Page 3 of 20 results (0.010 seconds)

CVSS: 4.3EPSS: 0%CPEs: 25EXPL: 3

Cross-site scripting (XSS) vulnerability in login.jsp in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to inject arbitrary web script or HTML via the url parameter. Una vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados en login.jsp en la Consola de Administración de Openfire 3.6.0a y anteriores permite a atacantes remotos inyectar HTML o scripts web arbitrarios a través del parámetro URL. • https://www.exploit-db.com/exploits/7075 http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt http://www.igniterealtime.org/issues/browse/JM-629 http://www.securityfocus.com/archive/1/498162/100/0/threaded http://www.securityfocus.com/bid/32189 http://www.vupen.com/english/advisories/2008/3061 https://exchange.xforce.ibmcloud.com/vulnerabilities/46486 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 68%CPEs: 25EXPL: 5

Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings list, as demonstrated by a /setup/setup-/.. sequence in a URI. Una vulnerabilidad de salto de directorio en el filtro AuthCheck de la Consola de administración de Openfire 3.6.0a y anteriores permite a atacantes remotos eludir el proceso de autenticación y acceder a la pantalla de administración a través de un .. (punto punto) en una URI que coincida con la lista de cadenas excluidas (Exclude-Strings), como lo demuestra una secuencia /setup/setup-/.. en una URI. • https://www.exploit-db.com/exploits/19432 https://www.exploit-db.com/exploits/7075 http://osvdb.org/49663 http://secunia.com/advisories/32478 http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt http://www.andreas-kurtz.de/archives/63 http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html http://www.igniterealtime.org/issues/browse/JM-1489 http://www.securityfocus.com/archive/1/498162/100/0/threaded http://www.securityfocus.com/bid/32189 http • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 9%CPEs: 25EXPL: 3

SQL injection vulnerability in CallLogDAO in SIP Plugin in Openfire 3.6.0a and earlier allows remote attackers to execute arbitrary SQL commands via the type parameter to sipark-log-summary.jsp. Vulnerabilidad de inyección de SQL en CallLogDAO en el complemento SIP para Openfire 3.6.0a y anteriores permite a atacantes remotos ejecutar comandos SQL a través del parámetro tipo (type) de sipark-log-summary.jsp. • https://www.exploit-db.com/exploits/7075 http://osvdb.org/51912 http://secunia.com/advisories/32478 http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt http://www.andreas-kurtz.de/archives/63 http://www.igniterealtime.org/issues/browse/JM-1488 http://www.securityfocus.com/archive/1/498162/100/0/threaded http://www.securityfocus.com/bid/32189 http://www.vupen.com/english/advisories/2008/3061 https://exchange.xforce.ibmcloud.com/vulnerabilities/46487 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 2

Directory traversal vulnerability in log.jsp in Ignite Realtime Openfire 3.6.2 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the log parameter. Vulnerabilidad de salto de directorio en log.jsp en Ignite Realtime Openfire v3.6.2, permite a atacantes remotos leer ficheros de su elección a través de "..\" en el parámetro "log". • https://www.exploit-db.com/exploits/32680 http://secunia.com/advisories/33452 http://svn.igniterealtime.org/svn/repos/openfire/trunk/src/web/log.jsp http://www.coresecurity.com/content/openfire-multiple-vulnerabilities http://www.securityfocus.com/archive/1/499880/100/0/threaded http://www.securityfocus.com/bid/32945 https://bugs.gentoo.org/show_bug.cgi?id=257585 https://exchange.xforce.ibmcloud.com/vulnerabilities/47806 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 89%CPEs: 1EXPL: 7

Multiple cross-site scripting (XSS) vulnerabilities in Ignite Realtime Openfire 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) log parameter to (a) logviewer.jsp and (b) log.jsp; (2) search parameter to (c) group-summary.jsp; (3) username parameter to (d) user-properties.jsp; (4) logDir, (5) maxTotalSize, (6) maxFileSize, (7) maxDays, and (8) logTimeout parameters to (e) audit-policy.jsp; (9) propName parameter to (f) server-properties.jsp; and the (10) roomconfig_roomname and (11) roomconfig_roomdesc parameters to (g) muc-room-edit-form.jsp. NOTE: this can be leveraged for arbitrary code execution by using XSS to upload a malicious plugin. Múltiples vulnerabilidades de ejecución de secuencias de comandos cruzados en Ignite Realtime Openfire v3.6.2, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de los parámetros (1) "log" a (a) logviewer.jsp y (b) log.jsp; (2) "search" a (c) group-summary.jsp; (3) "username" a (d) user-properties.jsp; (4) "logDir", (5) "maxTotalSize", (6) "maxFileSize", (7) "maxDays", y (8) "logTimeout" a (e) audit-policy.jsp; (9) "propName" a (f) server-properties.jsp; y (10) "roomconfig_roomname" y (11) "roomconfig_roomdesc" a (g) muc-room-edit-form.jsp. • https://www.exploit-db.com/exploits/32677 https://www.exploit-db.com/exploits/32679 https://www.exploit-db.com/exploits/32678 http://secunia.com/advisories/33452 http://www.coresecurity.com/content/openfire-multiple-vulnerabilities http://www.igniterealtime.org/issues/browse/JM-1506 http://www.securityfocus.com/archive/1/499880/100/0/threaded http://www.securityfocus.com/bid/32935 http://www.securityfocus.com/bid/32937 http://www.securityfocus.com/bid/32938 http://www.secu • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •