Open-xchange

Ox App Suite

54 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Published 19.08.2024 07:15:03
  • Last modified 19.08.2024 12:59:59

Module savepoints could be abused to inject references to malicious code delivered through the same domain. Attackers could perform malicious API requests or extract information from the users account. Exploiting this vulnerability requires temporary...

  • EPSS 0.15%
  • Published 06.05.2024 07:15:07
  • Last modified 10.04.2025 18:43:56

E-Mails exported as PDF were stored in a cache that did not consider specific session information for the related user account. Users of the same service node could access other users E-Mails in case they were exported as PDF for a brief moment until...

  • EPSS 0.11%
  • Published 06.05.2024 07:15:07
  • Last modified 21.11.2024 08:57:09

Maliciously crafted E-Mail attachment names could be used to temporarily execute script code in the context of the users browser session. Common user interaction is required for the vulnerability to trigger. Attackers could perform malicious API requ...

  • EPSS 0.47%
  • Published 06.05.2024 07:15:06
  • Last modified 05.03.2025 18:25:53

Content-ID based embedding of resources in E-Mails could be abused to trigger client-side script code when using the "show more" option. Attackers could perform malicious API requests or extract information from the users account. Exploiting the vuln...

  • EPSS 0.45%
  • Published 06.05.2024 07:15:06
  • Last modified 05.03.2025 18:25:53

E-Mail containing malicious display-name information could trigger client-side script execution when using specific mobile devices. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provid...

  • EPSS 0.11%
  • Published 08.04.2024 09:15:09
  • Last modified 21.11.2024 08:57:09

RSS feeds that contain malicious data- attributes could be abused to inject script code to a users browser session when reading compromised RSS feeds or successfully luring users to compromised accounts. Attackers could perform malicious API requests...

  • EPSS 0.1%
  • Published 08.04.2024 09:15:09
  • Last modified 21.11.2024 08:57:09

Upsell advertisement information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a users account or an successful social engineering at...

  • EPSS 0.1%
  • Published 08.04.2024 09:15:09
  • Last modified 21.11.2024 08:57:09

Upsell shop information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a users account or an successful social engineering attack to l...

  • EPSS 0.11%
  • Published 08.04.2024 09:15:09
  • Last modified 21.11.2024 08:57:09

Embedded content references at tasks could be used to temporarily execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to the users account, access to another account within the s...

  • EPSS 0.11%
  • Published 08.01.2024 09:15:20
  • Last modified 21.11.2024 07:56:27

The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and...