Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown
CVE-2004-0584
Disclosure Date: August 06, 2004 (last updated February 22, 2025)
Unknown vulnerability in Horde IMP 3.2.3 and earlier, before a "security fix," does not properly validate input, which allows remote attackers to execute arbitrary script as other users via script or HTML in an e-mail message, possibly triggering a cross-site scripting (XSS) vulnerability.
0
Attacker Value
Unknown
CVE-2001-0744
Disclosure Date: October 18, 2001 (last updated February 22, 2025)
Horde IMP 2.2.4 and earlier allows local users to overwrite files via a symlink attack on a temporary file.
0
Attacker Value
Unknown
CVE-2001-1257
Disclosure Date: July 21, 2001 (last updated February 22, 2025)
Cross-site scripting vulnerability in Horde Internet Messaging Program (IMP) before 2.2.6 and 1.2.6 allows remote attackers to execute arbitrary Javascript embedded in an email.
0
Attacker Value
Unknown
CVE-2001-1258
Disclosure Date: July 21, 2001 (last updated February 22, 2025)
Horde Internet Messaging Program (IMP) before 2.2.6 allows local users to read IMP configuration files and steal the Horde database password by placing the prefs.lang file containing PHP code on the server.
0
Attacker Value
Unknown
CVE-2000-0911
Disclosure Date: December 19, 2000 (last updated February 22, 2025)
IMP 2.2 and earlier allows attackers to read and delete arbitrary files by modifying the attachment_name hidden form variable, which causes IMP to send the file to the attacker as an attachment.
0
Attacker Value
Unknown
CVE-2000-0459
Disclosure Date: April 22, 2000 (last updated February 22, 2025)
IMP does not remove files properly if the MSWordView application quits, which allows local users to cause a denial of service by filling up the disk space by requesting a large number of documents and prematurely stopping the request.
0
Attacker Value
Unknown
CVE-2000-0458
Disclosure Date: April 22, 2000 (last updated February 22, 2025)
The MSWordView application in IMP creates world-readable files in the /tmp directory, which allows other local users to read potentially sensitive information.
0