Логотип exploitDog
bind:CVE-2025-41066
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-41066

Количество 4

Количество 4

ubuntu логотип

CVE-2025-41066

2 месяца назад

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2025-41066

2 месяца назад

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2025-41066

2 месяца назад

Horde Groupware v5.2.22 has a user enumeration vulnerability that allo ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-j5gg-5w34-g43r

2 месяца назад

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-41066

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

CVSS3: 5.3
0%
Низкий
2 месяца назад
nvd логотип
CVE-2025-41066

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

CVSS3: 5.3
0%
Низкий
2 месяца назад
debian логотип
CVE-2025-41066

Horde Groupware v5.2.22 has a user enumeration vulnerability that allo ...

CVSS3: 5.3
0%
Низкий
2 месяца назад
github логотип
GHSA-j5gg-5w34-g43r

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

CVSS3: 5.3
0%
Низкий
2 месяца назад

Уязвимостей на страницу