You can use the form below to search our site. Just enter the
keywords to search.
|
|
 |
Mambo Authentication Bypass
|
October 4, 2021 |
Mambo is a popular Open Source Content Management System released under the GNU General Public license (GNU GPL). There
are unfortunately some serious flaws in Mambo's login feature that allow for authentication bypass. This can be used to
access arbitrary accounts, but even worse can be used to eventually install harmful modules and execute arbitrary php code
on the server running Mambo. The Mambo team have committed fixes for these issues to SVN, and patches are available from the
official Mambo website. Users are encouraged to patch the vulnerable functionality or update their Mambo installation as soon
as possible. |
Read This Article
|
Article Read 676 Times
|

HAMweather Remote Code Execution
|
September 30, 2021 |
HAMWeather is a popular weather forecasting software that allows webmasters to display detailed
weather forecasts and statistics on their websites. Unfortunately some of the features within
HAMweather allow for an attacker to inject arbitrary php into the application and successfully
execute arbitrary code. Also, because magic_quotes_gpc and register_globals settings are irrelevant
when exploiting this issue it makes it that much easier for an attacker to get a remote shell on the
host and possibly mount further attacks on the underlying server. An updated version of HAMweather
has been released and all users are encouraged to upgrade as soon as possible. |
Read This Article
|
Article Read 490 Times
|

CakePHP Framework Arbitrary File Access
|
September 21, 2021 |
CakePHP is a RAD (Rapid Application Framework) framework for PHP which uses commonly
known design patterns like ActiveRecord, Association Data Mapping, Front Controller
and MVC. Unfortunately CakePHP is vulnerable to an arbitrary file access vulnerability
due to unsafe use of the readfile function that allows for an attacker to read any file
on the system that the webserver has read access to. This could be used to read password
files or sensitive configuration data etc. An updated version of CakePHP has been released
and users encouraged to upgrade their CakePHP installations as soon as possible. |
Read This Article
|
Article Read 522 Times
|

X-Cart Arbitrary Code Execution
|
September 18, 2021 |
X-Cart is a commercial web based eCommerce solution written in PHP and MySQL that allows for
webmasters to host an online marketplace. Unfortunately an attacker may be able to execute
arbitrary php code on an X-Cart installation by overwriting key configuration variables.
However, because the vulnerability allows for any variables to be overwritten other attacks
such as SQL Injection are probably possible as well. Qualiteam have released an updated
version of their X-Cart software, and users are strongly encouraged to upgrade as soon as
possible or delete the cmpi.php script that resides within the payments directory. |
Read This Article
|
Article Read 852 Times
|

Claroline Arbitrary File Inclusion
|
September 14, 2021 |
Claroline is a popular online Open Source e-Learning application used to allow
teachers or education organizations to create and administrate courses through
the web. Claroline is also used as the framework for other e-Learning applications
such as Dokeos. Unfortunately Claroline is vulnerable to a file inclusion issue
when register globals is on which may allow for an attacker to read or execute
arbitrary files. Some frameworks that use Claroline (such as Dokeos) are also
vulnerable to the issues mentioned here. An updated version of Claroline has been
released and users should upgrade immediately and disable register_globals if possible. |
Read This Article
|
Article Read 778 Times
|

CubeCart Multiple Vulnerabilities
|
August 28, 2021 |
CubeCart is a very popular web application written in php that
allows for an individual to open up a fully functioning online
ecommerce service. Unfortunately CubeCart is vulnerable to Cross
Site Scripting attacks, SQL Injection attacks, and possible remote
code execution due to an attacker being able to include arbitrary
php code. An updated version of CubeCart has been released and all
users are encouraged to upgrade as soon as possible. |
Read This Article
|
Article Read 881 Times
|

osCommerce Multiple Vulnerabilities
|
August 17, 2021 |
osCommerce is one of the most popular open source ecommerce web applications
ever written. osCommerce allows webmasters to open a fully functioning online
marketplace with little effort. Unfortunately there have been several new
vulnerabilities discovered in the latest versions of osCommerce. These issues
may allow for an attacker to gather arbitrary information from the database
such as credit card information, user login information, or personal information.
There are also issues with some of osCommerce's file handling functionality
that may allow an attacker to gain access to sensitive data. The osCommerce
team have released updates to address these vulnerabilities and all users are
encouraged to upgrade their osCommerce installations as soon as possible. |
Read This Article
|
Article Read 1561 Times
|

Zen Cart Multiple Vulnerabilities
|
August 15, 2021 |
Zen Cart is a descendant of the popular osCommerce project, and like
osCommerce Zen Cart is one of the most popular open source ecommerce
systems in the world. Unfortunately Zen Cart is vulnerable to quite
a number of different attacks, and in some circumstances may allow an
attacker to execute arbitrary code on the underlying web server with
the rights of the httpd process. In addition to remote code execution
several different SQL Injection attacks may be possible. The Zen Cart
developers have commited fixes for these issues to CVS and an updated
version of Zen Cart will be released soon to address the issues. All
users should upgrade their Zen Cart installation as soon as possible. |
Read This Article
|
Article Read 1685 Times
|

SquirrelMail Arbitrary Variable Overwriting
|
August 11, 2021 |
SquirrelMail is a standards-based webmail package written in php. It includes built-in pure PHP support for the IMAP and SMTP protocols. Unfortunately there is a fairly serious variable handling issue in one of the core SquirrelMail scripts that can allow an attacker to take control of variables used within the script, and influence functions and actions within the script. This is due to the unsafe handling of "expired sessions" when composing a message. An updated version of SquirrelMail can be downloaded from their official website. Users are advised to update their SquirrelMail installations as soon as possible.
|
Read This Article
|
Article Read 1716 Times
|

PHPLib Remote Code Execution
|
March 5, 2022 |
The PHP Base Library aka PHPLib is a toolkit for PHP developers supporting
them in the development of Web applications. The phpLib codebase can be
found in a number of applications available today. Unfortunately some of
the session emulation code is vulnerable to SQL Injection issues that in
a worst case scenario can lead to remote code execution by using UNION and
selecting arbitrary php code into an eval call. A new version og PHPLib has
been released and users should upgrade their PHPLib libraries as soon as
possible.
|
Read This Article
|
Article Read 3724 Times
|

Gallery 2 Multiple Vulnerabilities
|
March 2, 2022 |
Gallery2, the open source web based photo album organizer is
one of the most popular php web applications available today.
Gallery2 suffers from a number of vulnerabilities including
IP Spoofing via X_FORWARDED_FOR that may allow a malicious
user to hide their identity, script injection via the faulty
X_FORWARDED_FOR implementation, and also arbitrary file access
which could ultimately lead to the deletion of arbitrary files
on the webserver. A new version of Gallery 2 has been released
and users should upgrade their Gallery 2 installations. |
Read This Article
|
Article Read 5969 Times
|

phpRPC Library Remote Code Execution
|
February 26, 2022 |
phpRPC is meant to be an easy to use xmlrpc library. phpRPC
is greatly simplified with the use of database/rpc-protocol
abstraction. It should run on any php server with most data
bases. Unfortunately, there is a easily exploitable remote php
code execution vulnerability in the phpRPC library that allows
an attacker to execute arbitrary code on the affected webserver.
This vulnerability, like previously discovered vulnerabilities
in various implementations of the XMLRPC protocol is possible
because of unsanitized data being passed to an eval call. This
of course could ultimately lead to a compromise of the under
lying web server, and disclosure of sensitive data. |
Read This Article
|
Article Read 5981 Times
|

Mambo Multiple Vulnerabilities
|
February 24, 2022 |
Mambo is a popular Open Source Content Management System
released under the GNU General Public license (GNU GPL).
There are a number of security issues in Mambo which allows
for SQL Injection, Authentication Bypass, and possible remote
code execution via local file inclusion. There has been an
updated version of Mambo released and all users are advised
to upgrade as soon as possible. Also, please note that these
vulnerabilities are NOT related to any worms currently taking
advantage of vulnerable Mambo installations. |
Read This Article
|
Article Read 8536 Times
|

PEAR LiveUser File Access Vulnerabilities
|
February 21, 2022 |
LiveUser is a user authentication and permission management
framework that is part of php's PEAR Library. LiveUser has
many different features, including the ability to remember
a user via cookies. Unfortunately there is an issue with
how extracted cookie data is handled by the LiveUser library
within the remember feature which makes it possible for an
attacker to gain access to, and even delete potentially
sensitive files on the webserver. An updated version of the
LiveUser framework has been released, and users are advised
to upgrade to LiveUser 0.16.9
|
Read This Article
|
Article Read 4535 Times
|

Geeklog Remote Code Execution
|
February 19, 2022 |
Geeklog is one of the most popular content management systems
available today. Geeklog unfortunately is vulnerable to a
number of different attacks such as SQL Injection, and
arbitrary file inclusion. These attacks can be combined to
ultimately execute code on the vulnerable web server in a very
reliable manner. According to the developers these issues
affect pretty much every version of Geeklog ever released, so
users are strongly encouraged to upgrade to the latest version
of Geeklog which is Geeklog 1.4.0sr1 and 1.3.11sr4 |
Read This Article
|
Article Read 5905 Times
|

ADOdb Library Cross Site Scripting
|
February 18, 2022 |
ADOdb is a database abstraction library for php used by a
great deal of projects to provide support for a number of
well known database api's. ADOdb also comes with various
functions to perform routine database related tasks. One
of the more useful of these functions is ADOdb's ability
to paginate the retrieved database records by using the
ADODB_Pager class. However, there are several cross site
scripting issues within the ADODB_Pager class that may
allow for an attacker to render malicious client side code
in the victims browser. An updated version of ADOdb has been
released, and users should update their ADOdb library. |
Read This Article
|
Article Read 4632 Times
|

XMB Forums Multiple Vulnerabilities
|
February 12, 2022 |
XMB Forums is a popular forum software written in php and mysql
that allows you to open up your own online community or
messageboard. There are a number of security issues in XMB Forums
that may allow for an attacker to perform SQL injection attacks
or cross site scripting attacks against the vulnerable web
application. These types of attacks may allow for disclosure of
sensitive data such as cookie information or contents from the
underlying database. |
Read This Article
|
Article Read 4955 Times
|

DB_eSession deleteSession() SQL injection
|
February 11, 2022 |
DB_eSession is a feature-packed PHP class that stores the
session data in a MySQL database rather than files. It is
powerful, designed with security in mind, and is easy to
utilize. The DB_eSession library is used in a number of
popular web applications, and private projects alike.
DB_eSession is vulnerable to SQL Injection attacks due to
unsafe use of cookie data in an SQL query, and can allow an
attacker to craft malicious SQL Queries and have them then
successfully executed. |
Read This Article
|
Article Read 4601 Times
|

HiveMail Multiple Vulnerabilities
|
February 10, 2022 |
HiveMail is a powerful web-based email program that allows
you to offer personal email accounts to your visitors. This
makes HiveMail a popular choice for business and individuals
alike. Unfortunately there are a number of remote code
execution vulnerabilities in HiveMail due to unsafe eval
calls that may allow an attacker to compromise the underlying
web server. In addition there are also vulnerabilities that
allow an attacker to perform SQL Injection and Cross Site
Scripting attacks. |
Read This Article
|
Article Read 4810 Times
|

CPAINT AJAX Library Cross Site Scripting
|
February 9, 2022 |
CPAINT (Cross-Platform Asynchronous INterface Toolkit) is a
multi-language toolkit that helps web developers design and
implement AJAX web applications with ease and flexibility.
CPAINT does not sanitize all user supplied data properly
which leads to cross site scripting. This makes not only
CPAINT vulnerable, but the applications that use CPAINT as
a third party library are vulnerable as well. |
Read This Article
|
Article Read 4248 Times
|
eyeOS Remote Code Execution
|
February 7, 2022 |
eyeOS is a "web based operating system" written in php, that lets you
access your data and your applications from anywhere with an internet
connection. There is a very easy to exploit Remote Code Execution
issue in one of the core eyeOS files that affects eyeOS 0.8.9 and
earlier. A new version of eyeOS has been released and all users are
encouraged to upgrade immediately to eyeOS 0.8.10 |
Read This Article
|
Article Read 4250 Times
|

Hurricane Katrina Devestation
|
September 14, 2021 |
As you may or may not know the main offices of GulfTech Research And Development were located off of highway 90 in Gulfport, south of the CSX railroad. Needless to say the area was completely devestated, and my home; which was the central location for most of our business was very heavily damaged. My family and I were in the house when the tidal surge hit us, but everyone is alive and no serious injuries were sustained. According to the Gulfport police officer I talked to yesterday the surge in Gulfport where I lived was close to 37ft high. Everything belonging to the business (as well as almost all of my personal belongings) were destroyed with the exception of a majority of our records etc which were stored in a secure location. Due to the circumstances we will ONLY be offering security services for an undetermined length of time, and any new programming projects will be put on hold until further notice. I am sorry for having to limit our services, but getting my family and my life back to normal is my main concern right now. Thank you for understanding. |
Read This Article
|
Article Read 4382 Times
|

RunCMS Multiple Vulnerabilities
|
August 19, 2021 |
RunCMS is a very popular, full featured content management system based
on the XOOPS content management system. There are a number of fairly
serious vulnerabilities in RunCMS that may allow an attacker to overwrite
very important variables used by RunCMS and conduct SQL Injection attacks.
A new version of RunCMS has been released some time ago, and all users are
advised to upgrade immediately. |
Read This Article
|
Article Read 5705 Times
|

MySQL Eventum Multiple Vulnerabilities
|
July 31, 2021 |
Eventum is a user-friendly and flexible issue tracking system that can
be used by a support department to track incoming technical support
requests, or by a software development team to quickly organize tasks
and bugs. Eventum is used by the MySQL AB Technical Support team.
Unfortunately Eventum is vulnerable to some highly exploitable SQL
Injection issues as well as cross site scripting issues. A new version
of Eventum has been released and users are strongly advised to upgrade
their Eventum installations. |
Read This Article
|
Article Read 6700 Times
|

Kayako LiveResponse Multiple Vulnerabilities
|
July 30, 2021 |
Kayako liveResponse is a web based application aimed at providing live
support for websites and businesses. There are a number of vulnerabilities
in Kayako liveResponse that range from Cross Site Request Forgeries, Cross
Site Scripting, Information Disclosure, Script Injection, and SQL Injection
vulnerabilities which can lead to disclosure of sensitive data. Users are
suggested to update as soon as a secured version becomes available. |
Read This Article
|
Article Read 5318 Times
|
Results 1 - 25 of 25
|
Results per-page: 5 | 10 | 20 | 50
|
|
|