{"api_version":"1","generated_at":"2026-05-15T00:08:33+00:00","cve":"CVE-2012-5565","urls":{"html":"https://cve.report/CVE-2012-5565","api":"https://cve.report/api/cve/CVE-2012-5565.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2012-5565","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2012-5565"},"summary":{"title":"CVE-2012-5565","description":"Cross-site scripting (XSS) vulnerability in js/compose-dimp.js in Horde Internet Mail Program (IMP) before 5.0.24, as used in Horde Groupware Webmail Edition before 4.0.9, allows remote attackers to inject arbitrary web script or HTML via a crafted name for an attached file, related to the dynamic view.","state":"PUBLISHED","assigner":"redhat","published_at":"2014-04-05 21:55:06","updated_at":"2026-05-06 22:30:45"},"problem_types":["CWE-79","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"4.3","severity":"","vector":"AV:N/AC:M/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00020.html","name":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00020.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"openSUSE-SU-2012:1626-1: moderate: update for horde4-imp","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.horde.org/archives/announce/2012/000840.html","name":"http://lists.horde.org/archives/announce/2012/000840.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"[announce] Horde Groupware Webmail Edition 4.0.9 (final)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/horde/horde/commit/1550c6ecd7204f9579fcbb09ec7089e01b0771e2","name":"https://github.com/horde/horde/commit/1550c6ecd7204f9579fcbb09ec7089e01b0771e2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[mms] SECURITY: Fix obscure XSS issue if uploading a file in dynamic … · horde/horde@1550c6e · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2012/11/23/6","name":"http://www.openwall.com/lists/oss-security/2012/11/23/6","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"oss-security - Re: CVE Request -- (Horde) IMP (prior v5.0.24-git):\n Obscure XSS issue when uploading attachments.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.horde.org/archives/announce/2012/000833.html","name":"http://lists.horde.org/archives/announce/2012/000833.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[announce] IMP H4 (5.0.24) (final)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2012-5565","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5565","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"groupware","cpe6":"4.0","cpe7":"*","cpe8":"webamail","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"groupware","cpe6":"4.0","cpe7":"rc1","cpe8":"webamail","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"groupware","cpe6":"4.0","cpe7":"rc2","cpe8":"webamail","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"groupware","cpe6":"4.0.1","cpe7":"*","cpe8":"webamail","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"groupware","cpe6":"4.0.2","cpe7":"*","cpe8":"webamail","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"groupware","cpe6":"4.0.3","cpe7":"*","cpe8":"webamail","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"groupware","cpe6":"4.0.4","cpe7":"*","cpe8":"webamail","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"groupware","cpe6":"4.0.5","cpe7":"*","cpe8":"webamail","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"groupware","cpe6":"4.0.6","cpe7":"*","cpe8":"webamail","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"groupware","cpe6":"4.0.7","cpe7":"*","cpe8":"webamail","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"4.0.8","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"groupware","cpe6":"*","cpe7":"*","cpe8":"webamail","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.14","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.16","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.17","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.18","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.19","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.21","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.22","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"5.0.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"5565","vulnerable":"1","versionEndIncluding":"5.0.23","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"horde","cpe5":"imp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-06T21:14:15.432Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"openSUSE-SU-2012:1626","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00020.html"},{"name":"[announce] 20121114 IMP H4 (5.0.24) (final)","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://lists.horde.org/archives/announce/2012/000833.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/horde/horde/commit/1550c6ecd7204f9579fcbb09ec7089e01b0771e2"},{"name":"[oss-security] 20121123 Re: CVE Request -- (Horde) IMP (prior v5.0.24-git):  Obscure XSS issue when uploading attachments.","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2012/11/23/6"},{"name":"[announce] 20121114 Horde Groupware Webmail Edition 4.0.9 (final)","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://lists.horde.org/archives/announce/2012/000840.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2012-11-14T00:00:00.000Z","descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in js/compose-dimp.js in Horde Internet Mail Program (IMP) before 5.0.24, as used in Horde Groupware Webmail Edition before 4.0.9, allows remote attackers to inject arbitrary web script or HTML via a crafted name for an attached file, related to the dynamic view."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2014-04-05T19:57:00.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"openSUSE-SU-2012:1626","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00020.html"},{"name":"[announce] 20121114 IMP H4 (5.0.24) (final)","tags":["mailing-list","x_refsource_MLIST"],"url":"http://lists.horde.org/archives/announce/2012/000833.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/horde/horde/commit/1550c6ecd7204f9579fcbb09ec7089e01b0771e2"},{"name":"[oss-security] 20121123 Re: CVE Request -- (Horde) IMP (prior v5.0.24-git):  Obscure XSS issue when uploading attachments.","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2012/11/23/6"},{"name":"[announce] 20121114 Horde Groupware Webmail Edition 4.0.9 (final)","tags":["mailing-list","x_refsource_MLIST"],"url":"http://lists.horde.org/archives/announce/2012/000840.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2012-5565","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cross-site scripting (XSS) vulnerability in js/compose-dimp.js in Horde Internet Mail Program (IMP) before 5.0.24, as used in Horde Groupware Webmail Edition before 4.0.9, allows remote attackers to inject arbitrary web script or HTML via a crafted name for an attached file, related to the dynamic view."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"openSUSE-SU-2012:1626","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00020.html"},{"name":"[announce] 20121114 IMP H4 (5.0.24) (final)","refsource":"MLIST","url":"http://lists.horde.org/archives/announce/2012/000833.html"},{"name":"https://github.com/horde/horde/commit/1550c6ecd7204f9579fcbb09ec7089e01b0771e2","refsource":"CONFIRM","url":"https://github.com/horde/horde/commit/1550c6ecd7204f9579fcbb09ec7089e01b0771e2"},{"name":"[oss-security] 20121123 Re: CVE Request -- (Horde) IMP (prior v5.0.24-git):  Obscure XSS issue when uploading attachments.","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2012/11/23/6"},{"name":"[announce] 20121114 Horde Groupware Webmail Edition 4.0.9 (final)","refsource":"MLIST","url":"http://lists.horde.org/archives/announce/2012/000840.html"}]}}}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2012-5565","datePublished":"2014-04-05T21:00:00.000Z","dateReserved":"2012-10-24T00:00:00.000Z","dateUpdated":"2024-08-06T21:14:15.432Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2014-04-05 21:55:06","lastModifiedDate":"2026-05-06 22:30:45","problem_types":["CWE-79","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:*:*:*:*:*:*:*:*","versionEndIncluding":"5.0.23","matchCriteriaId":"E28CB330-C845-4E68-989E-807B16726CC7"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.4:*:*:*:*:*:*:*","matchCriteriaId":"353AD017-60F5-4168-B672-17EF90CDCB64"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.5:*:*:*:*:*:*:*","matchCriteriaId":"9BBB960F-026D-4C40-BC61-0D963C9E25E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.6:*:*:*:*:*:*:*","matchCriteriaId":"B0D3990B-339B-498A-A5B5-780DA8A0ABD6"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.7:*:*:*:*:*:*:*","matchCriteriaId":"CAF27F1F-F405-47F8-9486-E86555D61B7D"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.8:*:*:*:*:*:*:*","matchCriteriaId":"8B2E22CB-E82E-4203-B9E9-4BDA58C9A5EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.9:*:*:*:*:*:*:*","matchCriteriaId":"1FE4D6BE-11F3-468E-8CB2-44AA1B3BA7FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.10:*:*:*:*:*:*:*","matchCriteriaId":"74EE40AB-753A-4109-AE27-7BDD78B047A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.11:*:*:*:*:*:*:*","matchCriteriaId":"5A03CD8B-C101-4737-B435-B43D543E6335"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.12:*:*:*:*:*:*:*","matchCriteriaId":"4D3C95A9-E61E-45BF-9FBD-EBE16F4B3189"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.13:*:*:*:*:*:*:*","matchCriteriaId":"94B7724A-D3D2-4511-9E44-E0C71E049854"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.14:*:*:*:*:*:*:*","matchCriteriaId":"40F93E89-8B6D-4A1F-BBD9-B154B5489236"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.15:*:*:*:*:*:*:*","matchCriteriaId":"BF189F04-60A6-4D80-BCCD-B405F35AAE1F"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.16:*:*:*:*:*:*:*","matchCriteriaId":"FA984AF6-BE4F-4F23-9D42-3B05B05F6FA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.17:*:*:*:*:*:*:*","matchCriteriaId":"7B27528A-1090-4834-808C-39202BFB2A18"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.18:*:*:*:*:*:*:*","matchCriteriaId":"09A43FBB-5345-4D86-B5A2-885DEDDEF70A"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.19:*:*:*:*:*:*:*","matchCriteriaId":"981F83E1-6D69-401D-9F11-9A8A2036BF6A"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.20:*:*:*:*:*:*:*","matchCriteriaId":"823C5DDE-2853-472C-9367-2E7E1E97D61C"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.21:*:*:*:*:*:*:*","matchCriteriaId":"1E513887-24D1-4F94-9948-F355F9778CF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:imp:5.0.22:*:*:*:*:*:*:*","matchCriteriaId":"58D4656C-5230-4155-9435-FFFB6E9F515F"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:horde:groupware:*:*:webamail:*:*:*:*:*","versionEndIncluding":"4.0.8","matchCriteriaId":"E888C8C2-27C5-4BD0-9EEE-750DF5DE6488"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:groupware:4.0:*:webamail:*:*:*:*:*","matchCriteriaId":"F505E80A-B91C-401C-9B77-F34B00ECA434"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:groupware:4.0:rc1:webamail:*:*:*:*:*","matchCriteriaId":"A9129D4A-F365-4630-976A-DBFBBEA531FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:groupware:4.0:rc2:webamail:*:*:*:*:*","matchCriteriaId":"C910D464-66B3-4593-A7D8-3FD3EADB9AFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:groupware:4.0.1:*:webamail:*:*:*:*:*","matchCriteriaId":"A6A67FDD-C9CE-43E4-ADD9-DB5699BEF61C"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:groupware:4.0.2:*:webamail:*:*:*:*:*","matchCriteriaId":"A1158FCA-2AAB-4EC4-9B34-F1B44DDA4FA9"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:groupware:4.0.3:*:webamail:*:*:*:*:*","matchCriteriaId":"2A0A5DB9-3731-466D-8D0F-7BE71A34184B"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:groupware:4.0.4:*:webamail:*:*:*:*:*","matchCriteriaId":"5D07339E-54B9-4513-82EB-0FB53AD5B82B"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:groupware:4.0.5:*:webamail:*:*:*:*:*","matchCriteriaId":"717CB664-818F-4583-83FF-47B167993569"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:groupware:4.0.6:*:webamail:*:*:*:*:*","matchCriteriaId":"185839EF-1F07-4C2C-B710-FD607EAD0A71"},{"vulnerable":true,"criteria":"cpe:2.3:a:horde:groupware:4.0.7:*:webamail:*:*:*:*:*","matchCriteriaId":"29D96163-C022-4DBD-8B94-746665B99A73"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2012","CveId":"5565","Ordinal":"1","Title":"CVE-2012-5565","CVE":"CVE-2012-5565","Year":"2012"},"notes":[{"CveYear":"2012","CveId":"5565","Ordinal":"1","NoteData":"Cross-site scripting (XSS) vulnerability in js/compose-dimp.js in Horde Internet Mail Program (IMP) before 5.0.24, as used in Horde Groupware Webmail Edition before 4.0.9, allows remote attackers to inject arbitrary web script or HTML via a crafted name for an attached file, related to the dynamic view.","Type":"Description","Title":"CVE-2012-5565"},{"CveYear":"2012","CveId":"5565","Ordinal":"2","NoteData":"2014-04-05","Type":"Other","Title":"Published"},{"CveYear":"2012","CveId":"5565","Ordinal":"3","NoteData":"2014-04-05","Type":"Other","Title":"Modified"}]}}}