Show filters
202 Total Results
Displaying 21-30 of 202
Sort by:
Attacker Value
Unknown
CVE-2020-18670
Disclosure Date: June 24, 2021 (last updated February 22, 2025)
Cross Site Scripting (XSS) vulneraibility in Roundcube mail .4.4 via database host and user in /installer/test.php.
0
Attacker Value
Unknown
CVE-2021-26294
Disclosure Date: March 07, 2021 (last updated February 22, 2025)
An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_user account (with caldav_public_user as its password).
0
Attacker Value
Unknown
CVE-2021-26293
Disclosure Date: March 04, 2021 (last updated February 22, 2025)
An issue was discovered in AfterLogic Aurora through 8.5.3 and WebMail Pro through 8.5.3, when DAV is enabled. They allow directory traversal to create new files (such as an executable file under the web root). This is related to DAVServer.php in 8.x and DAV/Server.php in 7.x.
0
Attacker Value
Unknown
CVE-2021-26925
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Roundcube before 1.4.11 allows XSS via crafted Cascading Style Sheets (CSS) token sequences during HTML email rendering.
0
Attacker Value
Unknown
CVE-2020-18724
Disclosure Date: February 03, 2021 (last updated February 22, 2025)
Authenticated stored cross-site scripting (XSS) in the contact name field in the distribution list of MDaemon webmail 19.5.5 allows an attacker to executes code and perform a XSS attack while opening a contact list.
0
Attacker Value
Unknown
CVE-2020-18723
Disclosure Date: February 03, 2021 (last updated February 22, 2025)
Stored cross-site scripting (XSS) in file attachment field in MDaemon webmail 19.5.5 allows an attacker to execute code on the email recipient side while forwarding an email to perform potentially malicious activities.
0
Attacker Value
Unknown
CVE-2020-35730
Disclosure Date: December 28, 2020 (last updated February 22, 2025)
An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.
0
Attacker Value
Unknown
CVE-2020-16145
Disclosure Date: August 12, 2020 (last updated February 21, 2025)
Roundcube Webmail before 1.3.15 and 1.4.8 allows stored XSS in HTML messages during message display via a crafted SVG document. This issue has been fixed in 1.4.8 and 1.3.15.
0
Attacker Value
Unknown
CVE-2020-11546
Disclosure Date: July 14, 2020 (last updated February 21, 2025)
SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection.
0
Attacker Value
Unknown
CVE-2020-15562
Disclosure Date: July 06, 2020 (last updated February 21, 2025)
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.
0