Lucene search

K

5 matches found

CVE
CVE
added 2018/11/12 5:29 p.m.85 views

CVE-2018-19206

steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of , as demonstrated by an onload attribute in a BODY element, within an HTML attachment.

6.1CVSS5.7AI score0.02862EPSS
CVE
CVE
added 2018/04/07 9:29 p.m.85 views

CVE-2018-9846

In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin enabled and configured, it's possible to exploit the unsanitized, user-controlled "_uid" parameter (in an archive.php _task=mail&_mbox=INBOX&_action=plugin.move2archive request) to perform an MX (IMAP) injection attack by placing an...

8.8CVSS8.7AI score0.00453EPSS
CVE
CVE
added 2018/05/16 7:29 p.m.83 views

CVE-2017-17688

The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolet...

5.9CVSS5.7AI score0.0165EPSS
CVE
CVE
added 2018/11/12 5:29 p.m.58 views

CVE-2018-19205

Roundcube before 1.3.7 mishandles GnuPG MDC integrity-protection warnings, which makes it easier for attackers to obtain sensitive information, a related issue to CVE-2017-17688. This is associated with plugins/enigma/lib/enigma_driver_gnupg.php.

7.5CVSS5.7AI score0.0165EPSS
CVE
CVE
added 2018/03/13 3:29 p.m.44 views

CVE-2018-1000071

roundcube version 1.3.4 and earlier contains an Insecure Permissions vulnerability in enigma plugin that can result in exfiltration of gpg private key. This attack appear to be exploitable via network connectivity.

7.5CVSS7.4AI score0.00307EPSS