CVE-2023-46267

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-5631. Reason: This candidate is a duplicate of CVE-2023-5631. Notes: All CVE users should reference CVE-2023-5631 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

07 Nov 2023, 04:21

Type Values Removed Values Added
Summary ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-5631. Reason: This candidate is a duplicate of CVE-2023-5631. Notes: All CVE users should reference CVE-2023-5631 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-5631. Reason: This candidate is a duplicate of CVE-2023-5631. Notes: All CVE users should reference CVE-2023-5631 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

21 Oct 2023, 21:15

Type Values Removed Values Added
Summary Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows XSS via a text/html e-mail message containing an SVG image with a USE element. This is related to wash_uri in rcube_washtml.php. ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-5631. Reason: This candidate is a duplicate of CVE-2023-5631. Notes: All CVE users should reference CVE-2023-5631 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
References
  • {'url': 'https://github.com/roundcube/roundcubemail/issues/9168', 'name': 'https://github.com/roundcube/roundcubemail/issues/9168', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://github.com/roundcube/roundcubemail/compare/1.5.4...1.5.5', 'name': 'https://github.com/roundcube/roundcubemail/compare/1.5.4...1.5.5', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15', 'name': 'https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://roundcube.net/news/2023/10/16/security-update-1.6.4-released', 'name': 'https://roundcube.net/news/2023/10/16/security-update-1.6.4-released', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d', 'name': 'https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://github.com/roundcube/roundcubemail/compare/1.4.14...1.4.15', 'name': 'https://github.com/roundcube/roundcubemail/compare/1.4.14...1.4.15', 'tags': [], 'refsource': 'MISC'}

20 Oct 2023, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-20 04:15

Updated : 2024-04-16 18:27


NVD link : CVE-2023-46267

Mitre link : CVE-2023-46267

CVE.ORG link : CVE-2023-46267


JSON object : View

Products Affected

No product.

CWE

No CWE.