Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Groupware
(Horde)Repositories |
• https://github.com/horde/horde
• https://github.com/horde/kronolith • https://github.com/horde/base |
#Vulnerabilities | 43 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2017-11-20 | CVE-2017-16906 | In Horde Groupware 5.2.19-5.2.22, there is XSS via the URL field in a "Calendar -> New Event" action. | Groupware | 5.4 | ||
2017-10-11 | CVE-2017-15235 | The File Manager (gollem) module 3.0.11 in Horde Groupware 5.2.21 allows remote attackers to bypass Horde authentication for file downloads via a crafted fn parameter that corresponds to the exact filename. | Groupware | 7.5 | ||
2019-11-05 | CVE-2013-6365 | Horde Groupware Web mail 5.1.2 has CSRF with requests to change permissions | Debian_linux, Groupware, Opensuse | N/A | ||
2020-05-18 | CVE-2020-8035 | The image view functionality in Horde Groupware Webmail Edition before 5.2.22 is affected by a stored Cross-Site Scripting (XSS) vulnerability via an SVG image upload containing a JavaScript payload. An attacker can obtain access to a victim's webmail account by making them visit a malicious URL. | Groupware | N/A | ||
2020-05-18 | CVE-2020-8034 | Gollem before 3.0.13, as used in Horde Groupware Webmail Edition 5.2.22 and other products, is affected by a reflected Cross-Site Scripting (XSS) vulnerability via the HTTP GET dir parameter in the browser functionality, affecting breadcrumb output. An attacker can obtain access to a victim's webmail account by making them visit a malicious URL. | Gollem, Groupware | N/A | ||
2019-10-24 | CVE-2019-12095 | Horde Trean, as used in Horde Groupware Webmail Edition through 5.2.22 and other products, allows CSRF, as demonstrated by the treanBookmarkTags parameter to the trean/ URI on a webmail server. NOTE: treanBookmarkTags could, for example, be a stored XSS payload. | Groupware | N/A | ||
2019-10-24 | CVE-2019-12094 | Horde Groupware Webmail Edition through 5.2.22 allows XSS via an admin/user.php?form=update_f&user_name= or admin/user.php?form=remove_f&user_name= or admin/config/diff.php?app= URI. | Groupware | N/A | ||
2019-11-05 | CVE-2013-6364 | Horde Groupware Webmail Edition has CSRF and XSS when saving search as a virtual address book | Debian_linux, Groupware | N/A | ||
2019-11-05 | CVE-2013-6275 | Multiple CSRF issues in Horde Groupware Webmail Edition 5.1.2 and earlier in basic.php. | Debian_linux, Groupware | N/A | ||
2017-04-04 | CVE-2017-7414 | In Horde_Crypt before 2.7.6, as used in Horde Groupware Webmail Edition 5.x through 5.2.17, OS Command Injection can occur if the user has PGP features enabled in the user's preferences, and has enabled the "Should PGP signed messages be automatically verified when viewed?" preference. To exploit this vulnerability, an attacker can send a PGP signed email (that is maliciously crafted) to the Horde user, who then must either view or preview it. | Groupware | 7.5 |