Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5743-1 | roundcube security update |
Debian DSA |
DSA-5743-2 | roundcube security update |
Ubuntu USN |
USN-8223-1 | Roundcube Webmail vulnerabilities |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 12 Aug 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a insufficiently filters Cascading Style Sheets (CSS) token sequences in rendered e-mail messages, allowing a remote attacker to obtain sensitive information. | mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 insufficiently filters Cascading Style Sheets (CSS) token sequences in rendered e-mail messages, allowing a remote attacker to obtain sensitive information. |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-12T13:42:04.196Z
Reserved: 2024-07-26T00:00:00.000Z
Link: CVE-2024-42010
Updated: 2024-08-06T14:06:06.256Z
Status : Deferred
Published: 2024-08-05T19:15:38.273
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-42010
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN