Lucene search

K
HordeGroupware5.2.22

5 matches found

CVE
CVE
added 2020/02/17 3:15 p.m.182 views

CVE-2020-8518

Horde Groupware Webmail Edition 5.2.22 allows injection of arbitrary PHP code via CSV data, leading to remote code execution.

9.8CVSS9.8AI score0.84857EPSS
CVE
CVE
added 2019/05/29 5:29 p.m.123 views

CVE-2019-9858

Remote code execution was discovered in Horde Groupware Webmail 5.2.22 and 5.2.17. Horde/Form/Type.php contains a vulnerable class that handles image upload in forms. When the Horde_Form_Type_image method onSubmit() is called on uploads, it invokes the functions getImage() and _getUpload(), which u...

8.8CVSS8.8AI score0.80906EPSS
CVE
CVE
added 2020/05/18 5:15 p.m.88 views

CVE-2020-8034

Gollem before 3.0.13, as used in Horde Groupware Webmail Edition 5.2.22 and other products, is affected by a reflected Cross-Site Scripting (XSS) vulnerability via the HTTP GET dir parameter in the browser functionality, affecting breadcrumb output. An attacker can obtain access to a victim's webma...

6.1CVSS5.8AI score0.00499EPSS
CVE
CVE
added 2020/03/23 9:15 p.m.62 views

CVE-2020-8866

This vulnerability allows remote attackers to create arbitrary files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within add.php. The issue results from the lack of proper validation of user-s...

6.5CVSS6.5AI score0.03421EPSS
CVE
CVE
added 2020/03/23 9:15 p.m.57 views

CVE-2020-8865

This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within edit.php. When parsing the params[template] parameter, the process doe...

6.5CVSS6.3AI score0.03897EPSS