Page 28 of 145 results (0.002 seconds)

CVSS: 4.0EPSS: 0%CPEs: 4EXPL: 1

Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 has a hardcoded password for node join operations, which allows remote attackers to expand a cluster by finding this password in the source code and then sending the password in a Hazelcast cluster API call, a different vulnerability than CVE-2013-5200. Open-Xchange AppSuite v7.0.x anterior a v7.0.2-rev15 y v7.2.x anterior a v7.2.2-rev16 tiene una contraseña incrustada para operaciones de adhesión de nodos, lo que permite a atacantes remotos expandir un grupo encontrando esta contraseña en el código fuente y enviándola en una llamada Hazelcast cluster. Una vulnerabilidad diferente de CVE-2013-5200. • http://archives.neohapsis.com/archives/bugtraq/2013-09/0032.html • CWE-255: Credentials Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

The Hazelcast cluster API in Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 allows remote attackers to obtain sensitive information about (1) runtime activity, (2) network configuration, (3) user sessions, (4) the memcache interface, and (5) the REST interface via API calls such as a hazelcast/rest/cluster/ call, a different vulnerability than CVE-2013-5200. La API Hazelcast cluster en Open-Xchange AppSuite v7.0.x anterior a v7.0.2-rev15 y v7.2.x anterior a v7.2.2-rev16 permite a atacantes remotos conseguir información sensible sobre la actividad en tiempo de ejecución, configuración de red, sesiones de usuarios, interfaz "memcache" y el interfaz REST a través de llamadas API como hazelcast/rest/cluster/, una vulnerabilidad diferente a CVE-2013-5200. • http://archives.neohapsis.com/archives/bugtraq/2013-09/0032.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

The Hazelcast cluster API in Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 does not properly restrict the set of network interfaces that can receive API calls, which makes it easier for remote attackers to obtain access by sending network traffic from an unintended location, a different vulnerability than CVE-2013-5200. La API Hazelcast cluster en Open-Xchange AppSuite v7.0.x anterior a v7.0.2-rev15 y v7.2.x anterior a v7.2.2-rev16 no restringe correctamente el conjunto de interfaces de red que pueden recibir llamadas API, lo cual facilita a los atacantes remotos conseguir acceso mediante el envío de tráfico de red desde una localización imprevista, una vulnerabilidad diferente de CVE-2013-5200. • http://archives.neohapsis.com/archives/bugtraq/2013-09/0032.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 1

The (1) REST and (2) memcache interfaces in the Hazelcast cluster API in Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 do not require authentication, which allows remote attackers to obtain sensitive information or modify data via an API call. Los interfaces (1) REST y (2) memcache en Hazelcast cluster API de Open-Xchange AppSuite 7.0.x (anteriores a 7.0.2-rev15) y 7.2.x (anteriores a 7.2.2-rev16) no requieren autenticación, lo que permite a atacantes remotos obtener información sensible o modificar datos a través de una llamada al API. Open-Xchange AppSuite versions 7.0.0 through 7.2.2 suffer from configuration issues, improper authentication, and information exposure vulnerabilities. • http://archives.neohapsis.com/archives/bugtraq/2013-09/0032.html • CWE-287: Improper Authentication •

CVSS: 3.5EPSS: 0%CPEs: 10EXPL: 0

Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite and Server before 6.22.0 rev16, 6.22.1 before rev19, 7.0.1 before rev7, 7.0.2 before rev11, and 7.2.0 before rev8 allows remote authenticated users to inject arbitrary web script or HTML via a delivery=view action, aka Bug ID 26373, a different vulnerability than CVE-2013-3106. Vulnerabilidad Cross-site scripting (XSS) en Open-Xchange AppSuite y Server anterior a v6.22.0 rev16, v6.22.1 anterior a rev19, v7.0.1 anterior a rev7, v7.0.2 anterior a rev11, y v7.2.0 anterior a rev8 permite a los usuarios remotos autenticados inyectar secuencias de comandos web o HTML a través de una acción "delivery=view", también conocido como Bug ID 26373, una vulnerabilidad diferente a CVE-2013-3106. • http://archives.neohapsis.com/archives/bugtraq/2013-06/0012.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •