CVE-2009-4363 (GCVE-0-2009-4363)
Vulnerability from cvelistv5
Published
2009-12-21 16:00
Modified
2024-09-17 01:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Text_Filter/lib/Horde/Text/Filter/Xss.php in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 does not properly handle data: URIs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via data:text/html values for the HREF attribute of an A element in an HTML e-mail message. NOTE: the vendor states that the issue is caused by "an XSS vulnerability in Firefox browsers."
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:01:20.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[announce] 20091216 Horde Groupware 1.2.5 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2" }, { "name": "[announce] 20091215 Horde 3.3.6 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.horde.org/archives/announce/2009/000529.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.horde.org/view.php?actionID=view_file\u0026type=patch\u0026file=0002-Bug-8715-Fix-XSS-vulnerability%5B1%5D.patch\u0026ticket=8715" }, { "name": "[announce] 20091217 Horde Groupware Webmail Edition 1.2.5 (final)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.horde.org/ticket/8715" }, { "name": "1023365", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023365" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Text_Filter/lib/Horde/Text/Filter/Xss.php in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 does not properly handle data: URIs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via data:text/html values for the HREF attribute of an A element in an HTML e-mail message. NOTE: the vendor states that the issue is caused by \"an XSS vulnerability in Firefox browsers.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-12-21T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[announce] 20091216 Horde Groupware 1.2.5 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2" }, { "name": "[announce] 20091215 Horde 3.3.6 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.horde.org/archives/announce/2009/000529.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.horde.org/view.php?actionID=view_file\u0026type=patch\u0026file=0002-Bug-8715-Fix-XSS-vulnerability%5B1%5D.patch\u0026ticket=8715" }, { "name": "[announce] 20091217 Horde Groupware Webmail Edition 1.2.5 (final)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.horde.org/ticket/8715" }, { "name": "1023365", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023365" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-4363", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Text_Filter/lib/Horde/Text/Filter/Xss.php in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 does not properly handle data: URIs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via data:text/html values for the HREF attribute of an A element in an HTML e-mail message. NOTE: the vendor states that the issue is caused by \"an XSS vulnerability in Firefox browsers.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[announce] 20091216 Horde Groupware 1.2.5 (final)", "refsource": "MLIST", "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2" }, { "name": "[announce] 20091215 Horde 3.3.6 (final)", "refsource": "MLIST", "url": "http://lists.horde.org/archives/announce/2009/000529.html" }, { "name": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h", "refsource": "CONFIRM", "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h" }, { "name": "http://bugs.horde.org/view.php?actionID=view_file\u0026type=patch\u0026file=0002-Bug-8715-Fix-XSS-vulnerability%5B1%5D.patch\u0026ticket=8715", "refsource": "CONFIRM", "url": "http://bugs.horde.org/view.php?actionID=view_file\u0026type=patch\u0026file=0002-Bug-8715-Fix-XSS-vulnerability%5B1%5D.patch\u0026ticket=8715" }, { "name": "[announce] 20091217 Horde Groupware Webmail Edition 1.2.5 (final)", "refsource": "MLIST", "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2" }, { "name": "http://bugs.horde.org/ticket/8715", "refsource": "CONFIRM", "url": "http://bugs.horde.org/ticket/8715" }, { "name": "1023365", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023365" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-4363", "datePublished": "2009-12-21T16:00:00Z", "dateReserved": "2009-12-21T00:00:00Z", "dateUpdated": "2024-09-17T01:20:38.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-4363\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-12-21T16:30:00.483\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Text_Filter/lib/Horde/Text/Filter/Xss.php in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 does not properly handle data: URIs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via data:text/html values for the HREF attribute of an A element in an HTML e-mail message. NOTE: the vendor states that the issue is caused by \\\"an XSS vulnerability in Firefox browsers.\\\"\"},{\"lang\":\"es\",\"value\":\"Text_Filter/lib/Horde/Text/Filter/Xss.php en Horde Application Framework versiones anteriores a v3.3.6, Horde Groupware versiones anteriores a v1.2.5, y Horde Groupware Webmail Edition versiones anteriores a v1.2.5 no maneja adecuadamente data: URIs, permitiendo a atacantes remotos dirigir ataques de secuencias de comandos en sitios cruzados (XSS) mediante valores data:text/html para el atributo HREF de un elemento A en un mensaje HTML de correo electr\u00f3nico. NOTA: el proveedor mantiene que el incidente est\u00e1 causado por \\\"una vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el navegador Firefox\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.5\",\"matchCriteriaId\":\"5CD5438E-7D99-4286-81F3-1A304E9A7BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D3532FD-0E85-4EDC-A3A7-76F8BA915B6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D39B3B91-16B9-4B5B-AB4E-9BA568CC1E5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACBE1BB3-EAB6-4388-95C2-0513B0D6A327\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B402F70-BAAD-44D6-B414-F615F973DC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F2DA0C-C8A3-429C-83C7-B2983D3FF148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7535FE38-0FBD-48CC-9FDE-C7CA2C18CA24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A14A770E-60BC-4698-8BFC-5FB745A52279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2.4_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23A0AA21-C88D-45C4-9D95-414B2278E601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AE35AF8-CA38-42FB-BA32-057BCA2CA2AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91CA767-F49D-48E9-80CE-78B65DD14DF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEC8BBFC-263E-4735-847D-5544D18922E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB1F389-5D64-4B8C-B207-7D23F0C12DBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE8892DF-11F2-4991-97E8-D561DEAC4F5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B46B6F5-055E-44EB-BB78-503811C0E57C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66B197B0-F3B7-40D6-9872-C1A94622C242\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2698E2D7-09BF-4490-B362-4245CD3087D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B40A46-117D-4D85-8CC8-27236A3280C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEFBECFF-D1A4-465D-B59F-E70246DE4BE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57ABD1BD-6676-4B54-9F3E-FACF1346794F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79EC6167-5D16-4236-8EBC-412EE1784802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A4F6A2A-05B6-42EA-8F61-D0AB610A6757\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1F91CDA-B425-4DB2-89E4-12267B600D13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A8BB743-A760-4C72-880C-759E54FB7CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89477FCC-C925-418A-A3FF-F5B02736600C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5862181-4CE7-452F-8877-41E099440188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E601FE-94F1-48AD-A0F2-42824A3A4FC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE2B06C-EDBD-4FA1-90AA-148E39EF5AE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5CF33A8-C497-4C86-8C5D-7181597BEC53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B312DB-14BE-425C-9B07-0CBED6F39E2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2CF2865-CA12-4C4C-9BEC-7A97E6AAB377\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF389AE4-D2AD-4992-BFBD-68FB1CBEE50B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2.4\",\"matchCriteriaId\":\"5611B7D8-8AEF-42A8-8132-39CE773A7C18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71C2653B-7F0B-4628-9E77-44744BC05463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B574D428-0A3A-47CA-A926-5C936F83919A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59C23FB-E223-4EED-8F69-3CC1EE7DF148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"904EEFF0-CF66-43E6-BAA9-1A6FB4115CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3AB0176-9CB3-4D49-B644-2C413C9B6E13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BBB036-494E-41D4-BD04-40906FAB5C60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19CC5154-42C5-4877-9147-5DFD61BD5CDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62AAEBBF-1696-4EAC-8837-68A03C2D2F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F626876D-99FC-4DE0-BEE0-35874C4E25F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A849DD3E-882A-4621-BB6C-315A76677BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB711B5E-9011-4BA2-917A-DB8545705E23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50DC1068-F426-497F-A5A0-E032BC3816F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C5A176-8C72-40EA-85AC-F11B40FD53A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F24E43-491B-4AD1-B905-66F7FC6DA98D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2.4\",\"matchCriteriaId\":\"5611B7D8-8AEF-42A8-8132-39CE773A7C18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71C2653B-7F0B-4628-9E77-44744BC05463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E55009DF-EDF1-4FAE-88E7-1CF33BFFEBC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"980162BB-48B3-4921-987A-6D18C62965A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B574D428-0A3A-47CA-A926-5C936F83919A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59C23FB-E223-4EED-8F69-3CC1EE7DF148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"904EEFF0-CF66-43E6-BAA9-1A6FB4115CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3AB0176-9CB3-4D49-B644-2C413C9B6E13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C95E9B57-2DB0-4692-A7D1-180EC3687D1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E7D8683-8DD4-4EB0-A28F-0C556304BB2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F68E5D5-7812-4FB2-ACF9-76180B038D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BBB036-494E-41D4-BD04-40906FAB5C60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"37B76B27-ADF0-4E88-B92C-304FB38A356E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"965F245A-879A-4DF0-ABC5-588E78C4CBBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DCB29F9-3875-4264-8117-5751FEDC3350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"59FC250F-EF0B-4604-99A2-3EEB8B2DEB77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19CC5154-42C5-4877-9147-5DFD61BD5CDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62AAEBBF-1696-4EAC-8837-68A03C2D2F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F626876D-99FC-4DE0-BEE0-35874C4E25F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A849DD3E-882A-4621-BB6C-315A76677BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAF1A6AE-0748-476B-ACE2-DA43A9443B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB711B5E-9011-4BA2-917A-DB8545705E23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50DC1068-F426-497F-A5A0-E032BC3816F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C5A176-8C72-40EA-85AC-F11B40FD53A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F24E43-491B-4AD1-B905-66F7FC6DA98D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F577A169-8354-4218-B3C6-04DA4BDF1E3C\"}]}]}],\"references\":[{\"url\":\"http://bugs.horde.org/ticket/8715\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://bugs.horde.org/view.php?actionID=view_file\u0026type=patch\u0026file=0002-Bug-8715-Fix-XSS-vulnerability%5B1%5D.patch\u0026ticket=8715\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.horde.org/archives/announce/2009/000529.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://securitytracker.com/id?1023365\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.horde.org/ticket/8715\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://bugs.horde.org/view.php?actionID=view_file\u0026type=patch\u0026file=0002-Bug-8715-Fix-XSS-vulnerability%5B1%5D.patch\u0026ticket=8715\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.horde.org/archives/announce/2009/000529.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://securitytracker.com/id?1023365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…