Search CVE reports
41 – 50 of 48395 results
An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. The remote image blocking feature can be bypassed via SVG content (with animate attributes) in an e-mail message. This may lead to information disclosure or...
1 affected package
roundcube
| Package | 16.04 LTS |
|---|---|
| roundcube | Needs evaluation |
An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. The remote image blocking feature can be bypassed via a crafted background attribute of a BODY element in an e-mail message. This may lead to information...
1 affected package
roundcube
| Package | 16.04 LTS |
|---|---|
| roundcube | Needs evaluation |
An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Incorrect password comparison in the password plugin could lead to type confusion that allows a password change without knowing the old password.
1 affected package
roundcube
| Package | 16.04 LTS |
|---|---|
| roundcube | Needs evaluation |
An issue was discovered in Roundcube Webmail 1.6.0 before 1.6.14. Insufficient Cascading Style Sheets (CSS) sanitization in HTML e-mail messages may lead to SSRF or Information Disclosure, e.g., if stylesheet links point to local...
1 affected package
roundcube
| Package | 16.04 LTS |
|---|---|
| roundcube | Needs evaluation |
An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. XSS exists because of insufficient HTML attachment sanitization in preview mode. A victim must preview a text/html attachment.
1 affected package
roundcube
| Package | 16.04 LTS |
|---|---|
| roundcube | Needs evaluation |
An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsanitized IMAP SEARCH command arguments could lead to IMAP injection or CSRF bypass during mail search.
1 affected package
roundcube
| Package | 16.04 LTS |
|---|---|
| roundcube | Needs evaluation |
An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsafe deserialization in the redis/memcache session handler may lead to arbitrary file write operations by unauthenticated attackers via crafted session data.
1 affected package
roundcube
| Package | 16.04 LTS |
|---|---|
| roundcube | Needs evaluation |
In Tornado before 6.5.5, cookie attribute injection could occur because the domain, path, and samesite arguments to .RequestHandler.set_cookie were not checked for crafted characters.
1 affected package
python-tornado
| Package | 16.04 LTS |
|---|---|
| python-tornado | Needs evaluation |
In Sudo through 1.9.17p2 before 3e474c2, a failure of a setuid, setgid, or setgroups call, during a privilege drop before running the mailer, is not a fatal error and can lead to privilege escalation.
1 affected package
sudo
| Package | 16.04 LTS |
|---|---|
| sudo | Not affected |
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost...
1 affected package
cups
| Package | 16.04 LTS |
|---|---|
| cups | Needs evaluation |