CVE-2010-1638

The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:horde:horde:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:05

Type Values Removed Values Added
Summary The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation.

13 Feb 2023, 04:19

Type Values Removed Values Added
Summary The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation.

Information

Published : 2010-06-22 17:30

Updated : 2023-12-10 11:03


NVD link : CVE-2010-1638

Mitre link : CVE-2010-1638

CVE.ORG link : CVE-2010-1638


JSON object : View

Products Affected

horde

  • horde
CWE
CWE-264

Permissions, Privileges, and Access Controls