Vulnerabilities > Open Xchange > Open Xchange Appsuite > 7.2.1

DATE CVE VULNERABILITY TITLE RISK
2013-09-25 CVE-2013-5936 Information Exposure vulnerability in Open-Xchange Appsuite
The Hazelcast cluster API in Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 allows remote attackers to obtain sensitive information about (1) runtime activity, (2) network configuration, (3) user sessions, (4) the memcache interface, and (5) the REST interface via API calls such as a hazelcast/rest/cluster/ call, a different vulnerability than CVE-2013-5200.
4.3
2013-09-25 CVE-2013-5935 Information Exposure vulnerability in Open-Xchange Appsuite
The Hazelcast cluster API in Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 does not properly restrict the set of network interfaces that can receive API calls, which makes it easier for remote attackers to obtain access by sending network traffic from an unintended location, a different vulnerability than CVE-2013-5200.
4.3
2013-09-25 CVE-2013-5934 Credentials Management vulnerability in Open-Xchange Appsuite
Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 has a hardcoded password for node join operations, which allows remote attackers to expand a cluster by finding this password in the source code and then sending the password in a Hazelcast cluster API call, a different vulnerability than CVE-2013-5200.
network
high complexity
open-xchange CWE-255
4.0
2013-09-25 CVE-2013-5200 Improper Authentication vulnerability in Open-Xchange Appsuite
The (1) REST and (2) memcache interfaces in the Hazelcast cluster API in Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 do not require authentication, which allows remote attackers to obtain sensitive information or modify data via an API call.
network
low complexity
open-xchange CWE-287
7.5
2013-09-05 CVE-2013-4790 Credentials Management vulnerability in Open-Xchange Appsuite
Open-Xchange AppSuite before 7.0.2 rev14, 7.2.0 before rev11, 7.2.1 before rev10, and 7.2.2 before rev9 relies on user-supplied data to predict the IMAP server hostname for an external domain name, which allows remote authenticated users to discover e-mail credentials of other users in opportunistic circumstances via a manual-mode association of a personal e-mail address with the hostname of a crafted IMAP server.
3.5