Filtered by vendor Open-xchange
Subscriptions
Total
254 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-4367 | 4 Debian, Mozilla, Open-xchange and 1 more | 10 Debian Linux, Firefox, Firefox Esr and 7 more | 2025-02-13 | 8.8 High |
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11. | ||||
CVE-2024-23187 | 1 Open-xchange | 1 Ox App Suite | 2025-02-13 | 6.5 Medium |
Content-ID based embedding of resources in E-Mails could be abused to trigger client-side script code when using the "show more" option. Attackers could perform malicious API requests or extract information from the users account. Exploiting the vulnerability requires user interaction. Please deploy the provided updates and patch releases. CID replacement has been hardened to omit invalid identifiers. No publicly available exploits are known. | ||||
CVE-2022-43698 | 1 Open-xchange | 1 Ox App Suite | 2025-02-06 | 4.3 Medium |
OX App Suite before 7.10.6-rev30 allows SSRF because changing a POP3 account disregards the deny-list. | ||||
CVE-2022-43697 | 1 Open-xchange | 1 Ox App Suite | 2025-02-06 | 6.1 Medium |
OX App Suite before 7.10.6-rev30 allows XSS via an activity tracking adapter defined by jslob. | ||||
CVE-2022-43699 | 1 Open-xchange | 1 Ox App Suite | 2025-02-06 | 4.3 Medium |
OX App Suite before 7.10.6-rev30 allows SSRF because e-mail account discovery disregards the deny-list and thus can be attacked by an adversary who controls the DNS records of an external domain (found in the host part of an e-mail address). | ||||
CVE-2022-37306 | 1 Open-xchange | 1 Ox App Suite | 2025-02-06 | 6.1 Medium |
OX App Suite before 7.10.6-rev30 allows XSS via an upsell trigger. | ||||
CVE-2022-43696 | 1 Open-xchange | 1 Ox App Suite | 2025-02-06 | 6.1 Medium |
OX App Suite before 7.10.6-rev20 allows XSS via upsell ads. | ||||
CVE-2023-24605 | 1 Open-xchange | 1 Ox App Suite | 2025-01-14 | 4.2 Medium |
OX App Suite before backend 7.10.6-rev37 does not enforce 2FA for all endpoints, e.g., reading from a drive, reading contact data, and renaming tokens. | ||||
CVE-2023-24604 | 1 Open-xchange | 1 Ox App Suite | 2025-01-14 | 4.3 Medium |
OX App Suite before backend 7.10.6-rev37 does not check HTTP header lengths when downloading, e.g., potentially allowing a crafted iCal feed to provide an unlimited amount of header data. | ||||
CVE-2023-24603 | 1 Open-xchange | 1 Ox App Suite | 2025-01-14 | 6.5 Medium |
OX App Suite before backend 7.10.6-rev37 does not check size limits when downloading, e.g., potentially allowing a crafted iCal feed to provide an unlimited amount of data. | ||||
CVE-2023-24599 | 1 Open-xchange | 1 Ox App Suite | 2025-01-14 | 4.3 Medium |
OX App Suite before backend 7.10.6-rev37 allows authenticated users to change the appointments of arbitrary users via conflicting ID numbers, aka "ID confusion." | ||||
CVE-2023-24598 | 1 Open-xchange | 1 Ox App Suite | 2025-01-14 | 4.3 Medium |
OX App Suite before backend 7.10.6-rev37 has an information leak in the handling of distribution lists, e.g., partial disclosure of the private contacts of another user. | ||||
CVE-2023-24597 | 1 Open-xchange | 1 Ox App Suite | 2025-01-14 | 5.3 Medium |
OX App Suite before frontend 7.10.6-rev24 allows the loading (without user consent) of an e-mail message's remote resources during printing. | ||||
CVE-2023-24600 | 1 Open-xchange | 1 Ox App Suite | 2025-01-14 | 4.3 Medium |
OX App Suite before backend 7.10.6-rev37 allows authenticated users to bypass access controls (for reading contacts) via a move to their own address book. | ||||
CVE-2023-24601 | 1 Open-xchange | 1 Ox App Suite | 2025-01-14 | 6.1 Medium |
OX App Suite before frontend 7.10.6-rev24 allows XSS via a non-app deeplink such as the jslob API's registry sub-tree. | ||||
CVE-2023-24602 | 1 Open-xchange | 1 Ox App Suite | 2025-01-14 | 6.1 Medium |
OX App Suite before frontend 7.10.6-rev24 allows XSS via data to the Tumblr portal widget, such as a post title. | ||||
CVE-2023-26432 | 1 Open-xchange | 1 Open-xchange Appsuite Backend | 2024-12-03 | 4.3 Medium |
When adding an external mail account, processing of SMTP "capabilities" responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service could trigger requests that lead to excessive resource usage and eventually service unavailability. We now limit accepted SMTP server response to reasonable length/size. No publicly available exploits are known. | ||||
CVE-2023-26442 | 1 Open-xchange | 1 Open-xchange Appsuite Office | 2024-12-03 | 3.2 Low |
In case Cacheservice was configured to use a sproxyd object-storage backend, it would follow HTTP redirects issued by that backend. An attacker with access to a local or restricted network with the capability to intercept and replay HTTP requests to sproxyd (or who is in control of the sproxyd service) could perform a server-side request-forgery attack and make Cacheservice connect to unexpected resources. We have disabled the ability to follow HTTP redirects when connecting to sproxyd resources. No publicly available exploits are known. | ||||
CVE-2023-26456 | 1 Open-xchange | 1 Ox Guard | 2024-12-03 | 5.4 Medium |
Users were able to set an arbitrary "product name" for OX Guard. The chosen value was not sufficiently sanitized before processing it at the user interface, allowing for indirect cross-site scripting attacks. Accounts that were temporarily taken over could be configured to trigger persistent code execution, allowing an attacker to build a foothold. Sanitization is in place for product names now. No publicly available exploits are known. | ||||
CVE-2023-29043 | 1 Open-xchange | 1 Open-xchange Appsuite | 2024-12-03 | 6.1 Medium |
Presentations may contain references to images, which are user-controlled, and could include malicious script code that is being processed when editing a document. Script code embedded in malicious documents could be executed in the context of the user editing the document when performing certain actions, like copying content. The relevant attribute does now get encoded to avoid the possibility of executing script code. No publicly available exploits are known. |