde Application Framework 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) module, (2) topic, or (3) module parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "11164",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/11164"
            },
            {
              "name": "11546",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11546"
            },
            {
              "name": "12992",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/12992"
            },
            {
              "name": "[horde-announce] 20041026 Horde 2.2.7 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2004/000107.html"
            },
            {
              "name": "horde-help-window-xss(17881)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17881"
            },
            {
              "name": "http://cvs.horde.org/diff.php/horde/templates/help/index.inc?r1=1.9.2.4\u0026r2=1.9.2.5\u0026ty=u",
              "refsource": "CONFIRM",
              "url": "http://cvs.horde.org/diff.php/horde/templates/help/index.inc?r1=1.9.2.4\u0026r2=1.9.2.5\u0026ty=u"
            },
            {
              "name": "1011959",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1011959"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2741",
    "datePublished": "2007-10-09T10:00:00",
    "dateReserved": "2007-10-08T00:00:00",
    "dateUpdated": "2024-08-08T01:36:25.317Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}