Vulnerabilities > Prosody

DATE CVE VULNERABILITY TITLE RISK
2016-01-29 CVE-2016-0756 Improper Input Validation vulnerability in Prosody
The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.
network
low complexity
prosody CWE-20
5.0
2016-01-12 CVE-2016-1232 The mod_dialback module in Prosody before 0.9.9 does not properly generate random values for the secret token for server-to-server dialback authentication, which makes it easier for attackers to spoof servers via a brute force attack.
network
low complexity
prosody fedoraproject debian
5.0
2016-01-12 CVE-2016-1231 Path Traversal vulnerability in multiple products
Directory traversal vulnerability in the HTTP file-serving module (mod_http_files) in Prosody 0.9.x before 0.9.9 allows remote attackers to read arbitrary files via a ..
4.3
2014-04-11 CVE-2014-2745 Permissions, Privileges, and Access Controls vulnerability in Prosody
Prosody before 0.9.4 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack, related to core/portmanager.lua and util/xmppstream.lua.
network
low complexity
prosody CWE-264
7.8
2014-04-11 CVE-2014-2744 Improper Input Validation vulnerability in multiple products
plugins/mod_compression.lua in (1) Prosody before 0.9.4 and (2) Lightwitch Metronome through 3.4 negotiates stream compression while a session is unauthenticated, which allows remote attackers to cause a denial of service (resource consumption) via compressed XML elements in an XMPP stream, aka an "xmppbomb" attack.
network
low complexity
lightwitch prosody CWE-20
7.8
2011-06-22 CVE-2011-2532 Resource Management Errors vulnerability in Prosody 0.8.0
The json.decode function in util/json.lua in Prosody 0.8.x before 0.8.1 might allow remote attackers to cause a denial of service (infinite loop) via invalid JSON data, as demonstrated by truncated data.
network
low complexity
prosody CWE-399
5.0
2011-06-22 CVE-2011-2531 Resource Management Errors vulnerability in Prosody 0.8.0
Prosody 0.8.x before 0.8.1, when MySQL is used, assigns an incorrect data type to the value column in certain tables, which might allow remote attackers to cause a denial of service (data truncation) by sending a large amount of data.
network
prosody CWE-399
4.3
2011-06-22 CVE-2011-2205 Resource Management Errors vulnerability in Prosody
Prosody before 0.8.1 does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
network
low complexity
prosody CWE-399
5.0