Igniterealtime

Openfire

38 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.2%
  • Published 11.04.2014 01:55:05
  • Last modified 12.04.2025 10:46:40

nio/XMLLightweightParser.java in Ignite Realtime Openfire before 3.9.2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, ...

Exploit
  • EPSS 0.35%
  • Published 11.05.2009 14:30:00
  • Last modified 09.04.2025 00:30:58

Ignite Realtime Openfire before 3.6.5 does not properly implement the register.password (aka canChangePassword) console configuration setting, which allows remote authenticated users to bypass intended policy and change their own passwords via a pass...

Exploit
  • EPSS 7.86%
  • Published 11.05.2009 14:30:00
  • Last modified 09.04.2025 00:30:58

The jabber:iq:auth implementation in IQAuthHandler.java in Ignite Realtime Openfire before 3.6.4 allows remote authenticated users to change the passwords of arbitrary accounts via a modified username element in a passwd_change action.

Exploit
  • EPSS 1.46%
  • Published 23.03.2009 20:00:00
  • Last modified 09.04.2025 00:30:58

Open redirect vulnerability in login.jsp in Openfire 3.6.0a and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.

Exploit
  • EPSS 3.94%
  • Published 23.03.2009 20:00:00
  • Last modified 09.04.2025 00:30:58

Cross-site scripting (XSS) vulnerability in login.jsp in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to inject arbitrary web script or HTML via the url parameter.

Exploit
  • EPSS 1.59%
  • Published 23.03.2009 20:00:00
  • Last modified 09.04.2025 00:30:58

SQL injection vulnerability in CallLogDAO in SIP Plugin in Openfire 3.6.0a and earlier allows remote attackers to execute arbitrary SQL commands via the type parameter to sipark-log-summary.jsp.

Exploit
  • EPSS 72.59%
  • Published 23.03.2009 20:00:00
  • Last modified 09.04.2025 00:30:58

Directory traversal vulnerability in the AuthCheck filter in the Admin Console in Openfire 3.6.0a and earlier allows remote attackers to bypass authentication and access the admin interface via a .. (dot dot) in a URI that matches the Exclude-Strings...

Exploit
  • EPSS 5.92%
  • Published 10.02.2009 01:30:00
  • Last modified 09.04.2025 00:30:58

Directory traversal vulnerability in log.jsp in Ignite Realtime Openfire 3.6.2 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the log parameter.