Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-2181

Опубликовано: 30 янв. 2017
Источник: debian
EPSS Низкий

Описание

Multiple buffer overflows in the DBMail driver in the Password plugin in Roundcube before 1.1.0 allow remote attackers to have unspecified impact via the (1) password or (2) username.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
roundcubefixed1.1.1+dfsg.1-2package
roundcubenot-affectedwheezypackage

Примечания

  • http://trac.roundcube.net/ticket/1490261

  • http://advisories.mageia.org/MGASA-2015-0400.html

  • http://lists.opensuse.org/opensuse-updates/2015-07/msg00032.html

EPSS

Процентиль: 73%
0.00764
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 9 лет назад

Multiple buffer overflows in the DBMail driver in the Password plugin in Roundcube before 1.1.0 allow remote attackers to have unspecified impact via the (1) password or (2) username.

CVSS3: 8.8
nvd
около 9 лет назад

Multiple buffer overflows in the DBMail driver in the Password plugin in Roundcube before 1.1.0 allow remote attackers to have unspecified impact via the (1) password or (2) username.

CVSS3: 8.8
github
больше 3 лет назад

Multiple buffer overflows in the DBMail driver in the Password plugin in Roundcube before 1.1.0 allow remote attackers to have unspecified impact via the (1) password or (2) username.

suse-cvrf
около 9 лет назад

Security update for roundcubemail

suse-cvrf
больше 9 лет назад

Security update for roundcubemail

EPSS

Процентиль: 73%
0.00764
Низкий