Page 4 of 20 results (0.021 seconds)

CVSS: 3.6EPSS: 0%CPEs: 7EXPL: 1

Horde Internet Messaging Program (IMP) before 2.2.6 allows local users to read IMP configuration files and steal the Horde database password by placing the prefs.lang file containing PHP code on the server. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000410 http://online.securityfocus.com/archive/1/198495 http://www.caldera.com/support/security/advisories/CSSA-2001-027.0.txt http://www.debian.org/security/2001/dsa-073 http://www.iss.net/security_center/static/6906.php http://www.securityfocus.com/bid/3083 •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 1

Cross-site scripting vulnerability in Horde Internet Messaging Program (IMP) before 2.2.6 and 1.2.6 allows remote attackers to execute arbitrary Javascript embedded in an email. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000410 http://online.securityfocus.com/archive/1/198495 http://www.caldera.com/support/security/advisories/CSSA-2001-027.0.txt http://www.debian.org/security/2001/dsa-073 http://www.iss.net/security_center/static/6905.php http://www.securityfocus.com/bid/3082 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

IMP 2.2 and earlier allows attackers to read and delete arbitrary files by modifying the attachment_name hidden form variable, which causes IMP to send the file to the attacker as an attachment. • http://www.securityfocus.com/archive/1/82088 http://www.securityfocus.com/bid/1679 https://exchange.xforce.ibmcloud.com/vulnerabilities/5227 •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

The MSWordView application in IMP creates world-readable files in the /tmp directory, which allows other local users to read potentially sensitive information. • http://marc.info/?l=bugtraq&m=95672120116627&w=2 http://www.securityfocus.com/bid/1360 •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

IMP does not remove files properly if the MSWordView application quits, which allows local users to cause a denial of service by filling up the disk space by requesting a large number of documents and prematurely stopping the request. • http://marc.info/?l=bugtraq&m=95672120116627&w=2 http://www.securityfocus.com/bid/1361 •