Количество 3
Количество 3
CVE-2010-1638
The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation.
CVE-2010-1638
The IMP plugin in Horde allows remote attackers to bypass firewall res ...
GHSA-cpj5-862x-vq9v
The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2010-1638 The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. | CVSS2: 5 | 0% Низкий | больше 15 лет назад | |
CVE-2010-1638 The IMP plugin in Horde allows remote attackers to bypass firewall res ... | CVSS2: 5 | 0% Низкий | больше 15 лет назад | |
GHSA-cpj5-862x-vq9v The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу