Vulnerabilites related to horde - groupware_webmail_edition
Vulnerability from fkie_nvd
Published
2008-01-11 02:46
Modified
2025-04-09 00:30
Severity ?
Summary
IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) "purge" deleted emails via a crafted email message.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:horde:framework:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "8873E0B6-9A41-4D39-BB6F-06EF2F4BCB92", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "664B0D12-607C-4B5F-AC8E-FB1BBD1332E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:horde:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "96A4F9E2-7978-4C82-9BD3-B6B73C4918E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C129AAEE-5388-4D81-AC1F-570EFF27EF89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) \"purge\" deleted emails via a crafted email message." }, { "lang": "es", "value": "IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, y Horde Groupware Webmail Edition 1.0.3 no validan peticiones HTTP no especificadas, lo cual permite a atacantes remotos (1) borrar mensajes de correo electr\u00f3nico de su elecci\u00f3n mediante un ID num\u00e9rico modificado o (2) \"purgar\" correos electr\u00f3nicos eliminados mediante un mensaje de correo electr\u00f3nico manipulado." } ], "id": "CVE-2007-6018", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-01-11T02:46:00.000", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17\u0026r2=1.17.2.1\u0026ty=h" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12\u0026r2=1.12.2.1\u0026ty=h" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://lists.horde.org/archives/announce/2008/000360.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28020" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/28546" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/29184" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/29185" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/29186" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/34418" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2007-102/advisory/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.debian.org/security/2008/dsa-1470" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27223" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428625" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39595" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17\u0026r2=1.17.2.1\u0026ty=h" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12\u0026r2=1.12.2.1\u0026ty=h" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.horde.org/archives/announce/2008/000360.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34418" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2007-102/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-08-13 01:41
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in Horde Groupware Webmail before Edition 1.1.1 (final) have unknown impact and attack vectors related to "unescaped output," possibly cross-site scripting (XSS), in the (1) object browser and (2) contact view.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
horde | groupware_webmail_edition | 1.0 | |
horde | groupware_webmail_edition | 1.0.1 | |
horde | groupware_webmail_edition | 1.0.2 | |
horde | groupware_webmail_edition | 1.0.3 | |
horde | groupware_webmail_edition | 1.0.4 | |
horde | groupware_webmail_edition | 1.0.5 | |
horde | groupware_webmail_edition | 1.0.6 | |
horde | groupware_webmail_edition | 1.0.7 | |
horde | groupware_webmail_edition | 1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A30F59C-D09A-495D-B5E5-E908D913164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6E367E84-DD66-4512-BCDE-7D7E62B72A13", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B013D26B-BE67-4131-B320-EF87D19E9C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "664B0D12-607C-4B5F-AC8E-FB1BBD1332E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "989D5040-13B3-4D76-A516-81CAB112FE44", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA0765C9-BBFB-4676-9D79-0CFD86BCF9E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "842159D1-E30C-4077-8E92-07979E52C10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81D9B15F-C3CA-44DF-BF5E-51741793348B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "46ADF628-449A-463E-A459-69FD9DB2ADAD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Horde Groupware Webmail before Edition 1.1.1 (final) have unknown impact and attack vectors related to \"unescaped output,\" possibly cross-site scripting (XSS), in the (1) object browser and (2) contact view." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Horde Groupware Webmail anterior a Edition 1.1.1 (final) tiene impacto desconocido y vectores de ataque relacionados con \"salida no escapada\", posiblemente secuencias de comandos en sitios cruzados (XSS) en (1) el navegador objeto y (2) la vista de contacto." } ], "id": "CVE-2008-3650", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-08-13T01:41:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000420.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000420.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44479" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-09-13 22:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the Horde API in Horde 3.1 before 3.1.6 and 3.2 before 3.2 before 3.2-RC2; Turba H3 2.1 before 2.1.6 and 2.2 before 2.2-RC2; Kronolith H3 2.1 before 2.1.7 and H3 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and 2.2 before 2.2-RC2; Horde Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 has unknown impact and attack vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
horde | groupware | 1.0 | |
horde | groupware | 1.0.1 | |
horde | groupware | 1.0.2 | |
horde | groupware | 1.1 | |
horde | groupware_webmail_edition | 1.0 | |
horde | groupware_webmail_edition | 1.0.2 | |
horde | groupware_webmail_edition | 1.0.3 | |
horde | groupware_webmail_edition | 1.1 | |
horde | horde | 3.1 | |
horde | horde | 3.1.1 | |
horde | horde | 3.1.2 | |
horde | horde | 3.1.3 | |
horde | horde | 3.1.4 | |
horde | horde | 3.1.5 | |
horde | horde | 3.2 | |
horde | kronolith_h3 | 2.1 | |
horde | kronolith_h3 | 2.1.1 | |
horde | kronolith_h3 | 2.1.2 | |
horde | kronolith_h3 | 2.1.3 | |
horde | kronolith_h3 | 2.1.4 | |
horde | kronolith_h3 | 2.1.5 | |
horde | kronolith_h3 | 2.1.6 | |
horde | kronolith_h3 | 2.2 | |
horde | mnemo_h3 | 2.1 | |
horde | mnemo_h3 | 2.1.1 | |
horde | mnemo_h3 | 2.2 | |
horde | nag_h3 | 2.1 | |
horde | nag_h3 | 2.1.1 | |
horde | nag_h3 | 2.1.2 | |
horde | nag_h3 | 2.1.3 | |
horde | nag_h3 | 2.2 | |
horde | turba_h3 | 2.1 | |
horde | turba_h3 | 2.1.1 | |
horde | turba_h3 | 2.1.2 | |
horde | turba_h3 | 2.1.3 | |
horde | turba_h3 | 2.1.4 | |
horde | turba_h3 | 2.1.5 | |
horde | turba_h3 | 2.2 | |
horde | turba_h3 | 2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "71C2653B-7F0B-4628-9E77-44744BC05463", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B574D428-0A3A-47CA-A926-5C936F83919A", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6BBB036-494E-41D4-BD04-40906FAB5C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A30F59C-D09A-495D-B5E5-E908D913164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B013D26B-BE67-4131-B320-EF87D19E9C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "664B0D12-607C-4B5F-AC8E-FB1BBD1332E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "46ADF628-449A-463E-A459-69FD9DB2ADAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:horde:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D589E22C-7F87-43EF-B5FF-DC2B43E5252C", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:horde:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "57AD38FB-23DF-406D-8889-E9EB18D22C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:horde:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "35BECCFA-1E18-41ED-882A-5C743D970EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:horde:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C0285D4F-8CD8-48F9-9D68-A80E8742BAC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:horde:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B3808FD9-126C-422F-AFE4-4FF6E1366431", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:horde:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "96A4F9E2-7978-4C82-9BD3-B6B73C4918E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:horde:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "457276C8-6665-48C5-948C-E65E6309C0ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "391F88AC-0D1B-4F13-874C-6FD3C6E90CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C5E6E0C-7E94-4187-B53B-1BBB73C23EE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDCD1651-0610-4338-9EA6-343865AA9F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6F6A557A-EC2D-40AF-88C7-208DB4E8FA5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "733B59F3-1648-4875-9A9B-EC3BCA49BCEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "012BBA79-F969-405E-BBC8-FDC23DE25012", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5A06B44D-9448-4C96-BD37-790DA9842BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B67D985-950E-42B5-BA8D-05AE8A3EE3EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:mnemo_h3:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2814A27-E3C4-4A69-8FEB-E4900CD9876D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:mnemo_h3:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D4CAC140-EA0B-4FFD-B8E7-3295623C6D81", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:mnemo_h3:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "38397885-FDB3-4454-BFBB-2B28173FEC79", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:nag_h3:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "08307428-AE78-453B-A121-15AEB7049EAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:nag_h3:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "195D72BA-A0A6-4568-BC67-77A44F9E0697", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:nag_h3:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F7853DA-0958-401B-83C6-E35FACA4AAF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:nag_h3:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C2BD1454-1D33-4026-A7F6-ADB358D3DC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:nag_h3:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "184A2E09-5784-44C4-A5D9-87EA906F86E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:turba_h3:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "BD583BAE-8123-40B9-8A68-96725A86EBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:turba_h3:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE9CA86E-B688-495F-8233-69632B56E1FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:turba_h3:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "56B99A86-A8A6-474E-B54F-9F010FFE7C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:turba_h3:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "88F73B3B-DB27-40F9-BCC2-E5ACC10F2A1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:turba_h3:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4035BF4B-64F9-4A0D-82D0-99276B8B7010", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:turba_h3:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "6D808D3F-9332-4667-838C-CD545EDAD37B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:turba_h3:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "73C0F1DE-D2CB-4FA1-89FA-2C6E0991FDDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:turba_h3:2.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "6E649CA6-3EBD-40A4-860F-08141F8FB9D2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Horde API in Horde 3.1 before 3.1.6 and 3.2 before 3.2 before 3.2-RC2; Turba H3 2.1 before 2.1.6 and 2.2 before 2.2-RC2; Kronolith H3 2.1 before 2.1.7 and H3 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and 2.2 before 2.2-RC2; Horde Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 has unknown impact and attack vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el API de Horde v3.1 anterior a v3.1.6 y v3.2 anterior a v3.2 anterior a v3.2-RC2; Turba H3 v2.1 anterior a v2.1.6 y v2.2 anterior a v2.2-RC2; Kronolith H3 2.1 anterior a v2.1.7 y H3 v2.2 anterior a v2.2-RC2; Nag H3 v2.1 anterior a v2.1.4 y v2.2 anterior a v2.2-RC2; Mnemo H3 v2.1 anterior a v2.1.2 y v2.2 anterior a v2.2-RC2; Horde Groupware v1.0 anterior a v1.0.3 y v1.1 anterior a v1.1-RC2; y Groupware Webmail Edition v1.0 anterior a v1.0.4 y v1.1 anterior a v1.1-RC2; tiene impacto y vectores de ataque desconocidos." } ], "id": "CVE-2008-7218", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-09-13T22:30:00.360", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000360.html" }, { "source": "cve@mitre.org", "url": "http://lists.horde.org/archives/announce/2008/000361.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000362.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000363.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000364.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000367.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000368.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000369.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000371.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000374.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000376.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000377.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28382" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/42775" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/27217" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39599" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000360.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.horde.org/archives/announce/2008/000361.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000362.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000363.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000364.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000367.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000368.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000369.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000371.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000374.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000376.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000377.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/42775" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/27217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-01-24 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Horde IMP before 5.0.18 and Horde Groupware Webmail Edition before 4.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) composeCache, (2) rtemode, or (3) filename_* parameters to the compose page; (4) formname parameter to the contacts popup window; or (5) IMAP mailbox names. NOTE: some of these details are obtained from third party information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:horde:dynamic_imp:*:*:*:*:*:*:*:*", "matchCriteriaId": "7395F88E-27B2-4C93-8360-3A925DBC7ED4", "versionEndIncluding": "5.0.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AC88E67E-01FD-4B3A-A186-C0D5A8F3111D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "CBC6D9CA-DDD0-4D79-845B-95AEF907BC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "72796BEA-2929-4730-BD97-52686ACA0A34", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D01633AC-7627-4DDA-A2FA-942D2F962567", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "6B517AA9-55B2-48E5-A1C0-83AAA1A38435", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "349FE027-660E-42A8-9382-1049F827AE3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "718B8347-55A5-4909-87DD-071F9D4606A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "741ECFFC-A7A5-4BF2-B9E4-C5E06F3AF0DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "155EE1D9-0EA9-4EFC-953D-5BD24FA596CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "0CA83502-F507-4914-96A2-CFB7FDF29568", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "939C5E5C-BA4D-4F65-BA9C-EEE70D18016C", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0738E854-CAB5-4480-AD07-20EC35466640", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AA96BD59-233E-43C3-BE19-673CD6622EBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "A91FBA6A-AC38-4879-9084-88753B4D911B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4AFEE15-D89D-4C0F-BFD6-9ECF3163B7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C53AD47-FE94-403B-BCCC-1357FD2C6622", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "DF1DB223-163D-46B9-B8EF-33CF8A49EA13", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "52BC3866-0E7F-46E8-9347-C7B4BD1C0B02", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E8031AE6-A3F9-4BBD-BAC9-1C224D6AB567", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7DB366EE-49A1-4395-BAA0-69BEA76CEACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4181ACC9-B59D-4ADF-B433-F0DC9227B33A", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "F372DA3C-39AC-4589-A23C-FFB62F919531", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E4C10EED-D008-4695-84D5-6D0DFA4147B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "C924A1E2-5EC7-4F6A-94A3-F8C17FF3A4D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "494DFA09-3750-4A40-960D-7973761BCB1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "567AC297-F328-43AA-BB3A-776BE6BE0337", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "193EED6E-67FE-44CB-9A77-C28D1C376357", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "2D312F2C-8F5D-47F8-94BE-7E1992C41DB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "54E7B338-3153-4B34-B880-3E3B80B4B185", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "991CAA1F-E3BA-48AC-A1FD-DACC2D204D62", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:dynamic_imp:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "8E2E0B7B-64DA-47CE-90B4-F468F2C67E26", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D2A8C5B-6155-4B40-B8C8-B4944064E3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D11E08A4-79D6-46FE-880F-66E9778C298E", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "55A3894F-2E3F-49CA-BEE5-759D603F6EAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDDBDC41-7E6F-4C97-95BD-7DEB2D9FE837", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "3B52D447-8E56-4E04-9650-38D222DA8D2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "1C455353-0401-4975-89BC-C23D32A684F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "C1D9D9E1-D8B7-4A56-BC2F-90BDC97322B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "59DE856E-98FF-4B49-BD7F-3E326FEB89EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "6ED34889-9F98-46BC-9176-557484272C05", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "B7FBC61D-6A08-4DE8-A5E5-A3FC57E7759D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "E52AEEE6-2364-4CFB-9337-C5CCA54362E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD137160-B80D-4C65-A9A9-CEE12107E3DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E6C2AC8-C21A-4152-AAE6-915ACE65CB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "1956C8F0-EB91-4322-85C1-6BE15AA13703", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A48DEBEB-0C2D-4F6A-AF63-04990D2FD5AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E004FA4-0180-458A-8E8C-8167EF684ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F0A1617-17D1-4C9F-A818-27321FD2FEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "D86CDC19-43C3-4ACC-94B4-388BCC8A2203", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "E9931A5B-CD0C-43A3-B32D-915FF4AF57D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FDC69F98-A3B4-4573-AFE4-2069218B3454", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "AD4D0137-3515-4857-8E70-4600CD2D4278", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:3.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "A59756D1-3401-4B15-8B68-AA68B5BC3223", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:3.2.7:rc1:*:*:*:*:*:*", "matchCriteriaId": "73FD31BC-651B-461F-B9F4-6CA8D5CCE583", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "184592A5-4108-40DB-8882-9D2468490DE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "28470602-E3F1-4F04-B012-F91AB95E7A68", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B584932-BFB2-4462-BC69-B9FCC059F59F", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "702F7A33-CF9E-4966-B622-E4BD27B120AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "FF1BB456-5462-4ACE-AECF-730B1C7BE2CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1D23A341-217D-4AF2-AC61-DFC9761AFE3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C129AAEE-5388-4D81-AC1F-570EFF27EF89", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "01CBF0CE-7133-4281-842C-3584AE13F36D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "373263B9-D967-4A9B-A062-FC841061E143", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "05FAFC4C-8E72-4EA5-930F-6F76CCD0138A", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F91A26C3-D538-4935-90FF-DDD5E8733968", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "1F9064E7-6081-4B23-BC03-21E6F483FA53", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3E60BFE2-B3E4-416F-9697-58D912907E86", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B4C5D659-E2C1-444D-8B5C-28970D830F1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "72D702C7-2789-4837-BC74-59570B13B4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "1A363643-3EF2-4F05-A934-0187AF846D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "4611791C-DA55-4F37-9030-1BEA17D0D817", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EC486-EF14-43DF-9152-69456E0FE271", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "82EC0D61-EC7E-4BF3-9217-C1387ADB5794", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "AB4B2C3E-9BB5-4403-9A7C-5AD0B92F02E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:4.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "31213DF1-47CC-4DCD-B8A5-5F0D30956859", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "CD07BF20-09CE-4D32-A935-8EAA8363356F", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:5.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "1B91647A-F174-4F2E-992E-BDA23B2E3545", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:5.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "126DFFE7-AD9F-41E8-8AA0-C0F9CE80271A", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B02F8BA6-4A13-48CA-BAC9-F8C932453EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "20AA91CC-4B6C-4BC9-9730-C613300702AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE8E0715-9A6B-4A7C-9A6F-4B7A344B0968", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "382D599B-09EC-4C2A-8F23-EB5D03C4AA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "15348E42-1A70-4787-95B0-9EDB100BB36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:imp:5.0.4-git:*:*:*:*:*:*:*", "matchCriteriaId": "7FE40F36-6872-4C47-9A1E-F4EEEA115696", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB0BA941-3235-46CB-A368-7E17482B0A15", "versionEndIncluding": "4.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A30F59C-D09A-495D-B5E5-E908D913164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "48205A35-1F67-4E90-A891-29AA4D2CC138", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "276A0BB9-6808-4901-8EEB-766AF6EE4E3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6E367E84-DD66-4512-BCDE-7D7E62B72A13", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B013D26B-BE67-4131-B320-EF87D19E9C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "664B0D12-607C-4B5F-AC8E-FB1BBD1332E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "989D5040-13B3-4D76-A516-81CAB112FE44", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA0765C9-BBFB-4676-9D79-0CFD86BCF9E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "842159D1-E30C-4077-8E92-07979E52C10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81D9B15F-C3CA-44DF-BF5E-51741793348B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "359D7ED8-E171-4822-B2F3-80E07287A787", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "46ADF628-449A-463E-A459-69FD9DB2ADAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "5E8F448D-DFB5-4BA3-BD28-13E39FF82A9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "5C783DC9-4379-49A8-A026-D1F933DB36AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc3:*:*:*:*:*:*", "matchCriteriaId": "2AD6F3C8-50F8-4E9B-98EA-8962B2310780", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc4:*:*:*:*:*:*", "matchCriteriaId": "36CFEF77-BE64-4547-9A5F-DABD589C5ED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C7522F6-DF2C-4225-932F-2D27C1EFD792", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "53BE7A07-3455-4A18-BDBC-DC261B35D427", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "503BB3EF-2BDC-4019-8EE2-B121A2600DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "54DA4725-AAA4-4A4B-B6A4-9A139A6176AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA22094F-3A01-4B66-99E1-0ED9D5574F82", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "0D105C44-38EE-4D86-9334-DA0E8A08B725", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C145E10-4AC0-4F25-9D98-64447BB7C103", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "461A597A-93DD-4A12-BB04-C02277317C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B256AACA-93C8-447A-AB08-ABF0A9E4E63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9D634210-6D2D-4181-8310-73FB5B9872D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C10C8DB-FB73-4982-8B92-D3E1FB1C59A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "319BC54E-2A0B-4033-AD73-3E8825E8D9B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "6A86680C-839E-4EED-9B32-CE101DC7B6B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "DF0F1DCA-7D9F-42E3-9FB9-D3C100F09A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BFADDD4-8B5E-4EE7-A390-CDFD48CE3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "2F5FB253-C2E5-48F3-B13F-79C45024D89D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "E7D0D17F-B2E4-496D-9ACD-170C33B453F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "6314FAC0-544A-492F-81BA-9169EB69E74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "70CC6175-10F8-4DD9-A1E7-202F5F4A221C", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "3ED61953-A384-498C-AFFD-F83ADF51CFD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EC13F5CD-2BB9-4FA7-BE4C-D2175E18E063", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FFF8191E-F2EA-4071-B26D-8E45103D4A0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "040AC7A5-689B-4F12-A199-FB395E4CB84B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2CFD1571-C070-4B5F-9BA3-5B1789068396", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0909400D-75C6-4DED-8C77-333D8F092AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "08050D4C-6620-4177-9967-044AD2B9368B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde IMP before 5.0.18 and Horde Groupware Webmail Edition before 4.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) composeCache, (2) rtemode, or (3) filename_* parameters to the compose page; (4) formname parameter to the contacts popup window; or (5) IMAP mailbox names. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "M\u00faltiples vulnerbilidades de ejecuci\u00f3n de secuencias de comandos web en sitios cruzados (XSS) en Horde IMP anterior a v5.0.18 y Horde Groupware Webmail Edition anterior a v4.0.6 permite a atacantes remotos inyectar c\u00f3digo HTML o script web a trav\u00e9s de los par\u00e1metros que componen la p\u00e1gina (1) composeCache, (2) rtemode, o (3) filename_*;(4) par\u00e1metro formname para ventanas popup; o (5) nombres de buz\u00f3n IMAP. NOTA: Algunos de estos detalles han sido obtenidos de terceras partes de informaci\u00f3n." } ], "id": "CVE-2012-0791", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-01-24T18:55:01.440", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47580" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47592" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2485" }, { "source": "secalert@redhat.com", "url": "http://www.horde.org/apps/imp/docs/CHANGES" }, { "source": "secalert@redhat.com", "url": "http://www.horde.org/apps/imp/docs/RELEASE_NOTES" }, { "source": "secalert@redhat.com", "url": "http://www.horde.org/apps/webmail/docs/CHANGES" }, { "source": "secalert@redhat.com", "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/51586" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1026553" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1026554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2485" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.horde.org/apps/imp/docs/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.horde.org/apps/imp/docs/RELEASE_NOTES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.horde.org/apps/webmail/docs/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026554" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-11 00:44
Modified
2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via ".." sequences and a null byte in the theme name.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCA87DD-0549-4B2F-B1F4-46632258A059", "versionEndIncluding": "1.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "77138B08-A680-4FEC-873F-6E25B05D44CB", "versionEndIncluding": "1.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:horde:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "93944D77-B65B-48F4-9334-8FC9B1D96F53", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via \"..\" sequences and a null byte in the theme name." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en Horde 3.1.6, Groupware anterior 1.0.5, y Groupware Webmail Edition anterior 1.0.6, cuando ejecuta ciertas configuraciones, pertmite a usuarios autenticados remotamente leer y ejecutar ficheros de su elecci\u00f3n a trav\u00e9s de secuencias \"..\" y de byte nulo en el mismo \"theme name\"." } ], "id": "CVE-2008-1284", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-11T00:44:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000382.html" }, { "source": "cve@mitre.org", "url": "http://lists.horde.org/archives/announce/2008/000383.html" }, { "source": "cve@mitre.org", "url": "http://lists.horde.org/archives/announce/2008/000384.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29286" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29374" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29400" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30047" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200805-01.xml" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3726" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1519" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/489239/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/489289/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28153" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0822/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41054" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000382.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.horde.org/archives/announce/2008/000383.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.horde.org/archives/announce/2008/000384.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29400" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200805-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1519" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489239/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489289/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0822/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41054" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-02-19 01:00
Modified
2025-04-09 00:30
Severity ?
Summary
lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 4.0 | |
debian | debian_linux | 4.0 | |
debian | debian_linux | 4.0 | |
debian | debian_linux | 4.0 | |
debian | debian_linux | 4.0 | |
debian | debian_linux | 4.0 | |
debian | debian_linux | 4.0 | |
debian | debian_linux | 4.0 | |
debian | debian_linux | 4.0 | |
debian | debian_linux | 4.0 | |
debian | debian_linux | 4.0 | |
debian | debian_linux | 4.0 | |
debian | debian_linux | 4.0 | |
horde | groupware | 1.0.3 | |
horde | groupware_webmail_edition | 1.0.4 | |
horde | turba_contact_manager | 2.1.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7", "vulnerable": false }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*", "matchCriteriaId": "F5114DA3-FBB9-47C4-857B-3212404DAD4E", "vulnerable": false }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*", "matchCriteriaId": "4D5F5A52-285E-4E7E-83B8-508079DBCEAE", "vulnerable": false }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*", "matchCriteriaId": "674BE2D9-009B-46C5-A071-CB10368B8D48", "vulnerable": false }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*", "matchCriteriaId": "703486E5-906B-4BDB-A046-28D4D73E3F03", "vulnerable": false }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*", "matchCriteriaId": "ABB5AC0D-2358-4C8E-99B5-2CE0A678F549", "vulnerable": false }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*", "matchCriteriaId": "38B37184-BA88-44F1-AC9E-8B60C2419111", "vulnerable": false }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*", "matchCriteriaId": "0D8C9247-3E18-4DD9-AF5B-B2996C76443F", "vulnerable": false }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*", "matchCriteriaId": "0EEA2CDD-7FCD-461E-90FC-CDB3C3992A32", "vulnerable": false }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*", "matchCriteriaId": "D7B877A8-5318-402E-8AE1-753E7419060F", "vulnerable": false }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*", "matchCriteriaId": "A3938420-087D-4D92-A2F8-EAE54D9837EC", "vulnerable": false }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:s-390:*:*:*:*:*", "matchCriteriaId": "EFB8DE9F-2130-49E9-85EE-6793ED9FBEED", "vulnerable": false }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*", "matchCriteriaId": "10F42CF8-FB98-4AFC-96C5-FD7D442B0FA3", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D59C23FB-E223-4EED-8F69-3CC1EE7DF148", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "989D5040-13B3-4D76-A516-81CAB112FE44", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:turba_contact_manager:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "6476A5E9-779F-4CBC-9C49-42AADD427B91", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book." }, { "lang": "es", "value": "lib/Driver/sql.php en Turba 2 (turba2) Contact Manager H3 2.1.x antes de 2.1.7 y 2.2.x antes de 2.2-RC3, como se usa en productos como Horde Groupware antes de 1.0.4 y Horde Groupware Webmail Edition antes de 1.0.5, no comprueba correctamente los privilegios de acceso, lo que permite a usuarios autentificados remotamente modificar datos de direcci\u00f3n a trav\u00e9s de un par\u00e1metro object_id modificado a edit.php, como se demostr\u00f3 modificando una entrada personal en la libreta de direcciones cuando hay un acceso de escritura a una libreta de direcciones compartida." } ], "id": "CVE-2008-0807", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-19T01:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000378.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000379.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000380.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000381.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28982" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29071" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29184" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29185" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29186" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1507" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27844" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019433" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0593/references" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000378.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000379.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000380.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000381.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019433" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0593/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-09-13 22:30
Modified
2025-04-09 00:30
Severity ?
Summary
Horde Kronolith H3 2.1 before 2.1.7 and 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and H3 2.2 before 2.2-RC2; Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 does not validate ownership when performing share changes, which has unknown impact and attack vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
horde | groupware | 1.0 | |
horde | groupware | 1.0.1 | |
horde | groupware | 1.0.2 | |
horde | groupware | 1.1 | |
horde | groupware_webmail_edition | 1.0 | |
horde | groupware_webmail_edition | 1.0.2 | |
horde | groupware_webmail_edition | 1.0.3 | |
horde | groupware_webmail_edition | 1.1 | |
horde | kronolith_h3 | 2.1 | |
horde | kronolith_h3 | 2.1.1 | |
horde | kronolith_h3 | 2.1.2 | |
horde | kronolith_h3 | 2.1.3 | |
horde | kronolith_h3 | 2.1.4 | |
horde | kronolith_h3 | 2.1.5 | |
horde | kronolith_h3 | 2.1.6 | |
horde | kronolith_h3 | 2.2 | |
horde | mnemo_h3 | 2.1 | |
horde | mnemo_h3 | 2.1.1 | |
horde | mnemo_h3 | 2.2 | |
horde | nag_h3 | 2.1 | |
horde | nag_h3 | 2.1.1 | |
horde | nag_h3 | 2.1.2 | |
horde | nag_h3 | 2.1.3 | |
horde | nag_h3 | 2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "71C2653B-7F0B-4628-9E77-44744BC05463", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B574D428-0A3A-47CA-A926-5C936F83919A", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C6BBB036-494E-41D4-BD04-40906FAB5C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A30F59C-D09A-495D-B5E5-E908D913164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B013D26B-BE67-4131-B320-EF87D19E9C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "664B0D12-607C-4B5F-AC8E-FB1BBD1332E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "46ADF628-449A-463E-A459-69FD9DB2ADAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "391F88AC-0D1B-4F13-874C-6FD3C6E90CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4C5E6E0C-7E94-4187-B53B-1BBB73C23EE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FDCD1651-0610-4338-9EA6-343865AA9F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6F6A557A-EC2D-40AF-88C7-208DB4E8FA5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "733B59F3-1648-4875-9A9B-EC3BCA49BCEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "012BBA79-F969-405E-BBC8-FDC23DE25012", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5A06B44D-9448-4C96-BD37-790DA9842BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith_h3:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B67D985-950E-42B5-BA8D-05AE8A3EE3EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:mnemo_h3:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2814A27-E3C4-4A69-8FEB-E4900CD9876D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:mnemo_h3:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D4CAC140-EA0B-4FFD-B8E7-3295623C6D81", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:mnemo_h3:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "38397885-FDB3-4454-BFBB-2B28173FEC79", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:nag_h3:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "08307428-AE78-453B-A121-15AEB7049EAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:nag_h3:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "195D72BA-A0A6-4568-BC67-77A44F9E0697", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:nag_h3:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F7853DA-0958-401B-83C6-E35FACA4AAF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:nag_h3:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C2BD1454-1D33-4026-A7F6-ADB358D3DC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:nag_h3:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "184A2E09-5784-44C4-A5D9-87EA906F86E1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Horde Kronolith H3 2.1 before 2.1.7 and 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and H3 2.2 before 2.2-RC2; Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 does not validate ownership when performing share changes, which has unknown impact and attack vectors." }, { "lang": "es", "value": "Horde Kronolith H3 v2.1 anterior v2.1.7 y v2.2 anterior v2.2-RC2; Nag H3 v2.1 anterior v2.1.4 y 2.2 anterior v2.2-RC2; Mnemo H3 v2.1 anterior v2.1.2 y H3 2.2 anterior v2.2-RC2; Groupware v1.0 anterior v1.0.3 y v1.1 anterior v1.1-RC2; y Groupware Webmail Edition v1.0 anterior v1.0.4 y v1.1 anterior v1.1-RC2, no valida las propiedades al compartir cambios, con un impacto y vectores de ataque desconocidos." } ], "id": "CVE-2008-7219", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-09-13T22:30:00.420", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000362.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000363.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000364.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000368.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000369.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000371.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000376.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000377.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28382" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27217" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000362.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000363.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000364.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000368.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000369.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000371.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000376.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.horde.org/archives/announce/2008/000377.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-04-27 19:05
Modified
2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
horde | groupware | 1.0.5 | |
horde | groupware_webmail_edition | 1.0.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B3AB0176-9CB3-4D49-B644-2C413C9B6E13", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "842159D1-E30C-4077-8E92-07979E52C10B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de \u00f3rdenes en sitios cruzados (XSS) en addevent.php de Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, y Groupware 1.0.5 permite a atacantes remotos inyectar \u0027script\u0027 web o HTML de su elecci\u00f3n mediante el par\u00e1metro \"url\"." } ], "id": "CVE-2008-1974", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-04-27T19:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://forum.aria-security.com/showthread.php?t=49" }, { "source": "cve@mitre.org", "url": "http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/51238" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29920" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/30649" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3831" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/491230/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28898" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019934" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1373/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41974" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2008/dsa-1560" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://forum.aria-security.com/showthread.php?t=49" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/51238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30649" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3831" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/491230/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1373/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2008/dsa-1560" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-06-19 20:41
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*", "matchCriteriaId": "12221711-3AF8-477A-B61B-E65AD45C06B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED443641-1A9E-49FA-8478-BEEC8C692F91", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:kronolith:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BF59A10-210E-4590-8334-3A7274705E5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencia de comandos en sitios cruzados (XSS) en Horde Groupware, Groupware Webmail Edition y Kronolith, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro timestamp en (1) week.php, (2) workweek.php y (3) day.php; y (4) par\u00e1metro horde en PATH_INFO de la URI por defeceto. NOTA: el origen de esta informaci\u00f3n es desconocido; los detalles se han obtenido \u00fanicamente de informaci\u00f3n de terceros." } ], "id": "CVE-2008-2783", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-06-19T20:41:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/29365" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42640" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/29365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42640" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-01-24 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Horde_Form in Horde Groupware Webmail Edition before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to email verification. NOTE: Some of these details are obtained from third party information.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB0BA941-3235-46CB-A368-7E17482B0A15", "versionEndIncluding": "4.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A30F59C-D09A-495D-B5E5-E908D913164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "48205A35-1F67-4E90-A891-29AA4D2CC138", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "276A0BB9-6808-4901-8EEB-766AF6EE4E3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6E367E84-DD66-4512-BCDE-7D7E62B72A13", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B013D26B-BE67-4131-B320-EF87D19E9C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "664B0D12-607C-4B5F-AC8E-FB1BBD1332E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "989D5040-13B3-4D76-A516-81CAB112FE44", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA0765C9-BBFB-4676-9D79-0CFD86BCF9E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "842159D1-E30C-4077-8E92-07979E52C10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81D9B15F-C3CA-44DF-BF5E-51741793348B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "359D7ED8-E171-4822-B2F3-80E07287A787", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "46ADF628-449A-463E-A459-69FD9DB2ADAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "5E8F448D-DFB5-4BA3-BD28-13E39FF82A9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "5C783DC9-4379-49A8-A026-D1F933DB36AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc3:*:*:*:*:*:*", "matchCriteriaId": "2AD6F3C8-50F8-4E9B-98EA-8962B2310780", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc4:*:*:*:*:*:*", "matchCriteriaId": "36CFEF77-BE64-4547-9A5F-DABD589C5ED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C7522F6-DF2C-4225-932F-2D27C1EFD792", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "53BE7A07-3455-4A18-BDBC-DC261B35D427", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "503BB3EF-2BDC-4019-8EE2-B121A2600DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "54DA4725-AAA4-4A4B-B6A4-9A139A6176AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA22094F-3A01-4B66-99E1-0ED9D5574F82", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "0D105C44-38EE-4D86-9334-DA0E8A08B725", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C145E10-4AC0-4F25-9D98-64447BB7C103", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "461A597A-93DD-4A12-BB04-C02277317C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B256AACA-93C8-447A-AB08-ABF0A9E4E63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9D634210-6D2D-4181-8310-73FB5B9872D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C10C8DB-FB73-4982-8B92-D3E1FB1C59A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "319BC54E-2A0B-4033-AD73-3E8825E8D9B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "6A86680C-839E-4EED-9B32-CE101DC7B6B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "DF0F1DCA-7D9F-42E3-9FB9-D3C100F09A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BFADDD4-8B5E-4EE7-A390-CDFD48CE3ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "2F5FB253-C2E5-48F3-B13F-79C45024D89D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "E7D0D17F-B2E4-496D-9ACD-170C33B453F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "6314FAC0-544A-492F-81BA-9169EB69E74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "70CC6175-10F8-4DD9-A1E7-202F5F4A221C", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "3ED61953-A384-498C-AFFD-F83ADF51CFD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EC13F5CD-2BB9-4FA7-BE4C-D2175E18E063", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "FFF8191E-F2EA-4071-B26D-8E45103D4A0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "040AC7A5-689B-4F12-A199-FB395E4CB84B", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2CFD1571-C070-4B5F-9BA3-5B1789068396", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0909400D-75C6-4DED-8C77-333D8F092AA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:groupware_webmail_edition:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "08050D4C-6620-4177-9967-044AD2B9368B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Horde_Form in Horde Groupware Webmail Edition before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to email verification. NOTE: Some of these details are obtained from third party information." }, { "lang": "es", "value": "Vulnerbilidad de ejecuci\u00f3n de secuencias de comandos web en sitios cruzados (XSS) en Horde_Form en Horde Groupware Webmail Edition anterior a v4.0.6 permite a atacantes remotos inyectar c\u00f3digo HTML o script web a trav\u00e9s de vectores no especificados, relacionados con una verificaci\u00f3n de correo. NOTA: Algunos de estos detalles han sido obtenidos de terceras partes de informaci\u00f3n." } ], "id": "CVE-2012-0909", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-01-24T18:55:01.550", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47592" }, { "source": "cve@mitre.org", "url": "http://www.horde.org/apps/webmail/docs/CHANGES" }, { "source": "cve@mitre.org", "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/51586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.horde.org/apps/webmail/docs/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/51586" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2008-3650 (GCVE-0-2008-3650)
Vulnerability from cvelistv5
Published
2008-08-13 01:00
Modified
2024-08-07 09:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple unspecified vulnerabilities in Horde Groupware Webmail before Edition 1.1.1 (final) have unknown impact and attack vectors related to "unescaped output," possibly cross-site scripting (XSS), in the (1) object browser and (2) contact view.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/44479 | vdb-entry, x_refsource_XF | |
http://lists.horde.org/archives/announce/2008/000420.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:45:18.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "hordegroupwarewebmail-multiple-unspecified(44479)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44479" }, { "name": "[horde-announce] 20080614 [announce] Horde Groupware Webmail Edition 1.1.1 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000420.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Horde Groupware Webmail before Edition 1.1.1 (final) have unknown impact and attack vectors related to \"unescaped output,\" possibly cross-site scripting (XSS), in the (1) object browser and (2) contact view." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "hordegroupwarewebmail-multiple-unspecified(44479)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44479" }, { "name": "[horde-announce] 20080614 [announce] Horde Groupware Webmail Edition 1.1.1 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000420.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3650", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Horde Groupware Webmail before Edition 1.1.1 (final) have unknown impact and attack vectors related to \"unescaped output,\" possibly cross-site scripting (XSS), in the (1) object browser and (2) contact view." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "hordegroupwarewebmail-multiple-unspecified(44479)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44479" }, { "name": "[horde-announce] 20080614 [announce] Horde Groupware Webmail Edition 1.1.1 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000420.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3650", "datePublished": "2008-08-13T01:00:00", "dateReserved": "2008-08-12T00:00:00", "dateUpdated": "2024-08-07T09:45:18.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0807 (GCVE-0-2008-0807)
Vulnerability from cvelistv5
Published
2008-02-19 00:00
Modified
2024-08-07 08:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:38.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29186" }, { "name": "[announce] 20080215 Horde Groupware Webmail Edition 1.0.5 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000381.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027" }, { "name": "FEDORA-2008-2087", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html" }, { "name": "27844", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27844" }, { "name": "DSA-1507", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1507" }, { "name": "28982", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28982" }, { "name": "29071", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29071" }, { "name": "[announce] 20080215 Turba H3 (2.1.7) (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000378.html" }, { "name": "ADV-2008-0593", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0593/references" }, { "name": "[announce] 20080215 Turba H3 (2.2-RC3)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000379.html" }, { "name": "29185", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29185" }, { "name": "[announce] 20080215 Horde Groupware 1.0.4 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000380.html" }, { "name": "1019433", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019433" }, { "name": "29184", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29184" }, { "name": "FEDORA-2008-2040", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-03-05T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29186" }, { "name": "[announce] 20080215 Horde Groupware Webmail Edition 1.0.5 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000381.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027" }, { "name": "FEDORA-2008-2087", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html" }, { "name": "27844", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27844" }, { "name": "DSA-1507", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1507" }, { "name": "28982", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28982" }, { "name": "29071", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29071" }, { "name": "[announce] 20080215 Turba H3 (2.1.7) (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000378.html" }, { "name": "ADV-2008-0593", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0593/references" }, { "name": "[announce] 20080215 Turba H3 (2.2-RC3)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000379.html" }, { "name": "29185", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29185" }, { "name": "[announce] 20080215 Horde Groupware 1.0.4 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000380.html" }, { "name": "1019433", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019433" }, { "name": "29184", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29184" }, { "name": "FEDORA-2008-2040", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0807", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29186", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29186" }, { "name": "[announce] 20080215 Horde Groupware Webmail Edition 1.0.5 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000381.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=432027", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432027" }, { "name": "FEDORA-2008-2087", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html" }, { "name": "27844", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27844" }, { "name": "DSA-1507", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1507" }, { "name": "28982", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28982" }, { "name": "29071", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29071" }, { "name": "[announce] 20080215 Turba H3 (2.1.7) (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000378.html" }, { "name": "ADV-2008-0593", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0593/references" }, { "name": "[announce] 20080215 Turba H3 (2.2-RC3)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000379.html" }, { "name": "29185", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29185" }, { "name": "[announce] 20080215 Horde Groupware 1.0.4 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000380.html" }, { "name": "1019433", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019433" }, { "name": "29184", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29184" }, { "name": "FEDORA-2008-2040", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0807", "datePublished": "2008-02-19T00:00:00", "dateReserved": "2008-02-18T00:00:00", "dateUpdated": "2024-08-07T08:01:38.898Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1284 (GCVE-0-2008-1284)
Vulnerability from cvelistv5
Published
2008-03-11 00:00
Modified
2024-08-07 08:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via ".." sequences and a null byte in the theme name.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3726", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3726" }, { "name": "29286", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29286" }, { "name": "horde-theme-file-include(41054)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41054" }, { "name": "[announce] 20080307 Horde Groupware 1.0.5 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000383.html" }, { "name": "[announce] 20080307 Horde Groupware Webmail Edition 1.0.6 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000384.html" }, { "name": "FEDORA-2008-2406", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html" }, { "name": "20080307 Horde Webmail file inclusion proof of concept \u0026 patch.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489239/100/0/threaded" }, { "name": "GLSA-200805-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200805-01.xml" }, { "name": "DSA-1519", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1519" }, { "name": "30047", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30047" }, { "name": "FEDORA-2008-2362", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html" }, { "name": "29374", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29374" }, { "name": "20080308 Re: Horde Webmail file inclusion proof of concept \u0026 patch.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489289/100/0/threaded" }, { "name": "[announce] 20080307 Horde 3.1.7 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000382.html" }, { "name": "ADV-2008-0822", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0822/references" }, { "name": "28153", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28153" }, { "name": "29400", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29400" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via \"..\" sequences and a null byte in the theme name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3726", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3726" }, { "name": "29286", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29286" }, { "name": "horde-theme-file-include(41054)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41054" }, { "name": "[announce] 20080307 Horde Groupware 1.0.5 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000383.html" }, { "name": "[announce] 20080307 Horde Groupware Webmail Edition 1.0.6 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000384.html" }, { "name": "FEDORA-2008-2406", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html" }, { "name": "20080307 Horde Webmail file inclusion proof of concept \u0026 patch.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489239/100/0/threaded" }, { "name": "GLSA-200805-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200805-01.xml" }, { "name": "DSA-1519", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1519" }, { "name": "30047", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30047" }, { "name": "FEDORA-2008-2362", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html" }, { "name": "29374", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29374" }, { "name": "20080308 Re: Horde Webmail file inclusion proof of concept \u0026 patch.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489289/100/0/threaded" }, { "name": "[announce] 20080307 Horde 3.1.7 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000382.html" }, { "name": "ADV-2008-0822", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0822/references" }, { "name": "28153", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28153" }, { "name": "29400", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29400" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1284", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via \"..\" sequences and a null byte in the theme name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3726", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3726" }, { "name": "29286", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29286" }, { "name": "horde-theme-file-include(41054)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41054" }, { "name": "[announce] 20080307 Horde Groupware 1.0.5 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000383.html" }, { "name": "[announce] 20080307 Horde Groupware Webmail Edition 1.0.6 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000384.html" }, { "name": "FEDORA-2008-2406", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html" }, { "name": "20080307 Horde Webmail file inclusion proof of concept \u0026 patch.", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489239/100/0/threaded" }, { "name": "GLSA-200805-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200805-01.xml" }, { "name": "DSA-1519", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1519" }, { "name": "30047", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30047" }, { "name": "FEDORA-2008-2362", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html" }, { "name": "29374", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29374" }, { "name": "20080308 Re: Horde Webmail file inclusion proof of concept \u0026 patch.", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489289/100/0/threaded" }, { "name": "[announce] 20080307 Horde 3.1.7 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000382.html" }, { "name": "ADV-2008-0822", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0822/references" }, { "name": "28153", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28153" }, { "name": "29400", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29400" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1284", "datePublished": "2008-03-11T00:00:00", "dateReserved": "2008-03-10T00:00:00", "dateUpdated": "2024-08-07T08:17:34.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0791 (GCVE-0-2012-0791)
Vulnerability from cvelistv5
Published
2012-01-24 18:00
Modified
2024-08-06 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Horde IMP before 5.0.18 and Horde Groupware Webmail Edition before 4.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) composeCache, (2) rtemode, or (3) filename_* parameters to the compose page; (4) formname parameter to the contacts popup window; or (5) IMAP mailbox names. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.horde.org/apps/webmail/docs/CHANGES | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2485 | vendor-advisory, x_refsource_DEBIAN | |
http://www.horde.org/apps/webmail/docs/RELEASE_NOTES | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1026553 | vdb-entry, x_refsource_SECTRACK | |
http://www.horde.org/apps/imp/docs/RELEASE_NOTES | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/51586 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/47580 | third-party-advisory, x_refsource_SECUNIA | |
http://www.horde.org/apps/imp/docs/CHANGES | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1026554 | vdb-entry, x_refsource_SECTRACK | |
http://www.openwall.com/lists/oss-security/2012/01/22/2 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/47592 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.horde.org/apps/webmail/docs/CHANGES" }, { "name": "DSA-2485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2485" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES" }, { "name": "1026553", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026553" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.horde.org/apps/imp/docs/RELEASE_NOTES" }, { "name": "51586", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51586" }, { "name": "47580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47580" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.horde.org/apps/imp/docs/CHANGES" }, { "name": "1026554", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026554" }, { "name": "[oss-security] 20120121 Re: Re: CVE Request -- Horde IMP -- Multiple XSS flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2" }, { "name": "47592", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47592" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde IMP before 5.0.18 and Horde Groupware Webmail Edition before 4.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) composeCache, (2) rtemode, or (3) filename_* parameters to the compose page; (4) formname parameter to the contacts popup window; or (5) IMAP mailbox names. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-17T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.horde.org/apps/webmail/docs/CHANGES" }, { "name": "DSA-2485", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2485" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES" }, { "name": "1026553", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026553" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.horde.org/apps/imp/docs/RELEASE_NOTES" }, { "name": "51586", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51586" }, { "name": "47580", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47580" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.horde.org/apps/imp/docs/CHANGES" }, { "name": "1026554", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026554" }, { "name": "[oss-security] 20120121 Re: Re: CVE Request -- Horde IMP -- Multiple XSS flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2" }, { "name": "47592", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47592" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-0791", "datePublished": "2012-01-24T18:00:00", "dateReserved": "2012-01-19T00:00:00", "dateUpdated": "2024-08-06T18:38:14.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1974 (GCVE-0-2008-1974)
Vulnerability from cvelistv5
Published
2008-04-27 19:00
Modified
2024-08-07 08:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:41:00.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "51238", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/51238" }, { "name": "FEDORA-2008-3460", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html" }, { "name": "29920", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29920" }, { "name": "28898", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28898" }, { "name": "30649", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30649" }, { "name": "1019934", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019934" }, { "name": "FEDORA-2008-3543", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html" }, { "name": "20080422 Horde Webmail XSS [Aria-Security]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/491230/100/0/threaded" }, { "name": "horde-webmail-addevent-xss(41974)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41974" }, { "name": "ADV-2008-1373", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1373/references" }, { "name": "DSA-1560", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2008/dsa-1560" }, { "name": "3831", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3831" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://forum.aria-security.com/showthread.php?t=49" }, { "name": "[kronolith] 20080427 Kronolith H3 (2.1.8) (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "51238", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/51238" }, { "name": "FEDORA-2008-3460", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html" }, { "name": "29920", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29920" }, { "name": "28898", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28898" }, { "name": "30649", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30649" }, { "name": "1019934", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019934" }, { "name": "FEDORA-2008-3543", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html" }, { "name": "20080422 Horde Webmail XSS [Aria-Security]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/491230/100/0/threaded" }, { "name": "horde-webmail-addevent-xss(41974)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41974" }, { "name": "ADV-2008-1373", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1373/references" }, { "name": "DSA-1560", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2008/dsa-1560" }, { "name": "3831", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3831" }, { "tags": [ "x_refsource_MISC" ], "url": "http://forum.aria-security.com/showthread.php?t=49" }, { "name": "[kronolith] 20080427 Kronolith H3 (2.1.8) (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1974", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "51238", "refsource": "OSVDB", "url": "http://osvdb.org/51238" }, { "name": "FEDORA-2008-3460", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html" }, { "name": "29920", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29920" }, { "name": "28898", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28898" }, { "name": "30649", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30649" }, { "name": "1019934", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019934" }, { "name": "FEDORA-2008-3543", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html" }, { "name": "20080422 Horde Webmail XSS [Aria-Security]", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/491230/100/0/threaded" }, { "name": "horde-webmail-addevent-xss(41974)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41974" }, { "name": "ADV-2008-1373", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1373/references" }, { "name": "DSA-1560", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2008/dsa-1560" }, { "name": "3831", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3831" }, { "name": "http://forum.aria-security.com/showthread.php?t=49", "refsource": "MISC", "url": "http://forum.aria-security.com/showthread.php?t=49" }, { "name": "[kronolith] 20080427 Kronolith H3 (2.1.8) (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1974", "datePublished": "2008-04-27T19:00:00", "dateReserved": "2008-04-27T00:00:00", "dateUpdated": "2024-08-07T08:41:00.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6018 (GCVE-0-2007-6018)
Vulnerability from cvelistv5
Published
2008-01-11 02:00
Modified
2024-08-07 15:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) "purge" deleted emails via a crafted email message.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:54:25.651Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29186" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428625" }, { "name": "SUSE-SR:2009:007", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" }, { "name": "horde-impgroupware-filter-security-bypass(39595)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39595" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17\u0026r2=1.17.2.1\u0026ty=h" }, { "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "name": "[announce] 20080109 Horde 3.1.6 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000360.html" }, { "name": "34418", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34418" }, { "name": "FEDORA-2008-2087", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html" }, { "name": "27223", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27223" }, { "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12\u0026r2=1.12.2.1\u0026ty=h" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2007-102/advisory/" }, { "name": "28020", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28020" }, { "name": "29185", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29185" }, { "name": "28546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28546" }, { "name": "29184", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29184" }, { "name": "DSA-1470", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1470" }, { "name": "FEDORA-2008-2040", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) \"purge\" deleted emails via a crafted email message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "29186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29186" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428625" }, { "name": "SUSE-SR:2009:007", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" }, { "name": "horde-impgroupware-filter-security-bypass(39595)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39595" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17\u0026r2=1.17.2.1\u0026ty=h" }, { "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "name": "[announce] 20080109 Horde 3.1.6 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000360.html" }, { "name": "34418", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34418" }, { "name": "FEDORA-2008-2087", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html" }, { "name": "27223", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27223" }, { "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12\u0026r2=1.12.2.1\u0026ty=h" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2007-102/advisory/" }, { "name": "28020", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28020" }, { "name": "29185", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29185" }, { "name": "28546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28546" }, { "name": "29184", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29184" }, { "name": "DSA-1470", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1470" }, { "name": "FEDORA-2008-2040", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2007-6018", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) \"purge\" deleted emails via a crafted email message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29186", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29186" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=428625", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428625" }, { "name": "SUSE-SR:2009:007", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" }, { "name": "horde-impgroupware-filter-security-bypass(39595)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39595" }, { "name": "http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17\u0026r2=1.17.2.1\u0026ty=h", "refsource": "CONFIRM", "url": "http://cvs.horde.org/diff.php/groupware/docs/groupware/CHANGES?r1=1.17\u0026r2=1.17.2.1\u0026ty=h" }, { "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "name": "[announce] 20080109 Horde 3.1.6 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000360.html" }, { "name": "34418", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34418" }, { "name": "FEDORA-2008-2087", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html" }, { "name": "27223", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27223" }, { "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "name": "http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12\u0026r2=1.12.2.1\u0026ty=h", "refsource": "CONFIRM", "url": "http://cvs.horde.org/diff.php/groupware/docs/webmail/CHANGES?r1=1.12\u0026r2=1.12.2.1\u0026ty=h" }, { "name": "http://secunia.com/secunia_research/2007-102/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2007-102/advisory/" }, { "name": "28020", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28020" }, { "name": "29185", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29185" }, { "name": "28546", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28546" }, { "name": "29184", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29184" }, { "name": "DSA-1470", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1470" }, { "name": "FEDORA-2008-2040", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2007-6018", "datePublished": "2008-01-11T02:00:00", "dateReserved": "2007-11-19T00:00:00", "dateUpdated": "2024-08-07T15:54:25.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0909 (GCVE-0-2012-0909)
Vulnerability from cvelistv5
Published
2012-01-24 18:00
Modified
2024-09-17 04:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in Horde_Form in Horde Groupware Webmail Edition before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to email verification. NOTE: Some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.horde.org/apps/webmail/docs/CHANGES | x_refsource_CONFIRM | |
http://www.horde.org/apps/webmail/docs/RELEASE_NOTES | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/51586 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2012/01/22/2 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/47592 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.horde.org/apps/webmail/docs/CHANGES" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES" }, { "name": "51586", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51586" }, { "name": "[oss-security] 20120121 Re: Re: CVE Request -- Horde IMP -- Multiple XSS flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2" }, { "name": "47592", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47592" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Horde_Form in Horde Groupware Webmail Edition before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to email verification. NOTE: Some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-24T18:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.horde.org/apps/webmail/docs/CHANGES" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES" }, { "name": "51586", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51586" }, { "name": "[oss-security] 20120121 Re: Re: CVE Request -- Horde IMP -- Multiple XSS flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2" }, { "name": "47592", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47592" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-0909", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Horde_Form in Horde Groupware Webmail Edition before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to email verification. NOTE: Some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.horde.org/apps/webmail/docs/CHANGES", "refsource": "CONFIRM", "url": "http://www.horde.org/apps/webmail/docs/CHANGES" }, { "name": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES", "refsource": "CONFIRM", "url": "http://www.horde.org/apps/webmail/docs/RELEASE_NOTES" }, { "name": "51586", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51586" }, { "name": "[oss-security] 20120121 Re: Re: CVE Request -- Horde IMP -- Multiple XSS flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/01/22/2" }, { "name": "47592", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47592" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-0909", "datePublished": "2012-01-24T18:00:00Z", "dateReserved": "2012-01-21T00:00:00Z", "dateUpdated": "2024-09-17T04:05:11.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-7219 (GCVE-0-2008-7219)
Vulnerability from cvelistv5
Published
2009-09-13 22:00
Modified
2024-09-17 01:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Horde Kronolith H3 2.1 before 2.1.7 and 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and H3 2.2 before 2.2-RC2; Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 does not validate ownership when performing share changes, which has unknown impact and attack vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:56:14.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[announce] 20080122 Kronolith H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000371.html" }, { "name": "[announce] 20080122 Mnemo H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000369.html" }, { "name": "[announce] 20080109 Nag H3 (2.1.4) (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000363.html" }, { "name": "27217", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27217" }, { "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "name": "[announce] 20080206 Horde Groupware 1.1-RC2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000376.html" }, { "name": "FEDORA-2008-2212", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html" }, { "name": "[announce] 20080109 Mnemo H3 (2.1.2) (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000364.html" }, { "name": "28382", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28382" }, { "name": "[announce] 20080206 Horde Groupware Webmail Edition 1.1-RC2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000377.html" }, { "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "name": "[announce] 20080109 Kronolith H3 (2.1.7) (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000362.html" }, { "name": "[announce] 20080122 Nag H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000368.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Horde Kronolith H3 2.1 before 2.1.7 and 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and H3 2.2 before 2.2-RC2; Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 does not validate ownership when performing share changes, which has unknown impact and attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-09-13T22:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[announce] 20080122 Kronolith H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000371.html" }, { "name": "[announce] 20080122 Mnemo H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000369.html" }, { "name": "[announce] 20080109 Nag H3 (2.1.4) (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000363.html" }, { "name": "27217", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27217" }, { "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "name": "[announce] 20080206 Horde Groupware 1.1-RC2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000376.html" }, { "name": "FEDORA-2008-2212", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html" }, { "name": "[announce] 20080109 Mnemo H3 (2.1.2) (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000364.html" }, { "name": "28382", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28382" }, { "name": "[announce] 20080206 Horde Groupware Webmail Edition 1.1-RC2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000377.html" }, { "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "name": "[announce] 20080109 Kronolith H3 (2.1.7) (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000362.html" }, { "name": "[announce] 20080122 Nag H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000368.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-7219", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Horde Kronolith H3 2.1 before 2.1.7 and 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and H3 2.2 before 2.2-RC2; Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 does not validate ownership when performing share changes, which has unknown impact and attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[announce] 20080122 Kronolith H3 (2.2-RC2)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000371.html" }, { "name": "[announce] 20080122 Mnemo H3 (2.2-RC2)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000369.html" }, { "name": "[announce] 20080109 Nag H3 (2.1.4) (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000363.html" }, { "name": "27217", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27217" }, { "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "name": "[announce] 20080206 Horde Groupware 1.1-RC2", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000376.html" }, { "name": "FEDORA-2008-2212", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html" }, { "name": "[announce] 20080109 Mnemo H3 (2.1.2) (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000364.html" }, { "name": "28382", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28382" }, { "name": "[announce] 20080206 Horde Groupware Webmail Edition 1.1-RC2", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000377.html" }, { "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "name": "[announce] 20080109 Kronolith H3 (2.1.7) (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000362.html" }, { "name": "[announce] 20080122 Nag H3 (2.2-RC2)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000368.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-7219", "datePublished": "2009-09-13T22:00:00Z", "dateReserved": "2009-09-13T00:00:00Z", "dateUpdated": "2024-09-17T01:06:15.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-2783 (GCVE-0-2008-2783)
Vulnerability from cvelistv5
Published
2008-06-19 20:00
Modified
2024-08-07 09:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/29365 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42640 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:14:14.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29365", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29365" }, { "name": "kronolith-groupware-multiple-xss(42640)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42640" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-05-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29365", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29365" }, { "name": "kronolith-groupware-multiple-xss(42640)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42640" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-2783", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29365", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29365" }, { "name": "kronolith-groupware-multiple-xss(42640)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42640" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-2783", "datePublished": "2008-06-19T20:00:00", "dateReserved": "2008-06-19T00:00:00", "dateUpdated": "2024-08-07T09:14:14.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-7218 (GCVE-0-2008-7218)
Vulnerability from cvelistv5
Published
2009-09-13 22:00
Modified
2024-08-07 11:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the Horde API in Horde 3.1 before 3.1.6 and 3.2 before 3.2 before 3.2-RC2; Turba H3 2.1 before 2.1.6 and 2.2 before 2.2-RC2; Kronolith H3 2.1 before 2.1.7 and H3 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and 2.2 before 2.2-RC2; Horde Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 has unknown impact and attack vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:56:14.413Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[announce] 20080122 Kronolith H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000371.html" }, { "name": "[announce] 20080122 Mnemo H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000369.html" }, { "name": "[announce] 20080109 Nag H3 (2.1.4) (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000363.html" }, { "name": "27217", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27217" }, { "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "name": "[announce] 20080206 Horde Groupware 1.1-RC2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000376.html" }, { "name": "[announce] 20080122 Turba H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000367.html" }, { "name": "FEDORA-2008-2212", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html" }, { "name": "[announce] 20080109 Horde 3.1.6 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000360.html" }, { "name": "[announce] 20080109 Mnemo H3 (2.1.2) (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000364.html" }, { "name": "28382", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28382" }, { "name": "[announce] 20080206 Horde Groupware Webmail Edition 1.1-RC2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000377.html" }, { "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "name": "[announce] 20080109 Turba H3 (2.1.6) (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000361.html" }, { "name": "horde-hordeapi-privilege-escalation(39599)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39599" }, { "name": "[announce] 20080122 Horde 3.2-RC2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000374.html" }, { "name": "[announce] 20080109 Kronolith H3 (2.1.7) (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000362.html" }, { "name": "[announce] 20080122 Nag H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2008/000368.html" }, { "name": "42775", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/42775" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Horde API in Horde 3.1 before 3.1.6 and 3.2 before 3.2 before 3.2-RC2; Turba H3 2.1 before 2.1.6 and 2.2 before 2.2-RC2; Kronolith H3 2.1 before 2.1.7 and H3 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and 2.2 before 2.2-RC2; Horde Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 has unknown impact and attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[announce] 20080122 Kronolith H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000371.html" }, { "name": "[announce] 20080122 Mnemo H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000369.html" }, { "name": "[announce] 20080109 Nag H3 (2.1.4) (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000363.html" }, { "name": "27217", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27217" }, { "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "name": "[announce] 20080206 Horde Groupware 1.1-RC2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000376.html" }, { "name": "[announce] 20080122 Turba H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000367.html" }, { "name": "FEDORA-2008-2212", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html" }, { "name": "[announce] 20080109 Horde 3.1.6 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000360.html" }, { "name": "[announce] 20080109 Mnemo H3 (2.1.2) (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000364.html" }, { "name": "28382", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28382" }, { "name": "[announce] 20080206 Horde Groupware Webmail Edition 1.1-RC2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000377.html" }, { "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "name": "[announce] 20080109 Turba H3 (2.1.6) (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000361.html" }, { "name": "horde-hordeapi-privilege-escalation(39599)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39599" }, { "name": "[announce] 20080122 Horde 3.2-RC2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000374.html" }, { "name": "[announce] 20080109 Kronolith H3 (2.1.7) (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000362.html" }, { "name": "[announce] 20080122 Nag H3 (2.2-RC2)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2008/000368.html" }, { "name": "42775", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/42775" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-7218", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Horde API in Horde 3.1 before 3.1.6 and 3.2 before 3.2 before 3.2-RC2; Turba H3 2.1 before 2.1.6 and 2.2 before 2.2-RC2; Kronolith H3 2.1 before 2.1.7 and H3 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and 2.2 before 2.2-RC2; Horde Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 has unknown impact and attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[announce] 20080122 Kronolith H3 (2.2-RC2)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000371.html" }, { "name": "[announce] 20080122 Mnemo H3 (2.2-RC2)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000369.html" }, { "name": "[announce] 20080109 Nag H3 (2.1.4) (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000363.html" }, { "name": "27217", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27217" }, { "name": "[announce] 20080109 Horde Groupware 1.0.3 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000365.html" }, { "name": "[announce] 20080206 Horde Groupware 1.1-RC2", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000376.html" }, { "name": "[announce] 20080122 Turba H3 (2.2-RC2)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000367.html" }, { "name": "FEDORA-2008-2212", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00176.html" }, { "name": "[announce] 20080109 Horde 3.1.6 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000360.html" }, { "name": "[announce] 20080109 Mnemo H3 (2.1.2) (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000364.html" }, { "name": "28382", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28382" }, { "name": "[announce] 20080206 Horde Groupware Webmail Edition 1.1-RC2", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000377.html" }, { "name": "[announce] 20080110 Horde Groupware Webmail Edition 1.0.4 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000366.html" }, { "name": "[announce] 20080109 Turba H3 (2.1.6) (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000361.html" }, { "name": "horde-hordeapi-privilege-escalation(39599)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39599" }, { "name": "[announce] 20080122 Horde 3.2-RC2", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000374.html" }, { "name": "[announce] 20080109 Kronolith H3 (2.1.7) (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000362.html" }, { "name": "[announce] 20080122 Nag H3 (2.2-RC2)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2008/000368.html" }, { "name": "42775", "refsource": "OSVDB", "url": "http://www.osvdb.org/42775" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-7218", "datePublished": "2009-09-13T22:00:00", "dateReserved": "2009-09-13T00:00:00", "dateUpdated": "2024-08-07T11:56:14.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }