include/iniset.php in Roundcube Webmail 0.5.4 and previous versions, when PHP 5.3.7 or 5.3.8 is used, allows remote malicious users to trigger a GET request for an arbitrary URL, and cause a denial of service (resource consumption and inbox outage), via a Subject header containing only a URL, a related issue to CVE-2011-3379.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
roundcube webmail 0.4.2 |
||
roundcube webmail 0.4 |
||
roundcube webmail 0.3 |
||
roundcube webmail 0.1 |
||
roundcube webmail 0.5.3 |
||
roundcube webmail |
||
roundcube webmail 0.5.1 |
||
roundcube webmail 0.5 |
||
roundcube webmail 0.2 |
||
roundcube webmail 0.4.1 |
||
roundcube webmail 0.2.1 |
||
roundcube webmail 0.1.1 |
||
roundcube webmail 0.5.2 |
||
roundcube webmail 0.3.1 |