4.3
CVSSv2

CVE-2013-5645

Published: 29/08/2013 Updated: 12/09/2013
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in Roundcube webmail prior to 0.9.3 allow user-assisted remote malicious users to inject arbitrary web script or HTML via the body of a message visited in (1) new or (2) draft mode, related to compose.inc; and (3) might allow remote authenticated users to inject arbitrary web script or HTML via an HTML signature, related to save_identity.inc.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

roundcube webmail 0.9

roundcube webmail 0.7.2

roundcube webmail 0.7.1

roundcube webmail 0.5

roundcube webmail 0.3

roundcube webmail 0.2

roundcube webmail 0.1.1

roundcube webmail 0.1

roundcube webmail 0.8.3

roundcube webmail 0.8.4

roundcube webmail 0.8.5

roundcube webmail

roundcube webmail 0.8.1

roundcube webmail 0.5.4

roundcube webmail 0.5.3

roundcube webmail 0.4

roundcube webmail 0.2.1

roundcube webmail 0.8.2

roundcube webmail 0.9.0

roundcube webmail 0.9.1

roundcube webmail 0.7

roundcube webmail 0.6

roundcube webmail 0.4.2

roundcube webmail 0.4.1

roundcube webmail 0.2.2

roundcube webmail 0.8.6

roundcube webmail 0.8.0

roundcube webmail 0.7.3

roundcube webmail 0.5.2

roundcube webmail 0.5.1

roundcube webmail 0.3.1

Vendor Advisories

Debian Bug report logs - #721592 roundcube: CVE-2013-5645 Package: roundcube; Maintainer for roundcube is Debian Roundcube Maintainers <pkg-roundcube-maintainers@listsaliothdebianorg>; Source for roundcube is src:roundcube (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 2 Se ...