VYPR
Unrated severityNVD Advisory· Published Apr 4, 2011· Updated Apr 29, 2026

CVE-2010-4778

CVE-2010-4778

Description

Multiple cross-site scripting (XSS) vulnerabilities in fetchmailprefs.php in Horde IMP before 4.3.8, and Horde Groupware Webmail Edition before 1.2.7, allow remote attackers to inject arbitrary web script or HTML via the (1) username (aka fmusername), (2) password (aka fmpassword), or (3) server (aka fmserver) field in a fetchmail_prefs_save action, related to the Fetchmail configuration, a different issue than CVE-2010-3695. NOTE: some of these details are obtained from third party information.

Affected products

73
  • cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*+ 30 more
    • cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*range: <=1.2.6
    • cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.0.8:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.0:rc1:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.0:rc2:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.1.6:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.1:rc1:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.1:rc2:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.1:rc3:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.1:rc4:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:horde:imp:*:*:*:*:*:*:*:*+ 41 more
    • cpe:2.3:a:horde:imp:*:*:*:*:*:*:*:*range: <=4.3.7
    • cpe:2.3:a:horde:imp:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:2.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:2.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:2.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:2.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:2.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:2.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:2.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:2.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:3.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:3.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:3.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:3.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:3.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:3.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:3.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:3.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:3.2.7:rc1:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.1.3:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.1.5:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.1.6:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:horde:imp:4.3.6:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.