Open-xchange

Ox App Suite

54 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 19.08.2024 07:15:03
  • Zuletzt bearbeitet 19.08.2024 12:59:59

Module savepoints could be abused to inject references to malicious code delivered through the same domain. Attackers could perform malicious API requests or extract information from the users account. Exploiting this vulnerability requires temporary...

  • EPSS 0.15%
  • Veröffentlicht 06.05.2024 07:15:07
  • Zuletzt bearbeitet 10.04.2025 18:43:56

E-Mails exported as PDF were stored in a cache that did not consider specific session information for the related user account. Users of the same service node could access other users E-Mails in case they were exported as PDF for a brief moment until...

  • EPSS 0.11%
  • Veröffentlicht 06.05.2024 07:15:07
  • Zuletzt bearbeitet 21.11.2024 08:57:09

Maliciously crafted E-Mail attachment names could be used to temporarily execute script code in the context of the users browser session. Common user interaction is required for the vulnerability to trigger. Attackers could perform malicious API requ...

  • EPSS 0.47%
  • Veröffentlicht 06.05.2024 07:15:06
  • Zuletzt bearbeitet 05.03.2025 18:25:53

Content-ID based embedding of resources in E-Mails could be abused to trigger client-side script code when using the "show more" option. Attackers could perform malicious API requests or extract information from the users account. Exploiting the vuln...

  • EPSS 0.45%
  • Veröffentlicht 06.05.2024 07:15:06
  • Zuletzt bearbeitet 05.03.2025 18:25:53

E-Mail containing malicious display-name information could trigger client-side script execution when using specific mobile devices. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provid...

  • EPSS 0.11%
  • Veröffentlicht 08.04.2024 09:15:09
  • Zuletzt bearbeitet 21.11.2024 08:57:09

RSS feeds that contain malicious data- attributes could be abused to inject script code to a users browser session when reading compromised RSS feeds or successfully luring users to compromised accounts. Attackers could perform malicious API requests...

  • EPSS 0.1%
  • Veröffentlicht 08.04.2024 09:15:09
  • Zuletzt bearbeitet 21.11.2024 08:57:09

Upsell advertisement information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a users account or an successful social engineering at...

  • EPSS 0.1%
  • Veröffentlicht 08.04.2024 09:15:09
  • Zuletzt bearbeitet 21.11.2024 08:57:09

Upsell shop information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a users account or an successful social engineering attack to l...

  • EPSS 0.11%
  • Veröffentlicht 08.04.2024 09:15:09
  • Zuletzt bearbeitet 21.11.2024 08:57:09

Embedded content references at tasks could be used to temporarily execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to the users account, access to another account within the s...

  • EPSS 0.11%
  • Veröffentlicht 08.01.2024 09:15:20
  • Zuletzt bearbeitet 21.11.2024 07:56:27

The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and...