Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
prosody prosody vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2016-0756
The generate_dialback function in the mod_dialback module in Prosody prior to 0.9.10 does not properly separate fields when generating dialback keys, which allows remote malicious users to spoof XMPP network domains via a crafted stream id and domain name that is included in the ...
Prosody Prosody
5
CVSSv2
CVE-2016-1232
The mod_dialback module in Prosody prior to 0.9.9 does not properly generate random values for the secret token for server-to-server dialback authentication, which makes it easier for malicious users to spoof servers via a brute force attack.
Prosody Prosody 0.9.6
Prosody Prosody 0.9.4
Prosody Prosody 0.9.3
Prosody Prosody 0.9.2
Prosody Prosody 0.9.1
Prosody Prosody 0.9.0
Prosody Prosody
Prosody Prosody 0.9.7
Prosody Prosody 0.9.5
Fedoraproject Fedora 22
Fedoraproject Fedora 23
Debian Debian Linux 8.0
Debian Debian Linux 7.0
5
CVSSv2
CVE-2011-2205
Prosody prior to 0.8.1 does not properly detect recursion during entity expansion, which allows remote malicious users to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CV...
Prosody Prosody 0.6.1
Prosody Prosody 0.5.1
Prosody Prosody 0.2.0
Prosody Prosody 0.1.0
Prosody Prosody 0.7
Prosody Prosody 0.6
Prosody Prosody 0.4.2
Prosody Prosody 0.4.1
Prosody Prosody 0.7.0
Prosody Prosody 0.6.0
Prosody Prosody 0.4.0
Prosody Prosody 0.3.0
Prosody Prosody 0.8
Prosody Prosody 0.5.0
Prosody Prosody 0.5.2
Prosody Prosody
5
CVSSv2
CVE-2011-2532
The json.decode function in util/json.lua in Prosody 0.8.x prior to 0.8.1 might allow remote malicious users to cause a denial of service (infinite loop) via invalid JSON data, as demonstrated by truncated data.
Prosody Prosody 0.8.0
4.3
CVSSv2
CVE-2021-32917
An issue exists in Prosody prior to 0.11.9. The proxy65 component allows open access by default, even if neither of the users has an XMPP account on the local server, allowing unrestricted use of the server's bandwidth.
Prosody Prosody
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
4.3
CVSSv2
CVE-2021-32921
An issue exists in Prosody prior to 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker.
Prosody Prosody
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 9.0
4.3
CVSSv2
CVE-2021-32919
An issue exists in Prosody prior to 0.11.9. The undocumented dialback_without_dialback option in mod_dialback enables an experimental feature for server-to-server authentication. It does not correctly authenticate remote server certificates, allowing a remote server to impersonat...
Prosody Prosody
Debian Debian Linux 10.0
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
4.3
CVSSv2
CVE-2016-1231
Directory traversal vulnerability in the HTTP file-serving module (mod_http_files) in Prosody 0.9.x prior to 0.9.9 allows remote malicious users to read arbitrary files via a .. (dot dot) in an unspecified path.
Fedoraproject Fedora 23
Fedoraproject Fedora 22
Prosody Prosody 0.9.3
Prosody Prosody 0.9.2
Prosody Prosody 0.9.1
Prosody Prosody 0.9.0
Prosody Prosody 0.9.8
Prosody Prosody 0.9.6
Prosody Prosody 0.9.4
Prosody Prosody 0.9.7
Prosody Prosody 0.9.5
Debian Debian Linux 7.0
Debian Debian Linux 8.0
4.3
CVSSv2
CVE-2011-2531
Prosody 0.8.x prior to 0.8.1, when MySQL is used, assigns an incorrect data type to the value column in certain tables, which might allow remote malicious users to cause a denial of service (data truncation) by sending a large amount of data.
Prosody Prosody 0.8.0
NA
CVE-2022-0217
It exists that an internal Prosody library to load XML based on libexpat does not properly restrict the XML features allowed in parsed XML data. Given suitable attacker input, this results in expansion of recursive entity references from DTDs (CWE-776). In addition, depending on ...
Prosody Prosody
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36920
buffer overflow
CVE-2024-36913
CVE-2024-5497
CVE-2024-23917
CVE-2024-4956
server-side request forgery
CVE-2024-35468
SSTI
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2