Ignite Realtime Openfire suffers from a stored Cross-site Scripting vulnerability in plugins/dbaccess/db-access.jsp.
Ignite Realtime Openfire suffers from a Stored Cross-site Scripting vulnerability in create-bookmark.jsp.
Ignite Realtime Openfire suffers from a reflective Cross-site Scripting vulnerability in plugins/clientcontrol/spark-form.jsp.
A stored Cross-site Scripting vulnerability exists in Ignite Realtime Openfire's create-bookmark.jsp groupchatJID.
Ignite Realtime Openfire suffers from a Stored Cross-Site Scripting vulnerability in plugins/bookmarks/create-bookmark.jsp.
Ignite Realtime Openfire has a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary malicious URL via the vulnerable GET parameters searchName, searchValue, searchDescription, searchDefaultValue, searchPlugin, searchDescription and searchDynamic in the Server Properties and Security Audit Viewer JSP page.
In Ignite Realtime Openfire, a stored cross-site scripting vulnerability allows an attacker to execute an arbitrary malicious URL via the vulnerable POST parameters searchName and alias in the import certificate trusted page.
A Reflected XSS vulnerability was discovered in Ignite Realtime Openfire. The XSS vulnerability allows remote attackers to inject arbitrary web script or HTML via the GET request searchName, searchValue, searchDescription, searchDefaultValue,searchPlugin, searchDescription and searchDynamic in server-properties.jsp and security-audit-viewer.jsp
Ignite Realtime Openfire allows XSS via the setup/setup-datasource-standard.jsp serverURL parameter.
Ignite Realtime Openfire suffers from a Cross-site Scripting (XSS) vulnerability in the setup/setup-datasource-standard.jsp password parameter.
Ignite Realtime Openfire suffers from a Cross-site Scripting (XSS) vulnerability in the setup/setup-datasource-standard.jsp driver parameter.
Ignite Realtime Openfire suffers from a Cross-site Scripting (XSS) vulnerability in the setup/setup-datasource-standard.jsp username parameter.