2 results (0.006 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Mibew Messenger before 3.2.7 allows XSS via a crafted user name. Mibew Messenger versiones anteriores a 3.2.7, permite un ataque de tipo XSS por medio de un nombre de usuario diseñado • https://github.com/Mibew/mibew/commit/84f5bca0a90b2fe470e35e9b5121548ccce0093c https://mibew.org/announcements/2020/07/09/mibew-messenger-3-2-7-has-been-released • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.0EPSS: 0%CPEs: 16EXPL: 2

Multiple cross-site request forgery (CSRF) vulnerabilities in Mibew Messenger 1.6.4 and earlier allow remote attackers to hijack the authentication of operators for requests that insert cross-site scripting (XSS) sequences via the (1) address or (2) threadid parameters to operator/ban.php; or (3) geolinkparams, (4) title, or (5) chattitle parameters to operator/settings.php. Varias vulnerabilidades de falsificación de solicitudes en sitios cruzados(CSRF) en Mibew Messenger v1.6.4 y anteriores permite a atacantes remotos secuestrar la autenticación de los operadores de las peticiones que insertan ejecución de secuencias de comandos en sitios cruzados (XSS) a través de (1) address or (2) threadid parameters to operator/ban.php; or (3) geolinkparams, (4) title, or (5) chattitle parameters to operator/settings.php. • http://archives.neohapsis.com/archives/bugtraq/2012-01/0178.html http://secunia.com/advisories/47787 http://www.codseq.it/advisories/mibew_messenger_multiple_xss http://www.openwall.com/lists/oss-security/2012/02/02/10 http://www.securityfocus.com/bid/51723 https://exchange.xforce.ibmcloud.com/vulnerabilities/72822 • CWE-352: Cross-Site Request Forgery (CSRF) •