Open-xchange

Ox App Suite

60 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 27.11.2025 09:23:09
  • Zuletzt bearbeitet 01.12.2025 15:39:33

Malicious content uploaded as file can be used to execute script code when following attacker-controlled links. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Please deploy the...

  • EPSS 0.03%
  • Veröffentlicht 27.11.2025 09:23:09
  • Zuletzt bearbeitet 01.12.2025 15:39:33

Malicious e-mail content can be used to execute script code. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Sanitization has been updated to avoid such bypasses. No publicly av...

  • EPSS 0.03%
  • Veröffentlicht 27.11.2025 09:23:08
  • Zuletzt bearbeitet 01.12.2025 15:39:33

Malicious content at office documents can be used to inject script code when editing a document. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Please deploy the provided updat...

  • EPSS 0.03%
  • Veröffentlicht 27.11.2025 09:23:07
  • Zuletzt bearbeitet 01.12.2025 15:39:33

Malicious content uploaded as file can be used to execute script code when following attacker-controlled links. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Please deploy the...

  • EPSS 0.03%
  • Veröffentlicht 31.10.2025 08:54:42
  • Zuletzt bearbeitet 04.11.2025 15:41:31

Malicious content from E-Mail can be used to perform a redressing attack. Users can be tricked to perform unintended actions or provide sensitive information to a third party which would enable further threats. Attribute values containing HTML fragme...

  • EPSS 0.06%
  • Veröffentlicht 31.10.2025 08:54:41
  • Zuletzt bearbeitet 04.11.2025 15:41:31

Malicious or unintentional API requests can be used to add significant amount of data to caches. Caches may evict information that is required to operate the web frontend, which leads to unavailability of the component. Please deploy the provided upd...

  • EPSS 0.13%
  • Veröffentlicht 19.08.2024 07:15:03
  • Zuletzt bearbeitet 04.11.2025 17:15:46

Module savepoints could be abused to inject references to malicious code delivered through the same domain. Attackers could perform malicious API requests or extract information from the users account. Exploiting this vulnerability requires temporary...

  • EPSS 0.15%
  • Veröffentlicht 06.05.2024 07:15:07
  • Zuletzt bearbeitet 10.04.2025 18:43:56

E-Mails exported as PDF were stored in a cache that did not consider specific session information for the related user account. Users of the same service node could access other users E-Mails in case they were exported as PDF for a brief moment until...

  • EPSS 0.11%
  • Veröffentlicht 06.05.2024 07:15:07
  • Zuletzt bearbeitet 21.11.2024 08:57:09

Maliciously crafted E-Mail attachment names could be used to temporarily execute script code in the context of the users browser session. Common user interaction is required for the vulnerability to trigger. Attackers could perform malicious API requ...

  • EPSS 0.47%
  • Veröffentlicht 06.05.2024 07:15:06
  • Zuletzt bearbeitet 05.03.2025 18:25:53

Content-ID based embedding of resources in E-Mails could be abused to trigger client-side script code when using the "show more" option. Attackers could perform malicious API requests or extract information from the users account. Exploiting the vuln...