ALT-PU-2016-1095-1
Closed vulnerabilities
BDU:2015-02661
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-12012
Уязвимость почтового клиента RoundCube Webmail операционной системы openSUSE, позволяющая нарушителю осуществить межсайтовое выполнение сценариев
Modified: 2024-11-21
CVE-2012-3507
Cross-site scripting (XSS) vulnerability in program/steps/mail/func.inc in RoundCube Webmail before 0.8.0, when using the Larry skin, allows remote attackers to inject arbitrary web script or HTML via the email message subject.
- 50212
- 50212
- http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/
- http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/
- http://trac.roundcube.net/ticket/1488519
- http://trac.roundcube.net/ticket/1488519
- [oss-security] 20120820 CVE-request: Roundcube XSS issues
- [oss-security] 20120820 CVE-request: Roundcube XSS issues
- [oss-security] 20120820 Re: CVE-request: Roundcube XSS issues
- [oss-security] 20120820 Re: CVE-request: Roundcube XSS issues
- [oss-security] 20120820 Re: CVE-request: Roundcube XSS issues
- [oss-security] 20120820 Re: CVE-request: Roundcube XSS issues
- http://www.securelist.com/en/advisories/50212
- http://www.securelist.com/en/advisories/50212
Modified: 2024-11-21
CVE-2012-4668
Cross-site scripting (XSS) vulnerability in Roundcube Webmail 0.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the signature in an email.
- http://sourceforge.net/news/?group_id=139281&id=309011
- http://sourceforge.net/news/?group_id=139281&id=309011
- http://trac.roundcube.net/ticket/1488613
- http://trac.roundcube.net/ticket/1488613
- [oss-security] 20120820 CVE-request: Roundcube XSS issues
- [oss-security] 20120820 CVE-request: Roundcube XSS issues
- [oss-security] 20120820 Re: CVE-request: Roundcube XSS issues
- [oss-security] 20120820 Re: CVE-request: Roundcube XSS issues
- https://github.com/roundcube/roundcubemail/commit/c086978f6a91eacb339fd2976202fca9dad2ef32
- https://github.com/roundcube/roundcubemail/commit/c086978f6a91eacb339fd2976202fca9dad2ef32
Modified: 2024-11-21
CVE-2012-6121
Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 0.8.5 allows remote attackers to inject arbitrary web script or HTML via a (1) data:text or (2) vbscript link.
- openSUSE-SU-2013:0307
- openSUSE-SU-2013:0307
- openSUSE-SU-2013:1420
- openSUSE-SU-2013:1420
- http://sourceforge.net/news/?group_id=139281&id=310213
- http://sourceforge.net/news/?group_id=139281&id=310213
- http://trac.roundcube.net/ticket/1488850
- http://trac.roundcube.net/ticket/1488850
- [oss-security] 20130207 Re: CVE request: XSS in roundcube before 0.8.5
- [oss-security] 20130207 Re: CVE request: XSS in roundcube before 0.8.5
- 57849
- 57849
- https://github.com/roundcube/roundcubemail/commit/74cd0a9b62f11bc07c5a1d3ba0098b54883eb0ba
- https://github.com/roundcube/roundcubemail/commit/74cd0a9b62f11bc07c5a1d3ba0098b54883eb0ba
Modified: 2024-11-21
CVE-2013-1904
Absolute path traversal vulnerability in steps/mail/sendmail.inc in Roundcube Webmail before 0.7.3 and 0.8.x before 0.8.6 allows remote attackers to read arbitrary files via a full pathname in the _value parameter for the generic_message_footer setting in a save-perf action to index.php, as exploited in the wild in March 2013.
- http://habrahabr.ru/post/174423/
- http://habrahabr.ru/post/174423/
- openSUSE-SU-2013:0671
- openSUSE-SU-2013:0671
- [dev] 20130327 [RCD] zero day vulnerability (tested on v8.0 to 9.0)
- [dev] 20130327 [RCD] zero day vulnerability (tested on v8.0 to 9.0)
- http://sourceforge.net/p/roundcubemail/news/2013/03/security-updates-086-and-073/
- http://sourceforge.net/p/roundcubemail/news/2013/03/security-updates-086-and-073/
- [oss-security] 20130328 Re: CVE Request -- roundcubemail: Local file inclusion via web UI modification of certain config options
- [oss-security] 20130328 Re: CVE Request -- roundcubemail: Local file inclusion via web UI modification of certain config options
Modified: 2024-11-21
CVE-2013-5645
Multiple cross-site scripting (XSS) vulnerabilities in Roundcube webmail before 0.9.3 allow user-assisted remote attackers to inject arbitrary web script or HTML via the body of a message visited in (1) new or (2) draft mode, related to compose.inc; and (3) might allow remote authenticated users to inject arbitrary web script or HTML via an HTML signature, related to save_identity.inc.
- openSUSE-SU-2013:1420
- openSUSE-SU-2013:1420
- http://trac.roundcube.net/changeset/93b0a30c1c8aa29d862b587b31e52bcc344b8d16/github
- http://trac.roundcube.net/changeset/93b0a30c1c8aa29d862b587b31e52bcc344b8d16/github
- http://trac.roundcube.net/changeset/ce5a6496fd6039962ba7424d153278e41ae8761b/github
- http://trac.roundcube.net/changeset/ce5a6496fd6039962ba7424d153278e41ae8761b/github
- http://trac.roundcube.net/ticket/1489251
- http://trac.roundcube.net/ticket/1489251
- http://trac.roundcube.net/wiki/Changelog#RELEASE0.9.3
- http://trac.roundcube.net/wiki/Changelog#RELEASE0.9.3
Modified: 2024-11-21
CVE-2013-6172
steps/utils/save_pref.inc in Roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct SQL injection attacks, and execute arbitrary code.
- openSUSE-SU-2014:0365
- openSUSE-SU-2014:0365
- http://roundcube.net/news/2013/10/21/security-updates-095-and-087/
- http://roundcube.net/news/2013/10/21/security-updates-095-and-087/
- http://trac.roundcube.net/ticket/1489382
- http://trac.roundcube.net/ticket/1489382
- DSA-2787
- DSA-2787
- http://www.interworx.com/developers/changelog/version-5-0-13-build-574-2014-02-19
- http://www.interworx.com/developers/changelog/version-5-0-13-build-574-2014-02-19
Modified: 2024-11-21
CVE-2014-9587
Multiple cross-site request forgery (CSRF) vulnerabilities in Roundcube Webmail before 1.0.4 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors, related to (1) address book operations or the (2) ACL or (3) Managesieve plugins.
- http://roundcube.net/news/2014/12/18/update-1.0.4-released/
- http://roundcube.net/news/2014/12/18/update-1.0.4-released/
- [oss-security] 20150111 Re: CVE request: roundcubemail: possible CSRF attacks to some address book operations as well as to the ACL and Managesieve plugins
- [oss-security] 20150111 Re: CVE request: roundcubemail: possible CSRF attacks to some address book operations as well as to the ACL and Managesieve plugins
- 71909
- 71909
- https://bugs.gentoo.org/show_bug.cgi?id=534766
- https://bugs.gentoo.org/show_bug.cgi?id=534766
- https://bugzilla.redhat.com/show_bug.cgi?id=1179780
- https://bugzilla.redhat.com/show_bug.cgi?id=1179780
Modified: 2024-11-21
CVE-2015-2180
The DBMail driver in the Password plugin in Roundcube before 1.1.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the password.
Modified: 2024-11-21
CVE-2015-2181
Multiple buffer overflows in the DBMail driver in the Password plugin in Roundcube before 1.1.0 allow remote attackers to have unspecified impact via the (1) password or (2) username.
Modified: 2024-11-21
CVE-2015-8105
Cross-site scripting (XSS) vulnerability in program/js/app.js in Roundcube webmail before 1.0.7 and 1.1.x before 1.1.3 allows remote authenticated users to inject arbitrary web script or HTML via the file name in a drag-n-drop file upload.
Modified: 2024-11-21
CVE-2015-8793
Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter in a mail task to the default URL, a different vulnerability than CVE-2011-2937.
- http://trac.roundcube.net/ticket/1490417
- http://trac.roundcube.net/ticket/1490417
- http://trac.roundcube.net/wiki/Changelog#RELEASE1.1.2
- http://trac.roundcube.net/wiki/Changelog#RELEASE1.1.2
- https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released/
- https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released/