Multiple SQL injection vulnerabilities in IMP 2.2.8 and previous versions allow remote malicious users to perform unauthorized database activities and possibly gain privileges via certain database functions such as check_prefs() in db.pgsql, as demonstrated using mailbox.php3.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
horde imp 2.2 |
||
horde imp 2.2.7 |
||
horde imp 2.2.8 |
||
horde imp 2.2.1 |
||
horde imp 2.2.2 |
||
horde imp 2.2.3 |
||
horde imp 2.2.4 |
||
horde imp 2.2.5 |
||
horde imp 2.2.6 |