Page 29 of 151 results (0.006 seconds)

CVSS: 3.5EPSS: 0%CPEs: 7EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange AppSuite before 7.2.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) content with the text/xml MIME type or (2) the Status comment field of an appointment. Múltiples vulnerabilidades XSS en Open-Xchange AppSuite anterior a v7.2.2 permite a usuarios autenticados remotamente inyectar secuencias de comandos web o HTML arbitrarias a través de (1) contenido con el tipo text/xml MIME o (2) el campo comentario de Status de una cita. • http://www.securityfocus.com/archive/1/528940 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.0EPSS: 0%CPEs: 4EXPL: 1

Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 has a hardcoded password for node join operations, which allows remote attackers to expand a cluster by finding this password in the source code and then sending the password in a Hazelcast cluster API call, a different vulnerability than CVE-2013-5200. Open-Xchange AppSuite v7.0.x anterior a v7.0.2-rev15 y v7.2.x anterior a v7.2.2-rev16 tiene una contraseña incrustada para operaciones de adhesión de nodos, lo que permite a atacantes remotos expandir un grupo encontrando esta contraseña en el código fuente y enviándola en una llamada Hazelcast cluster. Una vulnerabilidad diferente de CVE-2013-5200. • http://archives.neohapsis.com/archives/bugtraq/2013-09/0032.html • CWE-255: Credentials Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

The Hazelcast cluster API in Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 allows remote attackers to obtain sensitive information about (1) runtime activity, (2) network configuration, (3) user sessions, (4) the memcache interface, and (5) the REST interface via API calls such as a hazelcast/rest/cluster/ call, a different vulnerability than CVE-2013-5200. La API Hazelcast cluster en Open-Xchange AppSuite v7.0.x anterior a v7.0.2-rev15 y v7.2.x anterior a v7.2.2-rev16 permite a atacantes remotos conseguir información sensible sobre la actividad en tiempo de ejecución, configuración de red, sesiones de usuarios, interfaz "memcache" y el interfaz REST a través de llamadas API como hazelcast/rest/cluster/, una vulnerabilidad diferente a CVE-2013-5200. • http://archives.neohapsis.com/archives/bugtraq/2013-09/0032.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

The Hazelcast cluster API in Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 does not properly restrict the set of network interfaces that can receive API calls, which makes it easier for remote attackers to obtain access by sending network traffic from an unintended location, a different vulnerability than CVE-2013-5200. La API Hazelcast cluster en Open-Xchange AppSuite v7.0.x anterior a v7.0.2-rev15 y v7.2.x anterior a v7.2.2-rev16 no restringe correctamente el conjunto de interfaces de red que pueden recibir llamadas API, lo cual facilita a los atacantes remotos conseguir acceso mediante el envío de tráfico de red desde una localización imprevista, una vulnerabilidad diferente de CVE-2013-5200. • http://archives.neohapsis.com/archives/bugtraq/2013-09/0032.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 1

The (1) REST and (2) memcache interfaces in the Hazelcast cluster API in Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 do not require authentication, which allows remote attackers to obtain sensitive information or modify data via an API call. Los interfaces (1) REST y (2) memcache en Hazelcast cluster API de Open-Xchange AppSuite 7.0.x (anteriores a 7.0.2-rev15) y 7.2.x (anteriores a 7.2.2-rev16) no requieren autenticación, lo que permite a atacantes remotos obtener información sensible o modificar datos a través de una llamada al API. Open-Xchange AppSuite versions 7.0.0 through 7.2.2 suffer from configuration issues, improper authentication, and information exposure vulnerabilities. • http://archives.neohapsis.com/archives/bugtraq/2013-09/0032.html • CWE-287: Improper Authentication •