Show filters
113 Total Results
Displaying 21-30 of 113
Sort by:
Attacker Value
Unknown
CVE-2017-15235
Disclosure Date: October 11, 2017 (last updated November 26, 2024)
The File Manager (gollem) module 3.0.11 in Horde Groupware 5.2.21 allows remote attackers to bypass Horde authentication for file downloads via a crafted fn parameter that corresponds to the exact filename.
0
Attacker Value
Unknown
CVE-2017-14650
Disclosure Date: September 21, 2017 (last updated November 26, 2024)
A Remote Code Execution vulnerability has been found in the Horde_Image library when using the "Im" backend that utilizes ImageMagick's "convert" utility. It's not exploitable through any Horde application, because the code path to the vulnerability is not used by any Horde code. Custom applications using the Horde_Image library might be affected. This vulnerability affects all versions of Horde_Image from 2.0.0 to 2.5.1, and is fixed in 2.5.2. The problem is missing input validation of the index field in _raw() during construction of an ImageMagick command line.
0
Attacker Value
Unknown
CVE-2017-9773
Disclosure Date: June 21, 2017 (last updated November 26, 2024)
Denial of Service was found in Horde_Image 2.x before 2.5.0 via a crafted URL to the "Null" image driver.
0
Attacker Value
Unknown
CVE-2017-9774
Disclosure Date: June 21, 2017 (last updated November 26, 2024)
Remote Code Execution was found in Horde_Image 2.x before 2.5.0 via a crafted GET request. Exploitation requires authentication.
0
Attacker Value
Unknown
CVE-2017-7414
Disclosure Date: April 04, 2017 (last updated November 26, 2024)
In Horde_Crypt before 2.7.6, as used in Horde Groupware Webmail Edition 5.x through 5.2.17, OS Command Injection can occur if the user has PGP features enabled in the user's preferences, and has enabled the "Should PGP signed messages be automatically verified when viewed?" preference. To exploit this vulnerability, an attacker can send a PGP signed email (that is maliciously crafted) to the Horde user, who then must either view or preview it.
0
Attacker Value
Unknown
CVE-2017-7413
Disclosure Date: April 04, 2017 (last updated November 26, 2024)
In Horde_Crypt before 2.7.6, as used in Horde Groupware Webmail Edition through 5.2.17, OS Command Injection can occur if the attacker is an authenticated Horde Webmail user, has PGP features enabled in their preferences, and attempts to encrypt an email addressed to a maliciously crafted email address.
0
Attacker Value
Unknown
CVE-2016-5303
Disclosure Date: December 20, 2016 (last updated November 25, 2024)
Cross-site scripting (XSS) vulnerability in the Horde Text Filter API in Horde Groupware and Horde Groupware Webmail Edition before 5.2.16 allows remote attackers to inject arbitrary web script or HTML via crafted data:text/html content in a form (1) action or (2) xlink attribute.
0
Attacker Value
Unknown
CVE-2016-2228
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
Cross-site scripting (XSS) vulnerability in horde/templates/topbar/_menubar.html.php in Horde Groupware before 5.2.12 and Horde Groupware Webmail Edition before 5.2.12 allows remote attackers to inject arbitrary web script or HTML via the searchfield parameter, as demonstrated by a request to xplorer/gollem/manager.php.
0
Attacker Value
Unknown
CVE-2015-8807
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
Cross-site scripting (XSS) vulnerability in the _renderVarInput_number function in horde/framework/Core/lib/Horde/Core/Ui/VarRenderer/Html.php in Horde Groupware before 5.2.12 and Horde Groupware Webmail Edition before 5.2.12 allows remote attackers to inject arbitrary web script or HTML via vectors involving numeric form fields.
0
Attacker Value
Unknown
CVE-2015-7984
Disclosure Date: November 19, 2015 (last updated October 05, 2023)
Multiple cross-site request forgery (CSRF) vulnerabilities in Horde before 5.2.8, Horde Groupware before 5.2.11, and Horde Groupware Webmail Edition before 5.2.11 allow remote attackers to hijack the authentication of administrators for requests that execute arbitrary (1) commands via the cmd parameter to admin/cmdshell.php, (2) SQL queries via the sql parameter to admin/sqlshell.php, or (3) PHP code via the php parameter to admin/phpshell.php.
0