9 results (0.003 seconds)

CVSS: 3.7EPSS: 0%CPEs: 1EXPL: 1

29 May 2023 — An issue was discovered in Citadel through webcit-932. A meddler-in-the-middle attacker can fixate their own session during the cleartext phase before a STARTTLS command (a violation of "The STARTTLS command is only valid in non-authenticated state." in RFC2595). This potentially allows an attacker to cause a victim's e-mail messages to be stored into an attacker's IMAP mailbox, but depends on details of the victim's client behavior. • http://uncensored.citadel.org/dotgoto?room=Citadel%20Security •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

29 May 2023 — An issue was discovered in Citadel through webcit-926. Meddler-in-the-middle attackers can pipeline commands after POP3 STLS, IMAP STARTTLS, or SMTP STARTTLS commands, injecting cleartext commands into an encrypted user session. This can lead to credential disclosure. • http://uncensored.citadel.org/dotgoto?room=Citadel%20Security • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 1

28 Oct 2020 — A Weak Session Management vulnerability in Citadel WebCit through 926 allows unauthenticated remote attackers to hijack recently logged-in users' sessions. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Una vulnerabilidad de Administración de Sesión Débil en Citadel WebCit versiones hasta 926, permite a atacantes remotos no autenticados secuestrar las sesiones de los usuarios que iniciaron sesión recientemente. NOTA: esto se report... • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 • CWE-613: Insufficient Session Expiration •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

28 Oct 2020 — An Insecure Direct Object Reference vulnerability in Citadel WebCit through 926 allows authenticated remote attackers to read someone else's emails via the msg_confirm_move template. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Una vulnerabilidad de Referencia Directa a Objetos No segura en Citadel WebCit versiones hasta 926, permite a atacantes remotos autenticados leer los correos electrónicos de otra persona por medio de la plantil... • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

28 Oct 2020 — Multiple cross-site scripting (XSS) vulnerabilities in Citadel WebCit through 926 allow remote attackers to inject arbitrary web script or HTML via multiple pages and parameters. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en Citadel WebCit versiones hasta 926, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio de múltiples páginas y parámetros.&#... • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

28 Oct 2020 — Citadel WebCit through 926 allows unauthenticated remote attackers to enumerate valid users within the platform. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Citadel WebCit versiones hasta 926, permite a atacantes remotos no autenticados enumerar usuarios válidos dentro de la plataforma. NOTA: esto se reportó al proveedor en un hilo o subproceso "Multiple Security Vulnerabilities in WebCit 926" archivado públicamente • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 •

CVSS: 9.8EPSS: 1%CPEs: 7EXPL: 0

24 Mar 2009 — Format string vulnerability in the mini_calendar component in Citadel.org WebCit 7.22, and other versions before 7.39, allows remote attackers to execute arbitrary code via unspecified vectors. Una vulnerabilidad de formato de cadena en en componente mini_calendar en Citadel.org WebCit v7.22, y otras versiones anteriores a v7.39 permite a usuarios remotos ejecutar código de su elección a través de vectores no específicos. • http://osvdb.org/52915 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

17 Jul 2007 — Cross-site request forgery (CSRF) vulnerability in Webcit before 7.11 allows remote attackers to modify configurations and perform other actions as arbitrary users via unspecified vectors. Vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) en Webcit anterior a 7.11 permite a atacantes remotos modificar configuraciones y realizar otras acciones como un usuario de su elección a través de vectores no especificados. • http://osvdb.org/38181 •

CVSS: 6.1EPSS: 7%CPEs: 1EXPL: 2

17 Jul 2007 — Multiple cross-site scripting (XSS) vulnerabilities in Webcit before 7.11 allow remote attackers to inject arbitrary web script or HTML via (1) the who parameter to showuser; and other vectors involving (2) calendar mode, (3) bulletin board mode, (4) room names, and (5) uploaded file names. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Webcit anterior a 7.11 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro (1) who en showuser; y... • https://www.exploit-db.com/exploits/30312 •