Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.809849 |
Kategorie: | Web application abuses |
Titel: | Open-Xchange (OX) AppSuite Multiple XSS Vulnerabilities |
Zusammenfassung: | Open-Xchange (OX) AppSuite is prone to multiple cross-site scripting; (XSS) vulnerabilities. |
Beschreibung: | Summary: Open-Xchange (OX) AppSuite is prone to multiple cross-site scripting (XSS) vulnerabilities. Vulnerability Insight: Multiple flaws exist due to an improper sanitization of user-supplied input. Vulnerability Impact: Successful exploitation will allow attackers to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected application. This may let the attacker steal cookie-based authentication credentials and launch other attacks. Affected Software/OS: Open-Xchange (OX) AppSuite versions 7.6.2-rev0 through 7.6.2-rev57, 7.6.3-rev0 through 7.6.3-rev13, 7.8.0-rev0 through 7.8.0-rev35, 7.8.1-rev0 through 7.8.1-rev17 and 7.8.2-rev0 through 7.8.2-rev4. Solution: Update to version 7.6.2-rev58, 7.6.3-rev14, 7.8.0-rev36, 7.8.1-rev18, 7.8.2-rev5 or later. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N |
Querverweis: |
BugTraq ID: 92922 Common Vulnerability Exposure (CVE) ID: CVE-2016-5740 http://www.securityfocus.com/bid/92922 Bugtraq: 20160913 Open-Xchange Security Advisory 2016-09-13 (Google Search) http://www.securityfocus.com/archive/1/539394/100/0/threaded https://www.exploit-db.com/exploits/40378/ |
Copyright | Copyright (C) 2017 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |