Known Vulnerabilities for Open-xchange Appsuite Backend by Open-xchange

Listed below are 10 of the newest known vulnerabilities associated with "Open-xchange Appsuite Backend" by "Open-xchange".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2023-26451 Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Servi... 7.5 - HIGH 2023-08-02 2024-01-12
CVE-2023-26443 Full-text autocomplete search allows user-provided SQL syntax to be injected to SQL statements. With existing sanitization in... 9.8 - CRITICAL 2023-08-02 2024-01-12
CVE-2023-26438 External service lookups for a number of protocols were vulnerable to a time-of-check/time-of-use (TOCTOU) weakness, involvin... 3.1 - LOW 2023-08-02 2024-01-12
CVE-2023-26436 Attackers with access to the "documentconverterws" API were able to inject serialized Java objects, that were not properly ch... 8.8 - HIGH 2023-06-20 2024-01-12
CVE-2023-26435 It was possible to call filesystem and network references using the local LibreOffice instance using manipulated ODT document... 5 - MEDIUM 2023-06-20 2024-01-12
CVE-2023-26434 When adding an external mail account, processing of POP3 "capabilities" responses are not limited to plausible sizes. Attacke... 4.3 - MEDIUM 2023-06-20 2024-01-12
CVE-2023-26433 When adding an external mail account, processing of IMAP "capabilities" responses are not limited to plausible sizes. Attacke... 4.3 - MEDIUM 2023-06-20 2024-01-12
CVE-2023-26432 When adding an external mail account, processing of SMTP "capabilities" responses are not limited to plausible sizes. Attacke... 4.3 - MEDIUM 2023-06-20 2024-01-12
CVE-2023-26431 IPv4-mapped IPv6 addresses did not get recognized as "local" by the code and a connection attempt is made. Attackers with acc... 4.3 - MEDIUM 2023-06-20 2024-01-12
CVE-2023-26430 Attackers with access to user accounts can inject arbitrary control characters to SIEVE mail-filter rules. This could be abus... 4.3 - MEDIUM 2023-08-02 2024-01-12

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
ApplicationOpen-xchangeOpen-xchange Appsuite Backend7.8.3
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report