rpm package
suse/roundcubemail&distro=SUSE Package Hub 15 SP1
pkg:rpm/suse/roundcubemail&distro=SUSE%20Package%20Hub%2015%20SP1
Vulnerabilities (9)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-18671 | — | < 1.3.16-bp151.4.6.1 | 1.3.16-bp151.4.6.1 | Jun 24, 2021 | Cross Site Scripting (XSS) vulnerability in Roundcube Mail <=1.4.4 via smtp config in /installer/test.php. | ||
| CVE-2020-18670 | — | < 1.3.16-bp151.4.6.1 | 1.3.16-bp151.4.6.1 | Jun 24, 2021 | Cross Site Scripting (XSS) vulneraibility in Roundcube mail .4.4 via database host and user in /installer/test.php. | ||
| CVE-2020-35730 | — | KEV | < 1.3.16-bp151.4.6.1 | 1.3.16-bp151.4.6.1 | Dec 28, 2020 | An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php. | |
| CVE-2020-16145 | — | < 1.3.15-bp152.4.3.1 | 1.3.15-bp152.4.3.1 | Aug 12, 2020 | Roundcube Webmail before 1.3.15 and 1.4.8 allows stored XSS in HTML messages during message display via a crafted SVG document. This issue has been fixed in 1.4.8 and 1.3.15. | ||
| CVE-2020-15562 | — | < 1.3.15-bp152.4.3.1 | 1.3.15-bp152.4.3.1 | Jul 6, 2020 | An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exist | ||
| CVE-2020-12640 | — | < 1.3.15-bp152.4.3.1 | 1.3.15-bp152.4.3.1 | May 4, 2020 | Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php. | ||
| CVE-2020-12641 | — | KEV | < 1.3.15-bp152.4.3.1 | 1.3.15-bp152.4.3.1 | May 4, 2020 | rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path. | |
| CVE-2020-12625 | — | < 1.3.15-bp152.4.3.1 | 1.3.15-bp152.4.3.1 | May 4, 2020 | An issue was discovered in Roundcube Webmail before 1.4.4. There is a cross-site scripting (XSS) vulnerability in rcube_washtml.php because JavaScript code can occur in the CDATA of an HTML message. | ||
| CVE-2019-10740 | — | < 1.3.15-bp152.4.3.1 | 1.3.15-bp152.4.3.1 | Apr 7, 2019 | In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can b |
- CVE-2020-18671Jun 24, 2021affected < 1.3.16-bp151.4.6.1fixed 1.3.16-bp151.4.6.1
Cross Site Scripting (XSS) vulnerability in Roundcube Mail <=1.4.4 via smtp config in /installer/test.php.
- CVE-2020-18670Jun 24, 2021affected < 1.3.16-bp151.4.6.1fixed 1.3.16-bp151.4.6.1
Cross Site Scripting (XSS) vulneraibility in Roundcube mail .4.4 via database host and user in /installer/test.php.
- affected < 1.3.16-bp151.4.6.1fixed 1.3.16-bp151.4.6.1
An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.
- CVE-2020-16145Aug 12, 2020affected < 1.3.15-bp152.4.3.1fixed 1.3.15-bp152.4.3.1
Roundcube Webmail before 1.3.15 and 1.4.8 allows stored XSS in HTML messages during message display via a crafted SVG document. This issue has been fixed in 1.4.8 and 1.3.15.
- CVE-2020-15562Jul 6, 2020affected < 1.3.15-bp152.4.3.1fixed 1.3.15-bp152.4.3.1
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exist
- CVE-2020-12640May 4, 2020affected < 1.3.15-bp152.4.3.1fixed 1.3.15-bp152.4.3.1
Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php.
- affected < 1.3.15-bp152.4.3.1fixed 1.3.15-bp152.4.3.1
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
- CVE-2020-12625May 4, 2020affected < 1.3.15-bp152.4.3.1fixed 1.3.15-bp152.4.3.1
An issue was discovered in Roundcube Webmail before 1.4.4. There is a cross-site scripting (XSS) vulnerability in rcube_washtml.php because JavaScript code can occur in the CDATA of an HTML message.
- CVE-2019-10740Apr 7, 2019affected < 1.3.15-bp152.4.3.1fixed 1.3.15-bp152.4.3.1
In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can b