{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script.  NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2010-06-22T17:00:00.000Z"},"references":[{"name":"[oss-security] 20100524 Re: [core] CVE Request for Horde and Squirrelmail","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2010/05/25/2"},{"name":"[oss-security] 20100521 Re: [core] CVE Request for Horde and Squirrelmail","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2010/05/21/2"},{"tags":["x_refsource_MISC"],"url":"http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=74"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T01:28:41.580Z"},"title":"CVE Program Container","references":[{"name":"[oss-security] 20100524 Re: [core] CVE Request for Horde and Squirrelmail","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2010/05/25/2"},{"name":"[oss-security] 20100521 Re: [core] CVE Request for Horde and Squirrelmail","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2010/05/21/2"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=74"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2010-1638","state":"PUBLISHED","dateReserved":"2010-04-29T00:00:00.000Z","datePublished":"2010-06-22T17:00:00.000Z","dateUpdated":"2024-08-07T01:28:41.580Z"},"dataType":"CVE_RECORD","dataVersion":"5.1"}