Vulnerabilites related to horde - groupware_webmail_edition
Vulnerability from fkie_nvd
Published
2008-01-11 02:46
Modified
2025-04-09 00:30
Severity ?
Summary
IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) "purge" deleted emails via a crafted email message.
References
PSIRT-CNA@flexerasoftware.comhttp://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17&r2=1.17.2.1&ty=h
PSIRT-CNA@flexerasoftware.comhttp://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12&r2=1.12.2.1&ty=h
PSIRT-CNA@flexerasoftware.comhttp://lists.horde.org/archives/announce/2008/000360.html
PSIRT-CNA@flexerasoftware.comhttp://lists.horde.org/archives/announce/2008/000365.html
PSIRT-CNA@flexerasoftware.comhttp://lists.horde.org/archives/announce/2008/000366.html
PSIRT-CNA@flexerasoftware.comhttp://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28020Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28546
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/29184
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/29185
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/29186
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/34418
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/secunia_research/2007-102/advisory/Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://www.debian.org/security/2008/dsa-1470
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/bid/27223Patch
PSIRT-CNA@flexerasoftware.comhttps://bugzilla.redhat.com/show_bug.cgi?id=428625
PSIRT-CNA@flexerasoftware.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/39595
PSIRT-CNA@flexerasoftware.comhttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html
PSIRT-CNA@flexerasoftware.comhttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html
af854a3a-2127-422b-91ae-364da2661108http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17&r2=1.17.2.1&ty=h
af854a3a-2127-422b-91ae-364da2661108http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12&r2=1.12.2.1&ty=h
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000360.html
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000365.html
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000366.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28020Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28546
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29184
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29185
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29186
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34418
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2007-102/advisory/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1470
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27223Patch
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=428625
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/39595
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html
Impacted products
Vendor Product Version
horde framework 3.1.5
horde groupware_webmail_edition 1.0.3
horde horde 3.1.5
horde imp 4.1.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:framework:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8873E0B6-9A41-4D39-BB6F-06EF2F4BCB92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "664B0D12-607C-4B5F-AC8E-FB1BBD1332E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:horde:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A4F9E2-7978-4C82-9BD3-B6B73C4918E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C129AAEE-5388-4D81-AC1F-570EFF27EF89",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) \"purge\" deleted emails via a crafted email message."
    },
    {
      "lang": "es",
      "value": "IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, y Horde Groupware Webmail Edition 1.0.3 no validan peticiones HTTP no especificadas, lo cual permite a atacantes remotos (1) borrar mensajes de correo electr\u00f3nico de su elecci\u00f3n mediante un ID num\u00e9rico modificado o (2) \"purgar\" correos electr\u00f3nicos eliminados mediante un mensaje de correo electr\u00f3nico manipulado."
    }
  ],
  "id": "CVE-2007-6018",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-01-11T02:46:00.000",
  "references": [
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17\u0026r2=1.17.2.1\u0026ty=h"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12\u0026r2=1.12.2.1\u0026ty=h"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://lists.horde.org/archives/announce/2008/000360.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://lists.horde.org/archives/announce/2008/000365.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://lists.horde.org/archives/announce/2008/000366.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28020"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/28546"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/29184"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/29185"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/29186"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/34418"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2007-102/advisory/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.debian.org/security/2008/dsa-1470"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27223"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428625"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39595"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17\u0026r2=1.17.2.1\u0026ty=h"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12\u0026r2=1.12.2.1\u0026ty=h"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.horde.org/archives/announce/2008/000360.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.horde.org/archives/announce/2008/000365.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.horde.org/archives/announce/2008/000366.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28020"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28546"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34418"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2007-102/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1470"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428625"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html"
    }
  ],
  "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-08-13 01:41
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in Horde Groupware Webmail before Edition 1.1.1 (final) have unknown impact and attack vectors related to "unescaped output," possibly cross-site scripting (XSS), in the (1) object browser and (2) contact view.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A30F59C-D09A-495D-B5E5-E908D913164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E367E84-DD66-4512-BCDE-7D7E62B72A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B013D26B-BE67-4131-B320-EF87D19E9C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "664B0D12-607C-4B5F-AC8E-FB1BBD1332E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "989D5040-13B3-4D76-A516-81CAB112FE44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA0765C9-BBFB-4676-9D79-0CFD86BCF9E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "842159D1-E30C-4077-8E92-07979E52C10B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D9B15F-C3CA-44DF-BF5E-51741793348B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "46ADF628-449A-463E-A459-69FD9DB2ADAD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Horde Groupware Webmail before Edition 1.1.1 (final) have unknown impact and attack vectors related to \"unescaped output,\" possibly cross-site scripting (XSS), in the (1) object browser and (2) contact view."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en Horde Groupware Webmail anterior a Edition 1.1.1 (final) tiene impacto desconocido y vectores de ataque relacionados con \"salida no escapada\", posiblemente secuencias de comandos en sitios cruzados (XSS) en (1) el navegador objeto y (2) la vista de contacto."
    }
  ],
  "id": "CVE-2008-3650",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-08-13T01:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000420.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000420.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44479"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-09-13 22:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the Horde API in Horde 3.1 before 3.1.6 and 3.2 before 3.2 before 3.2-RC2; Turba H3 2.1 before 2.1.6 and 2.2 before 2.2-RC2; Kronolith H3 2.1 before 2.1.7 and H3 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and 2.2 before 2.2-RC2; Horde Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 has unknown impact and attack vectors.
References
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000360.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000361.html
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000362.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000363.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000364.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000365.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000366.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000367.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000368.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000369.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000371.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000374.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000376.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000377.htmlPatch
cve@mitre.orghttp://secunia.com/advisories/28382Vendor Advisory
cve@mitre.orghttp://www.osvdb.org/42775
cve@mitre.orghttp://www.securityfocus.com/bid/27217
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/39599
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000360.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000361.html
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000362.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000363.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000364.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000365.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000366.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000367.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000368.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000369.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000371.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000374.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000376.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000377.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28382Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/42775
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27217
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/39599
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C2653B-7F0B-4628-9E77-44744BC05463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B574D428-0A3A-47CA-A926-5C936F83919A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BBB036-494E-41D4-BD04-40906FAB5C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A30F59C-D09A-495D-B5E5-E908D913164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B013D26B-BE67-4131-B320-EF87D19E9C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "664B0D12-607C-4B5F-AC8E-FB1BBD1332E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "46ADF628-449A-463E-A459-69FD9DB2ADAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:horde:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D589E22C-7F87-43EF-B5FF-DC2B43E5252C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:horde:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "57AD38FB-23DF-406D-8889-E9EB18D22C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:horde:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BECCFA-1E18-41ED-882A-5C743D970EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:horde:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0285D4F-8CD8-48F9-9D68-A80E8742BAC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:horde:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3808FD9-126C-422F-AFE4-4FF6E1366431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:horde:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A4F9E2-7978-4C82-9BD3-B6B73C4918E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:horde:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "457276C8-6665-48C5-948C-E65E6309C0ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "391F88AC-0D1B-4F13-874C-6FD3C6E90CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C5E6E0C-7E94-4187-B53B-1BBB73C23EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDCD1651-0610-4338-9EA6-343865AA9F86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A557A-EC2D-40AF-88C7-208DB4E8FA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "733B59F3-1648-4875-9A9B-EC3BCA49BCEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "012BBA79-F969-405E-BBC8-FDC23DE25012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A06B44D-9448-4C96-BD37-790DA9842BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B67D985-950E-42B5-BA8D-05AE8A3EE3EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:mnemo_h3:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2814A27-E3C4-4A69-8FEB-E4900CD9876D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:mnemo_h3:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4CAC140-EA0B-4FFD-B8E7-3295623C6D81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:mnemo_h3:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "38397885-FDB3-4454-BFBB-2B28173FEC79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:nag_h3:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08307428-AE78-453B-A121-15AEB7049EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:nag_h3:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "195D72BA-A0A6-4568-BC67-77A44F9E0697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:nag_h3:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F7853DA-0958-401B-83C6-E35FACA4AAF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:nag_h3:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2BD1454-1D33-4026-A7F6-ADB358D3DC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:nag_h3:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "184A2E09-5784-44C4-A5D9-87EA906F86E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:turba_h3:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD583BAE-8123-40B9-8A68-96725A86EBF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:turba_h3:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE9CA86E-B688-495F-8233-69632B56E1FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:turba_h3:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B99A86-A8A6-474E-B54F-9F010FFE7C91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:turba_h3:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F73B3B-DB27-40F9-BCC2-E5ACC10F2A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:turba_h3:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4035BF4B-64F9-4A0D-82D0-99276B8B7010",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:turba_h3:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D808D3F-9332-4667-838C-CD545EDAD37B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:turba_h3:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "73C0F1DE-D2CB-4FA1-89FA-2C6E0991FDDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:turba_h3:2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6E649CA6-3EBD-40A4-860F-08141F8FB9D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the Horde API in Horde 3.1 before 3.1.6 and 3.2 before 3.2 before 3.2-RC2; Turba H3 2.1 before 2.1.6 and 2.2 before 2.2-RC2; Kronolith H3 2.1 before 2.1.7 and H3 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and 2.2 before 2.2-RC2; Horde Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 has unknown impact and attack vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el API de Horde v3.1 anterior a v3.1.6 y v3.2 anterior a v3.2 anterior a v3.2-RC2; Turba H3 v2.1 anterior a v2.1.6 y v2.2 anterior a v2.2-RC2; Kronolith H3 2.1 anterior a v2.1.7 y H3 v2.2 anterior a v2.2-RC2; Nag H3 v2.1 anterior a v2.1.4 y v2.2 anterior a v2.2-RC2; Mnemo H3 v2.1 anterior a v2.1.2 y v2.2 anterior a v2.2-RC2; Horde Groupware v1.0 anterior a v1.0.3 y v1.1 anterior a v1.1-RC2; y Groupware Webmail Edition v1.0 anterior a v1.0.4 y v1.1 anterior a v1.1-RC2; tiene impacto y vectores de ataque desconocidos."
    }
  ],
  "id": "CVE-2008-7218",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-09-13T22:30:00.360",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000360.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.horde.org/archives/announce/2008/000361.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000362.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000363.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000364.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000365.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000366.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000367.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000368.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000369.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000371.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000374.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000376.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000377.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28382"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/42775"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27217"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39599"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000360.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.horde.org/archives/announce/2008/000361.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000362.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000363.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000364.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000365.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000366.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000367.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000368.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000369.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000371.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000374.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000376.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000377.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28382"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/42775"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39599"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-24 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Horde IMP before 5.0.18 and Horde Groupware Webmail Edition before 4.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) composeCache, (2) rtemode, or (3) filename_* parameters to the compose page; (4) formname parameter to the contacts popup window; or (5) IMAP mailbox names. NOTE: some of these details are obtained from third party information.
References
secalert@redhat.comhttp://secunia.com/advisories/47580Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/47592Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2485
secalert@redhat.comhttp://www.horde.org/apps/imp/docs/CHANGES
secalert@redhat.comhttp://www.horde.org/apps/imp/docs/RELEASE_NOTES
secalert@redhat.comhttp://www.horde.org/apps/webmail/docs/CHANGES
secalert@redhat.comhttp://www.horde.org/apps/webmail/docs/RELEASE_NOTES
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/01/22/2
secalert@redhat.comhttp://www.securityfocus.com/bid/51586
secalert@redhat.comhttp://www.securitytracker.com/id?1026553
secalert@redhat.comhttp://www.securitytracker.com/id?1026554
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/47580Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/47592Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2485
af854a3a-2127-422b-91ae-364da2661108http://www.horde.org/apps/imp/docs/CHANGES
af854a3a-2127-422b-91ae-364da2661108http://www.horde.org/apps/imp/docs/RELEASE_NOTES
af854a3a-2127-422b-91ae-364da2661108http://www.horde.org/apps/webmail/docs/CHANGES
af854a3a-2127-422b-91ae-364da2661108http://www.horde.org/apps/webmail/docs/RELEASE_NOTES
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/01/22/2
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/51586
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1026553
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1026554
Impacted products
Vendor Product Version
horde dynamic_imp *
horde dynamic_imp 1.0
horde dynamic_imp 1.0
horde dynamic_imp 1.0
horde dynamic_imp 1.0
horde dynamic_imp 1.0
horde dynamic_imp 1.1
horde dynamic_imp 1.1
horde dynamic_imp 1.1
horde dynamic_imp 1.1.1
horde dynamic_imp 1.1.2
horde dynamic_imp 1.1.3
horde dynamic_imp 1.1.4
horde dynamic_imp 1.1.5
horde dynamic_imp 1.1.6
horde dynamic_imp 5.0
horde dynamic_imp 5.0.1
horde dynamic_imp 5.0.2
horde dynamic_imp 5.0.3
horde dynamic_imp 5.0.4
horde dynamic_imp 5.0.5
horde dynamic_imp 5.0.6
horde dynamic_imp 5.0.7
horde dynamic_imp 5.0.8
horde dynamic_imp 5.0.9
horde dynamic_imp 5.0.10
horde dynamic_imp 5.0.11
horde dynamic_imp 5.0.12
horde dynamic_imp 5.0.13
horde dynamic_imp 5.0.14
horde dynamic_imp 5.0.15
horde dynamic_imp 5.0.16
horde imp 2.0
horde imp 2.2
horde imp 2.2.1
horde imp 2.2.2
horde imp 2.2.3
horde imp 2.2.4
horde imp 2.2.5
horde imp 2.2.6
horde imp 2.2.7
horde imp 2.2.8
horde imp 2.3
horde imp 3.0
horde imp 3.1
horde imp 3.1.2
horde imp 3.2
horde imp 3.2.1
horde imp 3.2.2
horde imp 3.2.3
horde imp 3.2.4
horde imp 3.2.5
horde imp 3.2.6
horde imp 3.2.7
horde imp 3.2.7
horde imp 4.0
horde imp 4.0.1
horde imp 4.0.2
horde imp 4.0.3
horde imp 4.0.4
horde imp 4.1.3
horde imp 4.1.5
horde imp 4.1.6
horde imp 4.2
horde imp 4.2.1
horde imp 4.2.2
horde imp 4.3
horde imp 4.3.1
horde imp 4.3.2
horde imp 4.3.3
horde imp 4.3.4
horde imp 4.3.5
horde imp 4.3.6
horde imp 4.3.7
horde imp 4.3.8
horde imp 4.3.9
horde imp 5.0
horde imp 5.0
horde imp 5.0
horde imp 5.0
horde imp 5.0
horde imp 5.0.1
horde imp 5.0.2
horde imp 5.0.3
horde imp 5.0.4-git
horde groupware_webmail_edition *
horde groupware_webmail_edition 1.0
horde groupware_webmail_edition 1.0
horde groupware_webmail_edition 1.0
horde groupware_webmail_edition 1.0.1
horde groupware_webmail_edition 1.0.2
horde groupware_webmail_edition 1.0.3
horde groupware_webmail_edition 1.0.4
horde groupware_webmail_edition 1.0.5
horde groupware_webmail_edition 1.0.6
horde groupware_webmail_edition 1.0.7
horde groupware_webmail_edition 1.0.8
horde groupware_webmail_edition 1.1
horde groupware_webmail_edition 1.1
horde groupware_webmail_edition 1.1
horde groupware_webmail_edition 1.1
horde groupware_webmail_edition 1.1
horde groupware_webmail_edition 1.1.1
horde groupware_webmail_edition 1.1.2
horde groupware_webmail_edition 1.1.3
horde groupware_webmail_edition 1.1.4
horde groupware_webmail_edition 1.1.5
horde groupware_webmail_edition 1.1.6
horde groupware_webmail_edition 1.2
horde groupware_webmail_edition 1.2
horde groupware_webmail_edition 1.2.1
horde groupware_webmail_edition 1.2.2
horde groupware_webmail_edition 1.2.3
horde groupware_webmail_edition 1.2.3
horde groupware_webmail_edition 1.2.4
horde groupware_webmail_edition 1.2.5
horde groupware_webmail_edition 1.2.6
horde groupware_webmail_edition 1.2.7
horde groupware_webmail_edition 1.2.8
horde groupware_webmail_edition 1.2.9
horde groupware_webmail_edition 1.2.10
horde groupware_webmail_edition 4.0
horde groupware_webmail_edition 4.0
horde groupware_webmail_edition 4.0
horde groupware_webmail_edition 4.0.1
horde groupware_webmail_edition 4.0.2
horde groupware_webmail_edition 4.0.3
horde groupware_webmail_edition 4.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7395F88E-27B2-4C93-8360-3A925DBC7ED4",
              "versionEndIncluding": "5.0.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC88E67E-01FD-4B3A-A186-C0D5A8F3111D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "CBC6D9CA-DDD0-4D79-845B-95AEF907BC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "72796BEA-2929-4730-BD97-52686ACA0A34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D01633AC-7627-4DDA-A2FA-942D2F962567",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "6B517AA9-55B2-48E5-A1C0-83AAA1A38435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "349FE027-660E-42A8-9382-1049F827AE3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "718B8347-55A5-4909-87DD-071F9D4606A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "741ECFFC-A7A5-4BF2-B9E4-C5E06F3AF0DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "155EE1D9-0EA9-4EFC-953D-5BD24FA596CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CA83502-F507-4914-96A2-CFB7FDF29568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "939C5E5C-BA4D-4F65-BA9C-EEE70D18016C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0738E854-CAB5-4480-AD07-20EC35466640",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA96BD59-233E-43C3-BE19-673CD6622EBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91FBA6A-AC38-4879-9084-88753B4D911B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4AFEE15-D89D-4C0F-BFD6-9ECF3163B7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C53AD47-FE94-403B-BCCC-1357FD2C6622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1DB223-163D-46B9-B8EF-33CF8A49EA13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "52BC3866-0E7F-46E8-9347-C7B4BD1C0B02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8031AE6-A3F9-4BBD-BAC9-1C224D6AB567",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB366EE-49A1-4395-BAA0-69BEA76CEACC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4181ACC9-B59D-4ADF-B433-F0DC9227B33A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F372DA3C-39AC-4589-A23C-FFB62F919531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4C10EED-D008-4695-84D5-6D0DFA4147B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C924A1E2-5EC7-4F6A-94A3-F8C17FF3A4D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "494DFA09-3750-4A40-960D-7973761BCB1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "567AC297-F328-43AA-BB3A-776BE6BE0337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "193EED6E-67FE-44CB-9A77-C28D1C376357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D312F2C-8F5D-47F8-94BE-7E1992C41DB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E7B338-3153-4B34-B880-3E3B80B4B185",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "991CAA1F-E3BA-48AC-A1FD-DACC2D204D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2E0B7B-64DA-47CE-90B4-F468F2C67E26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D2A8C5B-6155-4B40-B8C8-B4944064E3DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D11E08A4-79D6-46FE-880F-66E9778C298E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55A3894F-2E3F-49CA-BEE5-759D603F6EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDBDC41-7E6F-4C97-95BD-7DEB2D9FE837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B52D447-8E56-4E04-9650-38D222DA8D2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C455353-0401-4975-89BC-C23D32A684F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1D9D9E1-D8B7-4A56-BC2F-90BDC97322B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "59DE856E-98FF-4B49-BD7F-3E326FEB89EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ED34889-9F98-46BC-9176-557484272C05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7FBC61D-6A08-4DE8-A5E5-A3FC57E7759D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52AEEE6-2364-4CFB-9337-C5CCA54362E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD137160-B80D-4C65-A9A9-CEE12107E3DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E6C2AC8-C21A-4152-AAE6-915ACE65CB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1956C8F0-EB91-4322-85C1-6BE15AA13703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A48DEBEB-0C2D-4F6A-AF63-04990D2FD5AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E004FA4-0180-458A-8E8C-8167EF684ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F0A1617-17D1-4C9F-A818-27321FD2FEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D86CDC19-43C3-4ACC-94B4-388BCC8A2203",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9931A5B-CD0C-43A3-B32D-915FF4AF57D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDC69F98-A3B4-4573-AFE4-2069218B3454",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD4D0137-3515-4857-8E70-4600CD2D4278",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A59756D1-3401-4B15-8B68-AA68B5BC3223",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:3.2.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "73FD31BC-651B-461F-B9F4-6CA8D5CCE583",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "184592A5-4108-40DB-8882-9D2468490DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "28470602-E3F1-4F04-B012-F91AB95E7A68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B584932-BFB2-4462-BC69-B9FCC059F59F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "702F7A33-CF9E-4966-B622-E4BD27B120AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF1BB456-5462-4ACE-AECF-730B1C7BE2CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D23A341-217D-4AF2-AC61-DFC9761AFE3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C129AAEE-5388-4D81-AC1F-570EFF27EF89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "01CBF0CE-7133-4281-842C-3584AE13F36D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "373263B9-D967-4A9B-A062-FC841061E143",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "05FAFC4C-8E72-4EA5-930F-6F76CCD0138A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F91A26C3-D538-4935-90FF-DDD5E8733968",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F9064E7-6081-4B23-BC03-21E6F483FA53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E60BFE2-B3E4-416F-9697-58D912907E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C5D659-E2C1-444D-8B5C-28970D830F1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "72D702C7-2789-4837-BC74-59570B13B4C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A363643-3EF2-4F05-A934-0187AF846D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4611791C-DA55-4F37-9030-1BEA17D0D817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C5EC486-EF14-43DF-9152-69456E0FE271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "82EC0D61-EC7E-4BF3-9217-C1387ADB5794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB4B2C3E-9BB5-4403-9A7C-5AD0B92F02E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:4.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "31213DF1-47CC-4DCD-B8A5-5F0D30956859",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD07BF20-09CE-4D32-A935-8EAA8363356F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:5.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "1B91647A-F174-4F2E-992E-BDA23B2E3545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:5.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "126DFFE7-AD9F-41E8-8AA0-C0F9CE80271A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B02F8BA6-4A13-48CA-BAC9-F8C932453EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "20AA91CC-4B6C-4BC9-9730-C613300702AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE8E0715-9A6B-4A7C-9A6F-4B7A344B0968",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "382D599B-09EC-4C2A-8F23-EB5D03C4AA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15348E42-1A70-4787-95B0-9EDB100BB36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:imp:5.0.4-git:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE40F36-6872-4C47-9A1E-F4EEEA115696",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0BA941-3235-46CB-A368-7E17482B0A15",
              "versionEndIncluding": "4.0.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A30F59C-D09A-495D-B5E5-E908D913164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "48205A35-1F67-4E90-A891-29AA4D2CC138",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "276A0BB9-6808-4901-8EEB-766AF6EE4E3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E367E84-DD66-4512-BCDE-7D7E62B72A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B013D26B-BE67-4131-B320-EF87D19E9C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "664B0D12-607C-4B5F-AC8E-FB1BBD1332E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "989D5040-13B3-4D76-A516-81CAB112FE44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA0765C9-BBFB-4676-9D79-0CFD86BCF9E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "842159D1-E30C-4077-8E92-07979E52C10B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D9B15F-C3CA-44DF-BF5E-51741793348B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "359D7ED8-E171-4822-B2F3-80E07287A787",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "46ADF628-449A-463E-A459-69FD9DB2ADAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5E8F448D-DFB5-4BA3-BD28-13E39FF82A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5C783DC9-4379-49A8-A026-D1F933DB36AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "2AD6F3C8-50F8-4E9B-98EA-8962B2310780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "36CFEF77-BE64-4547-9A5F-DABD589C5ED0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C7522F6-DF2C-4225-932F-2D27C1EFD792",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BE7A07-3455-4A18-BDBC-DC261B35D427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "503BB3EF-2BDC-4019-8EE2-B121A2600DB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "54DA4725-AAA4-4A4B-B6A4-9A139A6176AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA22094F-3A01-4B66-99E1-0ED9D5574F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D105C44-38EE-4D86-9334-DA0E8A08B725",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C145E10-4AC0-4F25-9D98-64447BB7C103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "461A597A-93DD-4A12-BB04-C02277317C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B256AACA-93C8-447A-AB08-ABF0A9E4E63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D634210-6D2D-4181-8310-73FB5B9872D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C10C8DB-FB73-4982-8B92-D3E1FB1C59A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "319BC54E-2A0B-4033-AD73-3E8825E8D9B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A86680C-839E-4EED-9B32-CE101DC7B6B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0F1DCA-7D9F-42E3-9FB9-D3C100F09A58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BFADDD4-8B5E-4EE7-A390-CDFD48CE3ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F5FB253-C2E5-48F3-B13F-79C45024D89D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7D0D17F-B2E4-496D-9ACD-170C33B453F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6314FAC0-544A-492F-81BA-9169EB69E74D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "70CC6175-10F8-4DD9-A1E7-202F5F4A221C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ED61953-A384-498C-AFFD-F83ADF51CFD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EC13F5CD-2BB9-4FA7-BE4C-D2175E18E063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FFF8191E-F2EA-4071-B26D-8E45103D4A0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "040AC7A5-689B-4F12-A199-FB395E4CB84B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFD1571-C070-4B5F-9BA3-5B1789068396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0909400D-75C6-4DED-8C77-333D8F092AA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "08050D4C-6620-4177-9967-044AD2B9368B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde IMP before 5.0.18 and Horde Groupware Webmail Edition before 4.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) composeCache, (2) rtemode, or (3) filename_* parameters to the compose page; (4) formname parameter to the contacts popup window; or (5) IMAP mailbox names.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerbilidades de ejecuci\u00f3n de secuencias de comandos web en sitios cruzados (XSS) en Horde IMP anterior a v5.0.18 y Horde Groupware Webmail Edition anterior a v4.0.6 permite a atacantes remotos inyectar c\u00f3digo HTML o script web a trav\u00e9s de los par\u00e1metros que componen la p\u00e1gina (1) composeCache, (2) rtemode, o (3) filename_*;(4) par\u00e1metro formname para ventanas popup; o (5) nombres de buz\u00f3n IMAP. NOTA: Algunos de estos detalles han sido obtenidos de terceras partes de informaci\u00f3n."
    }
  ],
  "id": "CVE-2012-0791",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-01-24T18:55:01.440",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47580"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47592"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2485"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.horde.org/apps/imp/docs/CHANGES"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.horde.org/apps/imp/docs/RELEASE_NOTES"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.horde.org/apps/webmail/docs/CHANGES"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/51586"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1026553"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1026554"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47580"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47592"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2485"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.horde.org/apps/imp/docs/CHANGES"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.horde.org/apps/imp/docs/RELEASE_NOTES"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.horde.org/apps/webmail/docs/CHANGES"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51586"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026553"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026554"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-11 00:44
Modified
2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via ".." sequences and a null byte in the theme name.
References
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000382.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000383.html
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000384.html
cve@mitre.orghttp://secunia.com/advisories/29286Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29374Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29400Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30047Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200805-01.xml
cve@mitre.orghttp://securityreason.com/securityalert/3726
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1519
cve@mitre.orghttp://www.securityfocus.com/archive/1/489239/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/489289/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/28153Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0822/references
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41054
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000382.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000383.html
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000384.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29286Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29374Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29400Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30047Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200805-01.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3726
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1519
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/489239/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/489289/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28153Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0822/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41054
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html
Impacted products
Vendor Product Version
horde groupware *
horde groupware_webmail_edition *
horde horde 3.1.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCA87DD-0549-4B2F-B1F4-46632258A059",
              "versionEndIncluding": "1.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77138B08-A680-4FEC-873F-6E25B05D44CB",
              "versionEndIncluding": "1.0.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:horde:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "93944D77-B65B-48F4-9334-8FC9B1D96F53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via \"..\" sequences and a null byte in the theme name."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en Horde 3.1.6, Groupware anterior 1.0.5, y Groupware Webmail Edition anterior 1.0.6, cuando ejecuta ciertas configuraciones, pertmite a usuarios autenticados remotamente leer y ejecutar ficheros de su elecci\u00f3n a trav\u00e9s de secuencias \"..\" y de byte nulo en el mismo \"theme name\"."
    }
  ],
  "id": "CVE-2008-1284",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-11T00:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000382.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.horde.org/archives/announce/2008/000383.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.horde.org/archives/announce/2008/000384.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29286"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29374"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29400"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30047"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200805-01.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3726"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1519"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/489239/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/489289/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/28153"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0822/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41054"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000382.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.horde.org/archives/announce/2008/000383.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.horde.org/archives/announce/2008/000384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29286"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29374"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29400"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200805-01.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3726"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1519"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/489239/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/489289/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/28153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0822/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41054"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-02-19 01:00
Modified
2025-04-09 00:30
Severity ?
Summary
lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000378.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000379.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000380.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000381.htmlPatch
cve@mitre.orghttp://secunia.com/advisories/28982Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29071
cve@mitre.orghttp://secunia.com/advisories/29184
cve@mitre.orghttp://secunia.com/advisories/29185
cve@mitre.orghttp://secunia.com/advisories/29186
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1507
cve@mitre.orghttp://www.securityfocus.com/bid/27844Patch
cve@mitre.orghttp://www.securitytracker.com/id?1019433
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0593/references
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=432027
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000378.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000379.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000380.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000381.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28982Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29071
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29184
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29185
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29186
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1507
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27844Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019433
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0593/references
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=432027
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*",
              "matchCriteriaId": "F5114DA3-FBB9-47C4-857B-3212404DAD4E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*",
              "matchCriteriaId": "4D5F5A52-285E-4E7E-83B8-508079DBCEAE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*",
              "matchCriteriaId": "674BE2D9-009B-46C5-A071-CB10368B8D48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*",
              "matchCriteriaId": "703486E5-906B-4BDB-A046-28D4D73E3F03",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*",
              "matchCriteriaId": "ABB5AC0D-2358-4C8E-99B5-2CE0A678F549",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*",
              "matchCriteriaId": "38B37184-BA88-44F1-AC9E-8B60C2419111",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*",
              "matchCriteriaId": "0D8C9247-3E18-4DD9-AF5B-B2996C76443F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*",
              "matchCriteriaId": "0EEA2CDD-7FCD-461E-90FC-CDB3C3992A32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*",
              "matchCriteriaId": "D7B877A8-5318-402E-8AE1-753E7419060F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*",
              "matchCriteriaId": "A3938420-087D-4D92-A2F8-EAE54D9837EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:s-390:*:*:*:*:*",
              "matchCriteriaId": "EFB8DE9F-2130-49E9-85EE-6793ED9FBEED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "10F42CF8-FB98-4AFC-96C5-FD7D442B0FA3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59C23FB-E223-4EED-8F69-3CC1EE7DF148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "989D5040-13B3-4D76-A516-81CAB112FE44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:turba_contact_manager:2.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6476A5E9-779F-4CBC-9C49-42AADD427B91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book."
    },
    {
      "lang": "es",
      "value": "lib/Driver/sql.php en Turba 2 (turba2) Contact Manager H3 2.1.x antes de 2.1.7 y 2.2.x antes de 2.2-RC3, como se usa en productos como Horde Groupware antes de 1.0.4 y Horde Groupware Webmail Edition antes de 1.0.5, no comprueba correctamente los privilegios de acceso, lo que permite a usuarios autentificados remotamente modificar datos de direcci\u00f3n a trav\u00e9s de un par\u00e1metro object_id modificado a edit.php, como se demostr\u00f3 modificando una entrada personal en la libreta de direcciones cuando hay un acceso de escritura a una libreta de direcciones compartida."
    }
  ],
  "id": "CVE-2008-0807",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-02-19T01:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000378.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000379.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000380.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000381.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28982"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29071"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29184"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29185"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29186"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1507"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27844"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019433"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0593/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000378.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000379.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000380.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000381.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28982"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27844"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019433"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0593/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-09-13 22:30
Modified
2025-04-09 00:30
Severity ?
Summary
Horde Kronolith H3 2.1 before 2.1.7 and 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and H3 2.2 before 2.2-RC2; Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 does not validate ownership when performing share changes, which has unknown impact and attack vectors.
References
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000362.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000363.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000364.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000365.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000366.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000368.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000369.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000371.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000376.htmlPatch
cve@mitre.orghttp://lists.horde.org/archives/announce/2008/000377.htmlPatch
cve@mitre.orghttp://secunia.com/advisories/28382Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/27217Patch
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000362.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000363.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000364.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000365.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000366.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000368.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000369.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000371.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000376.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/announce/2008/000377.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28382Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27217Patch
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C2653B-7F0B-4628-9E77-44744BC05463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B574D428-0A3A-47CA-A926-5C936F83919A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BBB036-494E-41D4-BD04-40906FAB5C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A30F59C-D09A-495D-B5E5-E908D913164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B013D26B-BE67-4131-B320-EF87D19E9C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "664B0D12-607C-4B5F-AC8E-FB1BBD1332E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "46ADF628-449A-463E-A459-69FD9DB2ADAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "391F88AC-0D1B-4F13-874C-6FD3C6E90CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C5E6E0C-7E94-4187-B53B-1BBB73C23EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDCD1651-0610-4338-9EA6-343865AA9F86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A557A-EC2D-40AF-88C7-208DB4E8FA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "733B59F3-1648-4875-9A9B-EC3BCA49BCEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "012BBA79-F969-405E-BBC8-FDC23DE25012",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A06B44D-9448-4C96-BD37-790DA9842BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith_h3:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B67D985-950E-42B5-BA8D-05AE8A3EE3EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:mnemo_h3:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2814A27-E3C4-4A69-8FEB-E4900CD9876D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:mnemo_h3:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4CAC140-EA0B-4FFD-B8E7-3295623C6D81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:mnemo_h3:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "38397885-FDB3-4454-BFBB-2B28173FEC79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:nag_h3:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "08307428-AE78-453B-A121-15AEB7049EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:nag_h3:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "195D72BA-A0A6-4568-BC67-77A44F9E0697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:nag_h3:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F7853DA-0958-401B-83C6-E35FACA4AAF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:nag_h3:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2BD1454-1D33-4026-A7F6-ADB358D3DC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:nag_h3:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "184A2E09-5784-44C4-A5D9-87EA906F86E1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Horde Kronolith H3 2.1 before 2.1.7 and 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and H3 2.2 before 2.2-RC2; Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 does not validate ownership when performing share changes, which has unknown impact and attack vectors."
    },
    {
      "lang": "es",
      "value": "Horde Kronolith H3 v2.1 anterior v2.1.7 y v2.2 anterior v2.2-RC2; Nag H3 v2.1 anterior v2.1.4 y 2.2 anterior v2.2-RC2; Mnemo H3 v2.1 anterior v2.1.2 y H3 2.2 anterior v2.2-RC2; Groupware v1.0 anterior v1.0.3 y v1.1 anterior v1.1-RC2; y Groupware Webmail Edition v1.0 anterior v1.0.4 y v1.1 anterior v1.1-RC2, no valida las propiedades al compartir cambios, con un impacto y vectores de ataque desconocidos."
    }
  ],
  "id": "CVE-2008-7219",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-09-13T22:30:00.420",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000362.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000363.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000364.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000365.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000366.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000368.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000369.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000371.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000376.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000377.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28382"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27217"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000362.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000363.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000364.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000365.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000366.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000368.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000369.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000371.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000376.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://lists.horde.org/archives/announce/2008/000377.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28382"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-04-27 19:05
Modified
2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
References
cve@mitre.orghttp://forum.aria-security.com/showthread.php?t=49Exploit
cve@mitre.orghttp://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html
cve@mitre.orghttp://osvdb.org/51238
cve@mitre.orghttp://secunia.com/advisories/29920Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/30649
cve@mitre.orghttp://securityreason.com/securityalert/3831
cve@mitre.orghttp://www.securityfocus.com/archive/1/491230/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/28898Exploit
cve@mitre.orghttp://www.securitytracker.com/id?1019934
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/1373/references
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41974
cve@mitre.orghttps://www.debian.org/security/2008/dsa-1560
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html
af854a3a-2127-422b-91ae-364da2661108http://forum.aria-security.com/showthread.php?t=49Exploit
af854a3a-2127-422b-91ae-364da2661108http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/51238
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29920Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30649
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3831
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/491230/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28898Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019934
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1373/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41974
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2008/dsa-1560
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html
Impacted products
Vendor Product Version
horde groupware 1.0.5
horde groupware_webmail_edition 1.0.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3AB0176-9CB3-4D49-B644-2C413C9B6E13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "842159D1-E30C-4077-8E92-07979E52C10B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de \u00f3rdenes en sitios cruzados (XSS) en addevent.php de Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, y Groupware 1.0.5 permite a atacantes remotos inyectar \u0027script\u0027 web o HTML de su elecci\u00f3n mediante el par\u00e1metro \"url\"."
    }
  ],
  "id": "CVE-2008-1974",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-04-27T19:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://forum.aria-security.com/showthread.php?t=49"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/51238"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29920"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/30649"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3831"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/491230/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/28898"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019934"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/1373/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41974"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.debian.org/security/2008/dsa-1560"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://forum.aria-security.com/showthread.php?t=49"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/51238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29920"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30649"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3831"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/491230/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/28898"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019934"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1373/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2008/dsa-1560"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-06-19 20:41
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12221711-3AF8-477A-B61B-E65AD45C06B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED443641-1A9E-49FA-8478-BEEC8C692F91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:kronolith:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BF59A10-210E-4590-8334-3A7274705E5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de secuencia de comandos en sitios cruzados (XSS) en Horde Groupware, Groupware Webmail Edition y Kronolith, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro timestamp en (1) week.php, (2) workweek.php y (3) day.php; y (4) par\u00e1metro horde en PATH_INFO de la URI por defeceto. NOTA: el origen de esta informaci\u00f3n es desconocido; los detalles se han obtenido \u00fanicamente de informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2008-2783",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-06-19T20:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/29365"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42640"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/29365"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42640"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-01-24 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Horde_Form in Horde Groupware Webmail Edition before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to email verification. NOTE: Some of these details are obtained from third party information.
Impacted products
Vendor Product Version
horde groupware_webmail_edition *
horde groupware_webmail_edition 1.0
horde groupware_webmail_edition 1.0
horde groupware_webmail_edition 1.0
horde groupware_webmail_edition 1.0.1
horde groupware_webmail_edition 1.0.2
horde groupware_webmail_edition 1.0.3
horde groupware_webmail_edition 1.0.4
horde groupware_webmail_edition 1.0.5
horde groupware_webmail_edition 1.0.6
horde groupware_webmail_edition 1.0.7
horde groupware_webmail_edition 1.0.8
horde groupware_webmail_edition 1.1
horde groupware_webmail_edition 1.1
horde groupware_webmail_edition 1.1
horde groupware_webmail_edition 1.1
horde groupware_webmail_edition 1.1
horde groupware_webmail_edition 1.1.1
horde groupware_webmail_edition 1.1.2
horde groupware_webmail_edition 1.1.3
horde groupware_webmail_edition 1.1.4
horde groupware_webmail_edition 1.1.5
horde groupware_webmail_edition 1.1.6
horde groupware_webmail_edition 1.2
horde groupware_webmail_edition 1.2
horde groupware_webmail_edition 1.2.1
horde groupware_webmail_edition 1.2.2
horde groupware_webmail_edition 1.2.3
horde groupware_webmail_edition 1.2.3
horde groupware_webmail_edition 1.2.4
horde groupware_webmail_edition 1.2.5
horde groupware_webmail_edition 1.2.6
horde groupware_webmail_edition 1.2.7
horde groupware_webmail_edition 1.2.8
horde groupware_webmail_edition 1.2.9
horde groupware_webmail_edition 1.2.10
horde groupware_webmail_edition 4.0
horde groupware_webmail_edition 4.0
horde groupware_webmail_edition 4.0
horde groupware_webmail_edition 4.0.1
horde groupware_webmail_edition 4.0.2
horde groupware_webmail_edition 4.0.3
horde groupware_webmail_edition 4.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0BA941-3235-46CB-A368-7E17482B0A15",
              "versionEndIncluding": "4.0.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A30F59C-D09A-495D-B5E5-E908D913164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "48205A35-1F67-4E90-A891-29AA4D2CC138",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "276A0BB9-6808-4901-8EEB-766AF6EE4E3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E367E84-DD66-4512-BCDE-7D7E62B72A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B013D26B-BE67-4131-B320-EF87D19E9C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "664B0D12-607C-4B5F-AC8E-FB1BBD1332E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "989D5040-13B3-4D76-A516-81CAB112FE44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA0765C9-BBFB-4676-9D79-0CFD86BCF9E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "842159D1-E30C-4077-8E92-07979E52C10B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D9B15F-C3CA-44DF-BF5E-51741793348B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "359D7ED8-E171-4822-B2F3-80E07287A787",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "46ADF628-449A-463E-A459-69FD9DB2ADAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5E8F448D-DFB5-4BA3-BD28-13E39FF82A9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "5C783DC9-4379-49A8-A026-D1F933DB36AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "2AD6F3C8-50F8-4E9B-98EA-8962B2310780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "36CFEF77-BE64-4547-9A5F-DABD589C5ED0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C7522F6-DF2C-4225-932F-2D27C1EFD792",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BE7A07-3455-4A18-BDBC-DC261B35D427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "503BB3EF-2BDC-4019-8EE2-B121A2600DB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "54DA4725-AAA4-4A4B-B6A4-9A139A6176AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA22094F-3A01-4B66-99E1-0ED9D5574F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D105C44-38EE-4D86-9334-DA0E8A08B725",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C145E10-4AC0-4F25-9D98-64447BB7C103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "461A597A-93DD-4A12-BB04-C02277317C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B256AACA-93C8-447A-AB08-ABF0A9E4E63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D634210-6D2D-4181-8310-73FB5B9872D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C10C8DB-FB73-4982-8B92-D3E1FB1C59A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "319BC54E-2A0B-4033-AD73-3E8825E8D9B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A86680C-839E-4EED-9B32-CE101DC7B6B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0F1DCA-7D9F-42E3-9FB9-D3C100F09A58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BFADDD4-8B5E-4EE7-A390-CDFD48CE3ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F5FB253-C2E5-48F3-B13F-79C45024D89D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7D0D17F-B2E4-496D-9ACD-170C33B453F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6314FAC0-544A-492F-81BA-9169EB69E74D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "70CC6175-10F8-4DD9-A1E7-202F5F4A221C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ED61953-A384-498C-AFFD-F83ADF51CFD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EC13F5CD-2BB9-4FA7-BE4C-D2175E18E063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "FFF8191E-F2EA-4071-B26D-8E45103D4A0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "040AC7A5-689B-4F12-A199-FB395E4CB84B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFD1571-C070-4B5F-9BA3-5B1789068396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0909400D-75C6-4DED-8C77-333D8F092AA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "08050D4C-6620-4177-9967-044AD2B9368B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Horde_Form in Horde Groupware Webmail Edition before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to email verification.  NOTE: Some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "Vulnerbilidad de ejecuci\u00f3n de secuencias de comandos web en sitios cruzados (XSS) en Horde_Form en Horde Groupware Webmail Edition anterior a v4.0.6 permite a atacantes remotos inyectar c\u00f3digo HTML o script web a trav\u00e9s de vectores no especificados, relacionados con una verificaci\u00f3n de correo. NOTA: Algunos de estos detalles han sido obtenidos de terceras partes de informaci\u00f3n."
    }
  ],
  "id": "CVE-2012-0909",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-01-24T18:55:01.550",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47592"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.horde.org/apps/webmail/docs/CHANGES"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/51586"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47592"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.horde.org/apps/webmail/docs/CHANGES"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/51586"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2008-3650 (GCVE-0-2008-3650)
Vulnerability from cvelistv5
Published
2008-08-13 01:00
Modified
2024-08-07 09:45
Severity ?
CWE
  • n/a
Summary
Multiple unspecified vulnerabilities in Horde Groupware Webmail before Edition 1.1.1 (final) have unknown impact and attack vectors related to "unescaped output," possibly cross-site scripting (XSS), in the (1) object browser and (2) contact view.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:45:18.949Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "hordegroupwarewebmail-multiple-unspecified(44479)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44479"
          },
          {
            "name": "[horde-announce] 20080614 [announce] Horde Groupware Webmail Edition 1.1.1 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000420.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Horde Groupware Webmail before Edition 1.1.1 (final) have unknown impact and attack vectors related to \"unescaped output,\" possibly cross-site scripting (XSS), in the (1) object browser and (2) contact view."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "hordegroupwarewebmail-multiple-unspecified(44479)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44479"
        },
        {
          "name": "[horde-announce] 20080614 [announce] Horde Groupware Webmail Edition 1.1.1 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000420.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3650",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Horde Groupware Webmail before Edition 1.1.1 (final) have unknown impact and attack vectors related to \"unescaped output,\" possibly cross-site scripting (XSS), in the (1) object browser and (2) contact view."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "hordegroupwarewebmail-multiple-unspecified(44479)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44479"
            },
            {
              "name": "[horde-announce] 20080614 [announce] Horde Groupware Webmail Edition 1.1.1 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000420.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3650",
    "datePublished": "2008-08-13T01:00:00",
    "dateReserved": "2008-08-12T00:00:00",
    "dateUpdated": "2024-08-07T09:45:18.949Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0807 (GCVE-0-2008-0807)
Vulnerability from cvelistv5
Published
2008-02-19 00:00
Modified
2024-08-07 08:01
Severity ?
CWE
  • n/a
Summary
lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book.
References
http://secunia.com/advisories/29186third-party-advisory, x_refsource_SECUNIA
http://lists.horde.org/archives/announce/2008/000381.htmlmailing-list, x_refsource_MLIST
https://bugzilla.redhat.com/show_bug.cgi?id=432027x_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/27844vdb-entry, x_refsource_BID
http://www.debian.org/security/2008/dsa-1507vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/28982third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29071third-party-advisory, x_refsource_SECUNIA
http://lists.horde.org/archives/announce/2008/000378.htmlmailing-list, x_refsource_MLIST
http://www.vupen.com/english/advisories/2008/0593/referencesvdb-entry, x_refsource_VUPEN
http://lists.horde.org/archives/announce/2008/000379.htmlmailing-list, x_refsource_MLIST
http://secunia.com/advisories/29185third-party-advisory, x_refsource_SECUNIA
http://lists.horde.org/archives/announce/2008/000380.htmlmailing-list, x_refsource_MLIST
http://www.securitytracker.com/id?1019433vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/29184third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.htmlvendor-advisory, x_refsource_FEDORA
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:01:38.898Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "29186",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29186"
          },
          {
            "name": "[announce] 20080215 Horde Groupware Webmail Edition 1.0.5 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000381.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027"
          },
          {
            "name": "FEDORA-2008-2087",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html"
          },
          {
            "name": "27844",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27844"
          },
          {
            "name": "DSA-1507",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1507"
          },
          {
            "name": "28982",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28982"
          },
          {
            "name": "29071",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29071"
          },
          {
            "name": "[announce] 20080215 Turba H3 (2.1.7) (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000378.html"
          },
          {
            "name": "ADV-2008-0593",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0593/references"
          },
          {
            "name": "[announce] 20080215 Turba H3 (2.2-RC3)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000379.html"
          },
          {
            "name": "29185",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29185"
          },
          {
            "name": "[announce] 20080215 Horde Groupware 1.0.4 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000380.html"
          },
          {
            "name": "1019433",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019433"
          },
          {
            "name": "29184",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29184"
          },
          {
            "name": "FEDORA-2008-2040",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-03-05T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "29186",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29186"
        },
        {
          "name": "[announce] 20080215 Horde Groupware Webmail Edition 1.0.5 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000381.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027"
        },
        {
          "name": "FEDORA-2008-2087",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html"
        },
        {
          "name": "27844",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27844"
        },
        {
          "name": "DSA-1507",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1507"
        },
        {
          "name": "28982",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28982"
        },
        {
          "name": "29071",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29071"
        },
        {
          "name": "[announce] 20080215 Turba H3 (2.1.7) (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000378.html"
        },
        {
          "name": "ADV-2008-0593",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0593/references"
        },
        {
          "name": "[announce] 20080215 Turba H3 (2.2-RC3)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000379.html"
        },
        {
          "name": "29185",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29185"
        },
        {
          "name": "[announce] 20080215 Horde Groupware 1.0.4 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000380.html"
        },
        {
          "name": "1019433",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019433"
        },
        {
          "name": "29184",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29184"
        },
        {
          "name": "FEDORA-2008-2040",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0807",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "29186",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29186"
            },
            {
              "name": "[announce] 20080215 Horde Groupware Webmail Edition 1.0.5 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000381.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=432027",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027"
            },
            {
              "name": "FEDORA-2008-2087",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html"
            },
            {
              "name": "27844",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27844"
            },
            {
              "name": "DSA-1507",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1507"
            },
            {
              "name": "28982",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28982"
            },
            {
              "name": "29071",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29071"
            },
            {
              "name": "[announce] 20080215 Turba H3 (2.1.7) (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000378.html"
            },
            {
              "name": "ADV-2008-0593",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0593/references"
            },
            {
              "name": "[announce] 20080215 Turba H3 (2.2-RC3)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000379.html"
            },
            {
              "name": "29185",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29185"
            },
            {
              "name": "[announce] 20080215 Horde Groupware 1.0.4 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000380.html"
            },
            {
              "name": "1019433",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019433"
            },
            {
              "name": "29184",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29184"
            },
            {
              "name": "FEDORA-2008-2040",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0807",
    "datePublished": "2008-02-19T00:00:00",
    "dateReserved": "2008-02-18T00:00:00",
    "dateUpdated": "2024-08-07T08:01:38.898Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1284 (GCVE-0-2008-1284)
Vulnerability from cvelistv5
Published
2008-03-11 00:00
Modified
2024-08-07 08:17
Severity ?
CWE
  • n/a
Summary
Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via ".." sequences and a null byte in the theme name.
References
http://securityreason.com/securityalert/3726third-party-advisory, x_refsource_SREASON
http://secunia.com/advisories/29286third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/41054vdb-entry, x_refsource_XF
http://lists.horde.org/archives/announce/2008/000383.htmlmailing-list, x_refsource_MLIST
http://lists.horde.org/archives/announce/2008/000384.htmlmailing-list, x_refsource_MLIST
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/archive/1/489239/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://security.gentoo.org/glsa/glsa-200805-01.xmlvendor-advisory, x_refsource_GENTOO
http://www.debian.org/security/2008/dsa-1519vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/30047third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/29374third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/489289/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://lists.horde.org/archives/announce/2008/000382.htmlmailing-list, x_refsource_MLIST
http://www.vupen.com/english/advisories/2008/0822/referencesvdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/28153vdb-entry, x_refsource_BID
http://secunia.com/advisories/29400third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.567Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3726",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3726"
          },
          {
            "name": "29286",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29286"
          },
          {
            "name": "horde-theme-file-include(41054)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41054"
          },
          {
            "name": "[announce] 20080307  Horde Groupware 1.0.5 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000383.html"
          },
          {
            "name": "[announce] 20080307  Horde Groupware Webmail Edition 1.0.6 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000384.html"
          },
          {
            "name": "FEDORA-2008-2406",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html"
          },
          {
            "name": "20080307 Horde Webmail file inclusion proof of concept \u0026 patch.",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/489239/100/0/threaded"
          },
          {
            "name": "GLSA-200805-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200805-01.xml"
          },
          {
            "name": "DSA-1519",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1519"
          },
          {
            "name": "30047",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30047"
          },
          {
            "name": "FEDORA-2008-2362",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html"
          },
          {
            "name": "29374",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29374"
          },
          {
            "name": "20080308 Re: Horde Webmail file inclusion proof of concept \u0026 patch.",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/489289/100/0/threaded"
          },
          {
            "name": "[announce] 20080307 Horde 3.1.7 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000382.html"
          },
          {
            "name": "ADV-2008-0822",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0822/references"
          },
          {
            "name": "28153",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28153"
          },
          {
            "name": "29400",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29400"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via \"..\" sequences and a null byte in the theme name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "3726",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3726"
        },
        {
          "name": "29286",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29286"
        },
        {
          "name": "horde-theme-file-include(41054)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41054"
        },
        {
          "name": "[announce] 20080307  Horde Groupware 1.0.5 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000383.html"
        },
        {
          "name": "[announce] 20080307  Horde Groupware Webmail Edition 1.0.6 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000384.html"
        },
        {
          "name": "FEDORA-2008-2406",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html"
        },
        {
          "name": "20080307 Horde Webmail file inclusion proof of concept \u0026 patch.",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/489239/100/0/threaded"
        },
        {
          "name": "GLSA-200805-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200805-01.xml"
        },
        {
          "name": "DSA-1519",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1519"
        },
        {
          "name": "30047",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30047"
        },
        {
          "name": "FEDORA-2008-2362",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html"
        },
        {
          "name": "29374",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29374"
        },
        {
          "name": "20080308 Re: Horde Webmail file inclusion proof of concept \u0026 patch.",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/489289/100/0/threaded"
        },
        {
          "name": "[announce] 20080307 Horde 3.1.7 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000382.html"
        },
        {
          "name": "ADV-2008-0822",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0822/references"
        },
        {
          "name": "28153",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28153"
        },
        {
          "name": "29400",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29400"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1284",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via \"..\" sequences and a null byte in the theme name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3726",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3726"
            },
            {
              "name": "29286",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29286"
            },
            {
              "name": "horde-theme-file-include(41054)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41054"
            },
            {
              "name": "[announce] 20080307  Horde Groupware 1.0.5 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000383.html"
            },
            {
              "name": "[announce] 20080307  Horde Groupware Webmail Edition 1.0.6 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000384.html"
            },
            {
              "name": "FEDORA-2008-2406",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html"
            },
            {
              "name": "20080307 Horde Webmail file inclusion proof of concept \u0026 patch.",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/489239/100/0/threaded"
            },
            {
              "name": "GLSA-200805-01",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200805-01.xml"
            },
            {
              "name": "DSA-1519",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1519"
            },
            {
              "name": "30047",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30047"
            },
            {
              "name": "FEDORA-2008-2362",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html"
            },
            {
              "name": "29374",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29374"
            },
            {
              "name": "20080308 Re: Horde Webmail file inclusion proof of concept \u0026 patch.",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/489289/100/0/threaded"
            },
            {
              "name": "[announce] 20080307 Horde 3.1.7 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000382.html"
            },
            {
              "name": "ADV-2008-0822",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0822/references"
            },
            {
              "name": "28153",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28153"
            },
            {
              "name": "29400",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29400"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1284",
    "datePublished": "2008-03-11T00:00:00",
    "dateReserved": "2008-03-10T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.567Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0791 (GCVE-0-2012-0791)
Vulnerability from cvelistv5
Published
2012-01-24 18:00
Modified
2024-08-06 18:38
Severity ?
CWE
  • n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Horde IMP before 5.0.18 and Horde Groupware Webmail Edition before 4.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) composeCache, (2) rtemode, or (3) filename_* parameters to the compose page; (4) formname parameter to the contacts popup window; or (5) IMAP mailbox names. NOTE: some of these details are obtained from third party information.
References
http://www.horde.org/apps/webmail/docs/CHANGESx_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2485vendor-advisory, x_refsource_DEBIAN
http://www.horde.org/apps/webmail/docs/RELEASE_NOTESx_refsource_CONFIRM
http://www.securitytracker.com/id?1026553vdb-entry, x_refsource_SECTRACK
http://www.horde.org/apps/imp/docs/RELEASE_NOTESx_refsource_CONFIRM
http://www.securityfocus.com/bid/51586vdb-entry, x_refsource_BID
http://secunia.com/advisories/47580third-party-advisory, x_refsource_SECUNIA
http://www.horde.org/apps/imp/docs/CHANGESx_refsource_CONFIRM
http://www.securitytracker.com/id?1026554vdb-entry, x_refsource_SECTRACK
http://www.openwall.com/lists/oss-security/2012/01/22/2mailing-list, x_refsource_MLIST
http://secunia.com/advisories/47592third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:14.284Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.horde.org/apps/webmail/docs/CHANGES"
          },
          {
            "name": "DSA-2485",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2485"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES"
          },
          {
            "name": "1026553",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026553"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.horde.org/apps/imp/docs/RELEASE_NOTES"
          },
          {
            "name": "51586",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51586"
          },
          {
            "name": "47580",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47580"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.horde.org/apps/imp/docs/CHANGES"
          },
          {
            "name": "1026554",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026554"
          },
          {
            "name": "[oss-security] 20120121 Re: Re: CVE Request -- Horde IMP -- Multiple XSS flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2"
          },
          {
            "name": "47592",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47592"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-01-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde IMP before 5.0.18 and Horde Groupware Webmail Edition before 4.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) composeCache, (2) rtemode, or (3) filename_* parameters to the compose page; (4) formname parameter to the contacts popup window; or (5) IMAP mailbox names.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-17T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.horde.org/apps/webmail/docs/CHANGES"
        },
        {
          "name": "DSA-2485",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2485"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES"
        },
        {
          "name": "1026553",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026553"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.horde.org/apps/imp/docs/RELEASE_NOTES"
        },
        {
          "name": "51586",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51586"
        },
        {
          "name": "47580",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47580"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.horde.org/apps/imp/docs/CHANGES"
        },
        {
          "name": "1026554",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026554"
        },
        {
          "name": "[oss-security] 20120121 Re: Re: CVE Request -- Horde IMP -- Multiple XSS flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2"
        },
        {
          "name": "47592",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47592"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-0791",
    "datePublished": "2012-01-24T18:00:00",
    "dateReserved": "2012-01-19T00:00:00",
    "dateUpdated": "2024-08-06T18:38:14.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1974 (GCVE-0-2008-1974)
Vulnerability from cvelistv5
Published
2008-04-27 19:00
Modified
2024-08-07 08:41
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:41:00.156Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "51238",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/51238"
          },
          {
            "name": "FEDORA-2008-3460",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html"
          },
          {
            "name": "29920",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29920"
          },
          {
            "name": "28898",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28898"
          },
          {
            "name": "30649",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30649"
          },
          {
            "name": "1019934",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019934"
          },
          {
            "name": "FEDORA-2008-3543",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html"
          },
          {
            "name": "20080422 Horde Webmail XSS [Aria-Security]",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/491230/100/0/threaded"
          },
          {
            "name": "horde-webmail-addevent-xss(41974)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41974"
          },
          {
            "name": "ADV-2008-1373",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1373/references"
          },
          {
            "name": "DSA-1560",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2008/dsa-1560"
          },
          {
            "name": "3831",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3831"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://forum.aria-security.com/showthread.php?t=49"
          },
          {
            "name": "[kronolith] 20080427 Kronolith H3 (2.1.8) (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-04-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "51238",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/51238"
        },
        {
          "name": "FEDORA-2008-3460",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html"
        },
        {
          "name": "29920",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29920"
        },
        {
          "name": "28898",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28898"
        },
        {
          "name": "30649",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30649"
        },
        {
          "name": "1019934",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019934"
        },
        {
          "name": "FEDORA-2008-3543",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html"
        },
        {
          "name": "20080422 Horde Webmail XSS [Aria-Security]",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/491230/100/0/threaded"
        },
        {
          "name": "horde-webmail-addevent-xss(41974)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41974"
        },
        {
          "name": "ADV-2008-1373",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1373/references"
        },
        {
          "name": "DSA-1560",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2008/dsa-1560"
        },
        {
          "name": "3831",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3831"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://forum.aria-security.com/showthread.php?t=49"
        },
        {
          "name": "[kronolith] 20080427 Kronolith H3 (2.1.8) (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1974",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "51238",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/51238"
            },
            {
              "name": "FEDORA-2008-3460",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html"
            },
            {
              "name": "29920",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29920"
            },
            {
              "name": "28898",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28898"
            },
            {
              "name": "30649",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30649"
            },
            {
              "name": "1019934",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019934"
            },
            {
              "name": "FEDORA-2008-3543",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html"
            },
            {
              "name": "20080422 Horde Webmail XSS [Aria-Security]",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/491230/100/0/threaded"
            },
            {
              "name": "horde-webmail-addevent-xss(41974)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41974"
            },
            {
              "name": "ADV-2008-1373",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1373/references"
            },
            {
              "name": "DSA-1560",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2008/dsa-1560"
            },
            {
              "name": "3831",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3831"
            },
            {
              "name": "http://forum.aria-security.com/showthread.php?t=49",
              "refsource": "MISC",
              "url": "http://forum.aria-security.com/showthread.php?t=49"
            },
            {
              "name": "[kronolith] 20080427 Kronolith H3 (2.1.8) (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1974",
    "datePublished": "2008-04-27T19:00:00",
    "dateReserved": "2008-04-27T00:00:00",
    "dateUpdated": "2024-08-07T08:41:00.156Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-6018 (GCVE-0-2007-6018)
Vulnerability from cvelistv5
Published
2008-01-11 02:00
Modified
2024-08-07 15:54
Severity ?
CWE
  • n/a
Summary
IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) "purge" deleted emails via a crafted email message.
References
http://secunia.com/advisories/29186third-party-advisory, x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=428625x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.htmlvendor-advisory, x_refsource_SUSE
https://exchange.xforce.ibmcloud.com/vulnerabilities/39595vdb-entry, x_refsource_XF
http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17&r2=1.17.2.1&ty=hx_refsource_CONFIRM
http://lists.horde.org/archives/announce/2008/000365.htmlmailing-list, x_refsource_MLIST
http://lists.horde.org/archives/announce/2008/000360.htmlmailing-list, x_refsource_MLIST
http://secunia.com/advisories/34418third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/27223vdb-entry, x_refsource_BID
http://lists.horde.org/archives/announce/2008/000366.htmlmailing-list, x_refsource_MLIST
http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12&r2=1.12.2.1&ty=hx_refsource_CONFIRM
http://secunia.com/secunia_research/2007-102/advisory/x_refsource_MISC
http://secunia.com/advisories/28020third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29185third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28546third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29184third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1470vendor-advisory, x_refsource_DEBIAN
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.htmlvendor-advisory, x_refsource_FEDORA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:54:25.651Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "29186",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29186"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428625"
          },
          {
            "name": "SUSE-SR:2009:007",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"
          },
          {
            "name": "horde-impgroupware-filter-security-bypass(39595)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39595"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17\u0026r2=1.17.2.1\u0026ty=h"
          },
          {
            "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000365.html"
          },
          {
            "name": "[announce] 20080109 Horde 3.1.6 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000360.html"
          },
          {
            "name": "34418",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34418"
          },
          {
            "name": "FEDORA-2008-2087",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html"
          },
          {
            "name": "27223",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27223"
          },
          {
            "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000366.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12\u0026r2=1.12.2.1\u0026ty=h"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2007-102/advisory/"
          },
          {
            "name": "28020",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28020"
          },
          {
            "name": "29185",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29185"
          },
          {
            "name": "28546",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28546"
          },
          {
            "name": "29184",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29184"
          },
          {
            "name": "DSA-1470",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1470"
          },
          {
            "name": "FEDORA-2008-2040",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-01-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) \"purge\" deleted emails via a crafted email message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
        "shortName": "flexera"
      },
      "references": [
        {
          "name": "29186",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29186"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428625"
        },
        {
          "name": "SUSE-SR:2009:007",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"
        },
        {
          "name": "horde-impgroupware-filter-security-bypass(39595)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39595"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17\u0026r2=1.17.2.1\u0026ty=h"
        },
        {
          "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000365.html"
        },
        {
          "name": "[announce] 20080109 Horde 3.1.6 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000360.html"
        },
        {
          "name": "34418",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34418"
        },
        {
          "name": "FEDORA-2008-2087",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html"
        },
        {
          "name": "27223",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27223"
        },
        {
          "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000366.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12\u0026r2=1.12.2.1\u0026ty=h"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2007-102/advisory/"
        },
        {
          "name": "28020",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28020"
        },
        {
          "name": "29185",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29185"
        },
        {
          "name": "28546",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28546"
        },
        {
          "name": "29184",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29184"
        },
        {
          "name": "DSA-1470",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1470"
        },
        {
          "name": "FEDORA-2008-2040",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
          "ID": "CVE-2007-6018",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) \"purge\" deleted emails via a crafted email message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "29186",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29186"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=428625",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428625"
            },
            {
              "name": "SUSE-SR:2009:007",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"
            },
            {
              "name": "horde-impgroupware-filter-security-bypass(39595)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39595"
            },
            {
              "name": "http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17\u0026r2=1.17.2.1\u0026ty=h",
              "refsource": "CONFIRM",
              "url": "http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17\u0026r2=1.17.2.1\u0026ty=h"
            },
            {
              "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000365.html"
            },
            {
              "name": "[announce] 20080109 Horde 3.1.6 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000360.html"
            },
            {
              "name": "34418",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34418"
            },
            {
              "name": "FEDORA-2008-2087",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html"
            },
            {
              "name": "27223",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27223"
            },
            {
              "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000366.html"
            },
            {
              "name": "http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12\u0026r2=1.12.2.1\u0026ty=h",
              "refsource": "CONFIRM",
              "url": "http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12\u0026r2=1.12.2.1\u0026ty=h"
            },
            {
              "name": "http://secunia.com/secunia_research/2007-102/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2007-102/advisory/"
            },
            {
              "name": "28020",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28020"
            },
            {
              "name": "29185",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29185"
            },
            {
              "name": "28546",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28546"
            },
            {
              "name": "29184",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29184"
            },
            {
              "name": "DSA-1470",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1470"
            },
            {
              "name": "FEDORA-2008-2040",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
    "assignerShortName": "flexera",
    "cveId": "CVE-2007-6018",
    "datePublished": "2008-01-11T02:00:00",
    "dateReserved": "2007-11-19T00:00:00",
    "dateUpdated": "2024-08-07T15:54:25.651Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0909 (GCVE-0-2012-0909)
Vulnerability from cvelistv5
Published
2012-01-24 18:00
Modified
2024-09-17 04:05
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in Horde_Form in Horde Groupware Webmail Edition before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to email verification. NOTE: Some of these details are obtained from third party information.
References
http://www.horde.org/apps/webmail/docs/CHANGESx_refsource_CONFIRM
http://www.horde.org/apps/webmail/docs/RELEASE_NOTESx_refsource_CONFIRM
http://www.securityfocus.com/bid/51586vdb-entry, x_refsource_BID
http://www.openwall.com/lists/oss-security/2012/01/22/2mailing-list, x_refsource_MLIST
http://secunia.com/advisories/47592third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:14.872Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.horde.org/apps/webmail/docs/CHANGES"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES"
          },
          {
            "name": "51586",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51586"
          },
          {
            "name": "[oss-security] 20120121 Re: Re: CVE Request -- Horde IMP -- Multiple XSS flaws",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2"
          },
          {
            "name": "47592",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47592"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Horde_Form in Horde Groupware Webmail Edition before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to email verification.  NOTE: Some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-01-24T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.horde.org/apps/webmail/docs/CHANGES"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES"
        },
        {
          "name": "51586",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51586"
        },
        {
          "name": "[oss-security] 20120121 Re: Re: CVE Request -- Horde IMP -- Multiple XSS flaws",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2"
        },
        {
          "name": "47592",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47592"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-0909",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Horde_Form in Horde Groupware Webmail Edition before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to email verification.  NOTE: Some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.horde.org/apps/webmail/docs/CHANGES",
              "refsource": "CONFIRM",
              "url": "http://www.horde.org/apps/webmail/docs/CHANGES"
            },
            {
              "name": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES",
              "refsource": "CONFIRM",
              "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES"
            },
            {
              "name": "51586",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51586"
            },
            {
              "name": "[oss-security] 20120121 Re: Re: CVE Request -- Horde IMP -- Multiple XSS flaws",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2"
            },
            {
              "name": "47592",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/47592"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-0909",
    "datePublished": "2012-01-24T18:00:00Z",
    "dateReserved": "2012-01-21T00:00:00Z",
    "dateUpdated": "2024-09-17T04:05:11.572Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-7219 (GCVE-0-2008-7219)
Vulnerability from cvelistv5
Published
2009-09-13 22:00
Modified
2024-09-17 01:06
Severity ?
CWE
  • n/a
Summary
Horde Kronolith H3 2.1 before 2.1.7 and 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and H3 2.2 before 2.2-RC2; Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 does not validate ownership when performing share changes, which has unknown impact and attack vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:56:14.482Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[announce] 20080122 Kronolith H3 (2.2-RC2)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000371.html"
          },
          {
            "name": "[announce] 20080122 Mnemo H3 (2.2-RC2)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000369.html"
          },
          {
            "name": "[announce] 20080109 Nag H3 (2.1.4) (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000363.html"
          },
          {
            "name": "27217",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27217"
          },
          {
            "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000365.html"
          },
          {
            "name": "[announce] 20080206 Horde Groupware 1.1-RC2",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000376.html"
          },
          {
            "name": "FEDORA-2008-2212",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html"
          },
          {
            "name": "[announce] 20080109 Mnemo H3 (2.1.2) (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000364.html"
          },
          {
            "name": "28382",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28382"
          },
          {
            "name": "[announce] 20080206 Horde Groupware Webmail Edition 1.1-RC2",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000377.html"
          },
          {
            "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000366.html"
          },
          {
            "name": "[announce] 20080109 Kronolith H3 (2.1.7) (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000362.html"
          },
          {
            "name": "[announce] 20080122 Nag H3 (2.2-RC2)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000368.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Horde Kronolith H3 2.1 before 2.1.7 and 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and H3 2.2 before 2.2-RC2; Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 does not validate ownership when performing share changes, which has unknown impact and attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-09-13T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[announce] 20080122 Kronolith H3 (2.2-RC2)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000371.html"
        },
        {
          "name": "[announce] 20080122 Mnemo H3 (2.2-RC2)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000369.html"
        },
        {
          "name": "[announce] 20080109 Nag H3 (2.1.4) (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000363.html"
        },
        {
          "name": "27217",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27217"
        },
        {
          "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000365.html"
        },
        {
          "name": "[announce] 20080206 Horde Groupware 1.1-RC2",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000376.html"
        },
        {
          "name": "FEDORA-2008-2212",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html"
        },
        {
          "name": "[announce] 20080109 Mnemo H3 (2.1.2) (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000364.html"
        },
        {
          "name": "28382",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28382"
        },
        {
          "name": "[announce] 20080206 Horde Groupware Webmail Edition 1.1-RC2",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000377.html"
        },
        {
          "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000366.html"
        },
        {
          "name": "[announce] 20080109 Kronolith H3 (2.1.7) (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000362.html"
        },
        {
          "name": "[announce] 20080122 Nag H3 (2.2-RC2)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000368.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-7219",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Horde Kronolith H3 2.1 before 2.1.7 and 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and H3 2.2 before 2.2-RC2; Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 does not validate ownership when performing share changes, which has unknown impact and attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[announce] 20080122 Kronolith H3 (2.2-RC2)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000371.html"
            },
            {
              "name": "[announce] 20080122 Mnemo H3 (2.2-RC2)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000369.html"
            },
            {
              "name": "[announce] 20080109 Nag H3 (2.1.4) (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000363.html"
            },
            {
              "name": "27217",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27217"
            },
            {
              "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000365.html"
            },
            {
              "name": "[announce] 20080206 Horde Groupware 1.1-RC2",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000376.html"
            },
            {
              "name": "FEDORA-2008-2212",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html"
            },
            {
              "name": "[announce] 20080109 Mnemo H3 (2.1.2) (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000364.html"
            },
            {
              "name": "28382",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28382"
            },
            {
              "name": "[announce] 20080206 Horde Groupware Webmail Edition 1.1-RC2",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000377.html"
            },
            {
              "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000366.html"
            },
            {
              "name": "[announce] 20080109 Kronolith H3 (2.1.7) (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000362.html"
            },
            {
              "name": "[announce] 20080122 Nag H3 (2.2-RC2)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000368.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-7219",
    "datePublished": "2009-09-13T22:00:00Z",
    "dateReserved": "2009-09-13T00:00:00Z",
    "dateUpdated": "2024-09-17T01:06:15.652Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2783 (GCVE-0-2008-2783)
Vulnerability from cvelistv5
Published
2008-06-19 20:00
Modified
2024-08-07 09:14
Severity ?
CWE
  • n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
http://www.securityfocus.com/bid/29365vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/42640vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:14:14.642Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "29365",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29365"
          },
          {
            "name": "kronolith-groupware-multiple-xss(42640)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42640"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-05-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "29365",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29365"
        },
        {
          "name": "kronolith-groupware-multiple-xss(42640)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42640"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-2783",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "29365",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29365"
            },
            {
              "name": "kronolith-groupware-multiple-xss(42640)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42640"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-2783",
    "datePublished": "2008-06-19T20:00:00",
    "dateReserved": "2008-06-19T00:00:00",
    "dateUpdated": "2024-08-07T09:14:14.642Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-7218 (GCVE-0-2008-7218)
Vulnerability from cvelistv5
Published
2009-09-13 22:00
Modified
2024-08-07 11:56
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability in the Horde API in Horde 3.1 before 3.1.6 and 3.2 before 3.2 before 3.2-RC2; Turba H3 2.1 before 2.1.6 and 2.2 before 2.2-RC2; Kronolith H3 2.1 before 2.1.7 and H3 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and 2.2 before 2.2-RC2; Horde Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 has unknown impact and attack vectors.
References
http://lists.horde.org/archives/announce/2008/000371.htmlmailing-list, x_refsource_MLIST
http://lists.horde.org/archives/announce/2008/000369.htmlmailing-list, x_refsource_MLIST
http://lists.horde.org/archives/announce/2008/000363.htmlmailing-list, x_refsource_MLIST
http://www.securityfocus.com/bid/27217vdb-entry, x_refsource_BID
http://lists.horde.org/archives/announce/2008/000365.htmlmailing-list, x_refsource_MLIST
http://lists.horde.org/archives/announce/2008/000376.htmlmailing-list, x_refsource_MLIST
http://lists.horde.org/archives/announce/2008/000367.htmlmailing-list, x_refsource_MLIST
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.htmlvendor-advisory, x_refsource_FEDORA
http://lists.horde.org/archives/announce/2008/000360.htmlmailing-list, x_refsource_MLIST
http://lists.horde.org/archives/announce/2008/000364.htmlmailing-list, x_refsource_MLIST
http://secunia.com/advisories/28382third-party-advisory, x_refsource_SECUNIA
http://lists.horde.org/archives/announce/2008/000377.htmlmailing-list, x_refsource_MLIST
http://lists.horde.org/archives/announce/2008/000366.htmlmailing-list, x_refsource_MLIST
http://lists.horde.org/archives/announce/2008/000361.htmlmailing-list, x_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilities/39599vdb-entry, x_refsource_XF
http://lists.horde.org/archives/announce/2008/000374.htmlmailing-list, x_refsource_MLIST
http://lists.horde.org/archives/announce/2008/000362.htmlmailing-list, x_refsource_MLIST
http://lists.horde.org/archives/announce/2008/000368.htmlmailing-list, x_refsource_MLIST
http://www.osvdb.org/42775vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:56:14.413Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[announce] 20080122 Kronolith H3 (2.2-RC2)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000371.html"
          },
          {
            "name": "[announce] 20080122 Mnemo H3 (2.2-RC2)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000369.html"
          },
          {
            "name": "[announce] 20080109 Nag H3 (2.1.4) (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000363.html"
          },
          {
            "name": "27217",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27217"
          },
          {
            "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000365.html"
          },
          {
            "name": "[announce] 20080206 Horde Groupware 1.1-RC2",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000376.html"
          },
          {
            "name": "[announce] 20080122 Turba H3 (2.2-RC2)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000367.html"
          },
          {
            "name": "FEDORA-2008-2212",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html"
          },
          {
            "name": "[announce] 20080109 Horde 3.1.6 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000360.html"
          },
          {
            "name": "[announce] 20080109 Mnemo H3 (2.1.2) (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000364.html"
          },
          {
            "name": "28382",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28382"
          },
          {
            "name": "[announce] 20080206 Horde Groupware Webmail Edition 1.1-RC2",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000377.html"
          },
          {
            "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000366.html"
          },
          {
            "name": "[announce] 20080109 Turba H3 (2.1.6) (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000361.html"
          },
          {
            "name": "horde-hordeapi-privilege-escalation(39599)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39599"
          },
          {
            "name": "[announce] 20080122 Horde 3.2-RC2",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000374.html"
          },
          {
            "name": "[announce] 20080109 Kronolith H3 (2.1.7) (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000362.html"
          },
          {
            "name": "[announce] 20080122 Nag H3 (2.2-RC2)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2008/000368.html"
          },
          {
            "name": "42775",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/42775"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the Horde API in Horde 3.1 before 3.1.6 and 3.2 before 3.2 before 3.2-RC2; Turba H3 2.1 before 2.1.6 and 2.2 before 2.2-RC2; Kronolith H3 2.1 before 2.1.7 and H3 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and 2.2 before 2.2-RC2; Horde Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 has unknown impact and attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[announce] 20080122 Kronolith H3 (2.2-RC2)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000371.html"
        },
        {
          "name": "[announce] 20080122 Mnemo H3 (2.2-RC2)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000369.html"
        },
        {
          "name": "[announce] 20080109 Nag H3 (2.1.4) (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000363.html"
        },
        {
          "name": "27217",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27217"
        },
        {
          "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000365.html"
        },
        {
          "name": "[announce] 20080206 Horde Groupware 1.1-RC2",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000376.html"
        },
        {
          "name": "[announce] 20080122 Turba H3 (2.2-RC2)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000367.html"
        },
        {
          "name": "FEDORA-2008-2212",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html"
        },
        {
          "name": "[announce] 20080109 Horde 3.1.6 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000360.html"
        },
        {
          "name": "[announce] 20080109 Mnemo H3 (2.1.2) (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000364.html"
        },
        {
          "name": "28382",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28382"
        },
        {
          "name": "[announce] 20080206 Horde Groupware Webmail Edition 1.1-RC2",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000377.html"
        },
        {
          "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000366.html"
        },
        {
          "name": "[announce] 20080109 Turba H3 (2.1.6) (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000361.html"
        },
        {
          "name": "horde-hordeapi-privilege-escalation(39599)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39599"
        },
        {
          "name": "[announce] 20080122 Horde 3.2-RC2",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000374.html"
        },
        {
          "name": "[announce] 20080109 Kronolith H3 (2.1.7) (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000362.html"
        },
        {
          "name": "[announce] 20080122 Nag H3 (2.2-RC2)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2008/000368.html"
        },
        {
          "name": "42775",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/42775"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-7218",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the Horde API in Horde 3.1 before 3.1.6 and 3.2 before 3.2 before 3.2-RC2; Turba H3 2.1 before 2.1.6 and 2.2 before 2.2-RC2; Kronolith H3 2.1 before 2.1.7 and H3 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and 2.2 before 2.2-RC2; Horde Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 has unknown impact and attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[announce] 20080122 Kronolith H3 (2.2-RC2)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000371.html"
            },
            {
              "name": "[announce] 20080122 Mnemo H3 (2.2-RC2)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000369.html"
            },
            {
              "name": "[announce] 20080109 Nag H3 (2.1.4) (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000363.html"
            },
            {
              "name": "27217",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27217"
            },
            {
              "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000365.html"
            },
            {
              "name": "[announce] 20080206 Horde Groupware 1.1-RC2",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000376.html"
            },
            {
              "name": "[announce] 20080122 Turba H3 (2.2-RC2)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000367.html"
            },
            {
              "name": "FEDORA-2008-2212",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html"
            },
            {
              "name": "[announce] 20080109 Horde 3.1.6 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000360.html"
            },
            {
              "name": "[announce] 20080109 Mnemo H3 (2.1.2) (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000364.html"
            },
            {
              "name": "28382",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28382"
            },
            {
              "name": "[announce] 20080206 Horde Groupware Webmail Edition 1.1-RC2",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000377.html"
            },
            {
              "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000366.html"
            },
            {
              "name": "[announce] 20080109 Turba H3 (2.1.6) (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000361.html"
            },
            {
              "name": "horde-hordeapi-privilege-escalation(39599)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39599"
            },
            {
              "name": "[announce] 20080122 Horde 3.2-RC2",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000374.html"
            },
            {
              "name": "[announce] 20080109 Kronolith H3 (2.1.7) (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000362.html"
            },
            {
              "name": "[announce] 20080122 Nag H3 (2.2-RC2)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2008/000368.html"
            },
            {
              "name": "42775",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/42775"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-7218",
    "datePublished": "2009-09-13T22:00:00",
    "dateReserved": "2009-09-13T00:00:00",
    "dateUpdated": "2024-08-07T11:56:14.413Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}