Page 38 of 188 results (0.005 seconds)

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 2

Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 uses weak permissions (group "other" readable) under opt/open-xchange/etc/, which allows local users to obtain sensitive information via standard filesystem operations. Open-Xchange Server anterior a 6.20.7 rev14, 6.22.0 anterior a rev13, y 6.22.1 anterior a rev14, usa permisos débiles (group "other" readable) bajo opt/open-xchange/etc/, lo que permite a usuarios locales obtener información sensible a través de operaciones estándar sobre el sistema de archivos. Open-Xchange version 6 suffers from cross site scripting, local file inclusion, HTTP header injection / response splitting, missing SSL enforcement, server-side request forging, insecure password hashing, and file permission vulnerabilities. • https://www.exploit-db.com/exploits/24791 http://archives.neohapsis.com/archives/bugtraq/2013-03/0075.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

The open source version of Open-Xchange 0.8.2 and earlier uses a static default username and password with a valid login shell in the initfile for the ldap-server, which allows remote attackers to access any server where the default has not been changed. • http://secunia.com/advisories/20323 http://securityreason.com/securityalert/1012 http://www.golem.de/0605/45407.html http://www.open-xchange.org/bugzilla/show_bug.cgi?id=2815 http://www.securityfocus.com/archive/1/435198/100/0/threaded http://www.securityfocus.com/bid/18115 http://www.vupen.com/english/advisories/2006/2037 https://exchange.xforce.ibmcloud.com/vulnerabilities/26761 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in webmail in Open-Xchange 0.8.1-6 and earlier, with "Inline HTML" enabled, allows remote attackers to inject arbitrary web script or HTML via e-mail attachments, which are rendered inline. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en webmail de Open-Xchange 0.8.1-6 y anteriores, con "Inline HTML" habilitado, permite a atacantes remotos inyectar 'script' web o HTML de su elección mediante adjuntos de correo electrónico, que son dibujados en línea. • http://marc.info/?l=full-disclosure&m=113629092325679&w=2 http://secunia.com/advisories/18285 http://securitytracker.com/id?1015431 http://www.vupen.com/english/advisories/2006/0034 •