Vulnerabilities (CVE)

Filtered by vendor Open-xchange Subscribe
Total 246 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-37308 1 Open-xchange 1 Open-xchange Appsuite 2023-01-03 N/A 6.1 MEDIUM
OX App Suite through 7.10.6 allows XSS via HTML in text/plain e-mail messages.
CVE-2022-37309 1 Open-xchange 1 Open-xchange Appsuite 2023-01-03 N/A 6.1 MEDIUM
OX App Suite through 7.10.6 allows XSS via script code within a contact that has an e-mail address but lacks a name.
CVE-2022-37310 1 Open-xchange 1 Open-xchange Appsuite 2023-01-03 N/A 6.1 MEDIUM
OX App Suite through 7.10.6 allows XSS via a malicious capability to the metrics or help module, as demonstrated by a /#!!&app=io.ox/files&cap= URI.
CVE-2022-31469 1 Open-xchange 1 Open-xchange Appsuite 2023-01-03 N/A 6.1 MEDIUM
OX App Suite through 7.10.6 allows XSS via a deep link, as demonstrated by class="deep-link-app" for a /#!!&app=%2e./ URI.
CVE-2021-38374 1 Open-xchange 1 Ox App Suite 2022-10-28 3.5 LOW 5.4 MEDIUM
OX App Suite through through 7.10.5 allows XSS via a crafted snippet that has an app loader reference within an app loader URL.
CVE-2022-31468 1 Open-xchange 1 Ox App Suite 2022-10-28 N/A 6.1 MEDIUM
OX App Suite through 8.2 allows XSS via an attachment or OX Drive content when a client uses the len or off parameter.
CVE-2022-29851 1 Open-xchange 1 Ox App Suite 2022-10-26 N/A 9.8 CRITICAL
documentconverter in OX App Suite through 7.10.6, in a non-default configuration with ghostscript, allows OS Command Injection because file conversion may occur for an EPS document that is disguised as a PDF document.
CVE-2022-24405 1 Open-xchange 1 Ox App Suite 2022-08-03 N/A 9.8 CRITICAL
OX App Suite through 7.10.6 allows OS Command Injection via a serialized Java class to the Documentconverter API.
CVE-2022-23101 1 Open-xchange 1 Ox App Suite 2022-08-03 N/A 6.1 MEDIUM
OX App Suite through 7.10.6 allows XSS via appHandler in a deep link in an e-mail message.
CVE-2022-23100 1 Open-xchange 1 Ox App Suite 2022-08-03 N/A 9.8 CRITICAL
OX App Suite through 7.10.6 allows OS Command Injection via Documentconverter (e.g., through an email attachment).
CVE-2022-23099 1 Open-xchange 1 App Suite 2022-08-03 N/A 5.4 MEDIUM
OX App Suite through 7.10.6 allows XSS by forcing block-wise read.
CVE-2021-28093 1 Open-xchange 1 Open-xchange Documents 2022-07-12 6.4 MEDIUM 6.5 MEDIUM
OX Documents before 7.10.5-rev5 has Incorrect Access Control of converted images because hash collisions can occur, due to use of Adler32.
CVE-2021-38378 1 Open-xchange 1 Ox App Suite 2022-07-12 4.0 MEDIUM 4.3 MEDIUM
OX App Suite 7.10.5 allows Information Exposure because a caching mechanism can caused a Modified By response to show a person's name.
CVE-2021-38376 1 Open-xchange 1 Ox App Suite 2022-07-12 5.0 MEDIUM 5.3 MEDIUM
OX App Suite through 7.10.5 has Incorrect Access Control for retrieval of session information via the rampup action of the login API call.
CVE-2021-28094 1 Open-xchange 1 Open-xchange Documents 2022-07-12 6.4 MEDIUM 6.5 MEDIUM
OX Documents before 7.10.5-rev7 has Incorrect Access Control for converted documents because hash collisions can occur, due to use of CRC32.
CVE-2021-38377 1 Open-xchange 1 Ox App Suite 2022-07-12 4.3 MEDIUM 6.1 MEDIUM
OX App Suite through 7.10.5 allows XSS via JavaScript code in an anchor HTML comment within truncated e-mail, because there is a predictable UUID with HTML transformation results.
CVE-2021-28095 1 Open-xchange 1 Open-xchange Documents 2022-07-12 5.8 MEDIUM 4.8 MEDIUM
OX Documents before 7.10.5-rev5 has Incorrect Access Control for documents that contain XML structures because hash collisions can occur, due to use of CRC32.
CVE-2020-8542 1 Open-xchange 1 Open-xchange Appsuite 2022-04-08 3.5 LOW 5.4 MEDIUM
OX App Suite through 7.10.3 allows XSS.
CVE-2021-44213 1 Open-xchange 1 Ox App Suite 2022-03-31 4.3 MEDIUM 6.1 MEDIUM
OX App Suite through 7.10.5 allows XSS via uuencoding in a multipart/alternative message.
CVE-2021-44212 1 Open-xchange 1 Ox App Suite 2022-03-31 4.3 MEDIUM 6.1 MEDIUM
OX App Suite through 7.10.5 allows XSS via a trailing control character such as the SCRIPT\t substring.