Page 4 of 29 results (0.013 seconds)

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

nio/XMLLightweightParser.java in Ignite Realtime Openfire before 3.9.2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack. El archivo nio/XMLLightweightParser.java en Ignite Realtime Openfire anterior a versión 3.9.2, no restringe apropiadamente el procesamiento de elementos XML comprimidos, lo que permite a los atacantes remotos causar una denegación de servicio (consumo de recursos) por medio de una secuencia XMPP diseñada, también conocido como ataque "xmppbomb" . • http://community.igniterealtime.org/thread/52317 http://fisheye.igniterealtime.org/changelog/openfiregit?cs=3aec383e07ee893b77396fe946766bbd3758af77 http://openwall.com/lists/oss-security/2014/04/07/7 http://openwall.com/lists/oss-security/2014/04/09/1 http://www.kb.cert.org/vuls/id/495476 http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

Ignite Realtime Openfire before 3.6.5 does not properly implement the register.password (aka canChangePassword) console configuration setting, which allows remote authenticated users to bypass intended policy and change their own passwords via a passwd_change IQ packet. Ignite Realtime Openfire antes de v3.6.5 no implementa correctamente la propiedad de configuración de la consola register.password (alias canChangePassword), lo que permite eludir la política de seguridad a usuarios remotos autenticados, así como cambiar sus propias contraseñas a través de un paquete passwd_change IQ. • http://secunia.com/advisories/34984 http://www.igniterealtime.org/community/message/190280 http://www.igniterealtime.org/issues/browse/JM-1532 http://www.osvdb.org/54189 http://www.securityfocus.com/bid/34804 https://exchange.xforce.ibmcloud.com/vulnerabilities/50291 • CWE-287: Improper Authentication •

CVSS: 4.0EPSS: 0%CPEs: 29EXPL: 4

The jabber:iq:auth implementation in IQAuthHandler.java in Ignite Realtime Openfire before 3.6.4 allows remote authenticated users to change the passwords of arbitrary accounts via a modified username element in a passwd_change action. La implementación jabber:iq:auth en IQAuthHandler.java de Ignite Realtime Openfire v3.6.5 permite a usuarios remotos autenticados cambiar las contraseñas de cuentas de usuario de su elección a través de un elemento "username" (nombre de usuario) modificado en la acción passwd_change. • https://www.exploit-db.com/exploits/32967 http://osvdb.org/54189 http://secunia.com/advisories/34976 http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html http://www.igniterealtime.org/community/message/190280 http://www.igniterealtime.org/issues/browse/JM-1531 http://www.securityfocus.com/bid/34804 http://www.vupen.com/english/advisories/2009/1237 https://exchange.xforce.ibmcloud.com/vulnerabilities/50292 • CWE-287: Improper Authentication •

CVSS: 5.8EPSS: 0%CPEs: 25EXPL: 2

Open redirect vulnerability in login.jsp in Openfire 3.6.0a and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter. Vulnerabilidad de redirección abierta en login.jsp en Openfire 3.6.0a y anteriores permite a atacantes remotos redirigir a los usuarios a sitios Web arbitrarios y llevar a cabo ataques de phishing a través del parámetro URL. • https://www.exploit-db.com/exploits/7075 http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt http://www.securityfocus.com/archive/1/498162/100/0/threaded • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 25EXPL: 3

Cross-site scripting (XSS) vulnerability in login.jsp in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to inject arbitrary web script or HTML via the url parameter. Una vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados en login.jsp en la Consola de Administración de Openfire 3.6.0a y anteriores permite a atacantes remotos inyectar HTML o scripts web arbitrarios a través del parámetro URL. • https://www.exploit-db.com/exploits/7075 http://www.andreas-kurtz.de/advisories/AKADV2008-001-v1.0.txt http://www.igniterealtime.org/issues/browse/JM-629 http://www.securityfocus.com/archive/1/498162/100/0/threaded http://www.securityfocus.com/bid/32189 http://www.vupen.com/english/advisories/2008/3061 https://exchange.xforce.ibmcloud.com/vulnerabilities/46486 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •