Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2012-5565 First vendor Publication 2014-04-05
Vendor Cve Last vendor Modification 2014-04-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cross-site scripting (XSS) vulnerability in js/compose-dimp.js in Horde Internet Mail Program (IMP) before 5.0.24, as used in Horde Groupware Webmail Edition before 4.0.9, allows remote attackers to inject arbitrary web script or HTML via a crafted name for an attached file, related to the dynamic view.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5565

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 46
Application 73

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-843.nasl - Type : ACT_GATHER_INFO
2013-01-21 Name : The remote web server hosts a PHP application that is affected by a cross-sit...
File : imp_upload_xss.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM https://github.com/horde/horde/commit/1550c6ecd7204f9579fcbb09ec7089e01b0771e2
MLIST http://lists.horde.org/archives/announce/2012/000833.html
http://lists.horde.org/archives/announce/2012/000840.html
http://www.openwall.com/lists/oss-security/2012/11/23/6
SUSE http://lists.opensuse.org/opensuse-updates/2012-12/msg00020.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2021-05-05 01:11:37
  • Multiple Updates
2021-05-04 12:22:35
  • Multiple Updates
2021-04-22 01:26:59
  • Multiple Updates
2020-05-23 01:50:18
  • Multiple Updates
2020-05-23 00:35:17
  • Multiple Updates
2019-07-09 01:05:04
  • Multiple Updates
2019-06-19 12:04:48
  • Multiple Updates
2016-04-26 22:29:46
  • Multiple Updates
2014-06-14 13:33:57
  • Multiple Updates
2014-04-07 21:21:44
  • Multiple Updates
2014-04-06 13:21:59
  • First insertion