Total vulnerabilities in the database
Horde IMP 4.3.6 and earlier does not request that the web browser avoid DNS prefetching of domain names contained in e-mail messages, which makes it easier for remote attackers to determine the network location of the webmail user by logging DNS requests.
Software | From | Fixed in |
---|---|---|
horde / imp | 2.2.7 | 2.2.7.x |
horde / imp | 2.2.5 | 2.2.5.x |
horde / imp | 4.0 | 4.0.x |
horde / imp | 4.1.3 | 4.1.3.x |
horde / imp | 4.1.6 | 4.1.6.x |
horde / imp | 3.1 | 3.1.x |
horde / imp | 3.2.4 | 3.2.4.x |
horde / imp | 3.1.2 | 3.1.2.x |
horde / imp | 4.3.3 | 4.3.3.x |
horde / imp | 4.2 | 4.2.x |
horde / imp | 2.2.1 | 2.2.1.x |
horde / imp | 3.2.2 | 3.2.2.x |
horde / imp | 4.3.1 | 4.3.1.x |
horde / imp | 2.2.2 | 2.2.2.x |
horde / imp | 4.0.2 | 4.0.2.x |
horde / imp | 2.2.4 | 2.2.4.x |
horde / imp | 2.0 | 2.0.x |
horde / imp | 4.2.1 | 4.2.1.x |
horde / imp | 4.3.2 | 4.3.2.x |
horde / imp | 2.2.6 | 2.2.6.x |
horde / imp | 4.3.5 | 4.3.5.x |
horde / imp | 4.2.2 | 4.2.2.x |
horde / imp | 3.2.3 | 3.2.3.x |
horde / imp | 3.2.5 | 3.2.5.x |
horde / imp | 4.0.3 | 4.0.3.x |
horde / imp | 3.2.6 | 3.2.6.x |
horde / imp | 2.2 | 2.2.x |
horde / imp | 2.3 | 2.3.x |
horde / imp | 3.2 | 3.2.x |
horde / imp | 4.0.1 | 4.0.1.x |
horde / imp | 2.2.8 | 2.2.8.x |
horde / imp | 2.2.3 | 2.2.3.x |
horde / imp | - | 4.3.6.x |
horde / imp | 4.3.4 | 4.3.4.x |
horde / imp | 3.2.7 | 3.2.7.x |
horde / imp | 4.0.4 | 4.0.4.x |
horde / imp | 4.1.5 | 4.1.5.x |
horde / imp | 3.0 | 3.0.x |
horde / imp | 3.2.1 | 3.2.1.x |
horde / imp | 4.3 | 4.3.x |
horde / imp | 3.2.7-rc1 | 3.2.7-rc1.x |