Show filters
202 Total Results
Displaying 21-30 of 202
Sort by:
Attacker Value
Unknown

CVE-2020-18670

Disclosure Date: June 24, 2021 (last updated February 22, 2025)
Cross Site Scripting (XSS) vulneraibility in Roundcube mail .4.4 via database host and user in /installer/test.php.
Attacker Value
Unknown

CVE-2021-26294

Disclosure Date: March 07, 2021 (last updated February 22, 2025)
An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_user account (with caldav_public_user as its password).
Attacker Value
Unknown

CVE-2021-26293

Disclosure Date: March 04, 2021 (last updated February 22, 2025)
An issue was discovered in AfterLogic Aurora through 8.5.3 and WebMail Pro through 8.5.3, when DAV is enabled. They allow directory traversal to create new files (such as an executable file under the web root). This is related to DAVServer.php in 8.x and DAV/Server.php in 7.x.
Attacker Value
Unknown

CVE-2021-26925

Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Roundcube before 1.4.11 allows XSS via crafted Cascading Style Sheets (CSS) token sequences during HTML email rendering.
Attacker Value
Unknown

CVE-2020-18724

Disclosure Date: February 03, 2021 (last updated February 22, 2025)
Authenticated stored cross-site scripting (XSS) in the contact name field in the distribution list of MDaemon webmail 19.5.5 allows an attacker to executes code and perform a XSS attack while opening a contact list.
Attacker Value
Unknown

CVE-2020-18723

Disclosure Date: February 03, 2021 (last updated February 22, 2025)
Stored cross-site scripting (XSS) in file attachment field in MDaemon webmail 19.5.5 allows an attacker to execute code on the email recipient side while forwarding an email to perform potentially malicious activities.
Attacker Value
Unknown

CVE-2020-35730

Disclosure Date: December 28, 2020 (last updated February 22, 2025)
An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.
Attacker Value
Unknown

CVE-2020-16145

Disclosure Date: August 12, 2020 (last updated February 21, 2025)
Roundcube Webmail before 1.3.15 and 1.4.8 allows stored XSS in HTML messages during message display via a crafted SVG document. This issue has been fixed in 1.4.8 and 1.3.15.
Attacker Value
Unknown

CVE-2020-11546

Disclosure Date: July 14, 2020 (last updated February 21, 2025)
SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection.
Attacker Value
Unknown

CVE-2020-15562

Disclosure Date: July 06, 2020 (last updated February 21, 2025)
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.