16 results (0.008 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

04 Oct 2023 — A cross-site scripting vulnerability exists in Citadel versions prior to 994. When a malicious user sends an instant message with some JavaScript code, the script may be executed on the web browser of the victim user. Existe una vulnerabilidad de Cross-Site Scripting (XSS) en las versiones Citadel anteriores a la 994. Cuando un usuario malintencionado envía un mensaje instantáneo con algún código JavaScript, la secuencia de comandos puede ejecutarse en el navegador web del usuario víctima. • https://code.citadel.org/citadel/citadel • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 3.7EPSS: 0%CPEs: 1EXPL: 1

29 May 2023 — An issue was discovered in Citadel through webcit-932. A meddler-in-the-middle attacker can fixate their own session during the cleartext phase before a STARTTLS command (a violation of "The STARTTLS command is only valid in non-authenticated state." in RFC2595). This potentially allows an attacker to cause a victim's e-mail messages to be stored into an attacker's IMAP mailbox, but depends on details of the victim's client behavior. • http://uncensored.citadel.org/dotgoto?room=Citadel%20Security •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

29 May 2023 — An issue was discovered in Citadel through webcit-926. Meddler-in-the-middle attackers can pipeline commands after POP3 STLS, IMAP STARTTLS, or SMTP STARTTLS commands, injecting cleartext commands into an encrypted user session. This can lead to credential disclosure. • http://uncensored.citadel.org/dotgoto?room=Citadel%20Security • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 1

28 Oct 2020 — A Weak Session Management vulnerability in Citadel WebCit through 926 allows unauthenticated remote attackers to hijack recently logged-in users' sessions. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Una vulnerabilidad de Administración de Sesión Débil en Citadel WebCit versiones hasta 926, permite a atacantes remotos no autenticados secuestrar las sesiones de los usuarios que iniciaron sesión recientemente. NOTA: esto se report... • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 • CWE-613: Insufficient Session Expiration •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

28 Oct 2020 — An Insecure Direct Object Reference vulnerability in Citadel WebCit through 926 allows authenticated remote attackers to read someone else's emails via the msg_confirm_move template. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Una vulnerabilidad de Referencia Directa a Objetos No segura en Citadel WebCit versiones hasta 926, permite a atacantes remotos autenticados leer los correos electrónicos de otra persona por medio de la plantil... • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

28 Oct 2020 — Multiple cross-site scripting (XSS) vulnerabilities in Citadel WebCit through 926 allow remote attackers to inject arbitrary web script or HTML via multiple pages and parameters. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en Citadel WebCit versiones hasta 926, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio de múltiples páginas y parámetros.&#... • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

28 Oct 2020 — Citadel WebCit through 926 allows unauthenticated remote attackers to enumerate valid users within the platform. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Citadel WebCit versiones hasta 926, permite a atacantes remotos no autenticados enumerar usuarios válidos dentro de la plataforma. NOTA: esto se reportó al proveedor en un hilo o subproceso "Multiple Security Vulnerabilities in WebCit 926" archivado públicamente • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 •

CVSS: 7.5EPSS: 1%CPEs: 8EXPL: 0

21 Jun 2011 — modules/xmpp/serv_xmpp.c in Citadel 7.86 and earlier does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564. El archivo modules/xmpp/serv_xmpp.c en Citadel versión 7.86 y anteriores, no detectan apropiadamente la recursión durante la expansión de la entidad, lo que permite a los atacantes remotos causar... • http://code.citadel.org/cgit.cgi/git.citadel.org/commit/?id=27c991cc2059f5530d3d4e9689dc976b745f5b0c • CWE-399: Resource Management Errors •

CVSS: 9.8EPSS: 1%CPEs: 7EXPL: 0

24 Mar 2009 — Format string vulnerability in the mini_calendar component in Citadel.org WebCit 7.22, and other versions before 7.39, allows remote attackers to execute arbitrary code via unspecified vectors. Una vulnerabilidad de formato de cadena en en componente mini_calendar en Citadel.org WebCit v7.22, y otras versiones anteriores a v7.39 permite a usuarios remotos ejecutar código de su elección a través de vectores no específicos. • http://osvdb.org/52915 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 9.8EPSS: 15%CPEs: 1EXPL: 1

23 Jan 2008 — Buffer overflow in Citadel SMTP server 7.10 and earlier allows remote attackers to execute arbitrary code via a long RCPT TO command, which is not properly handled by the makeuserkey function. NOTE: some of these details were obtained from third party information. Desbordamiento de búfer en Citadel SMTP server 7.10 y anteriores permite a atacantes remotos ejecutgar código de su elección a través del comando largos RCTP TO, el cual no es manejado de forma adecuada por la función makeuserkey. NOTA: algunos de... • https://www.exploit-db.com/exploits/4949 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •