Multiple Kayako eSupport Vulnerabilities
|
December 18, 2021 |
Kayako eSupport is one of the most feature packed support systems. This program is used by
many online businesses and webhosts to help with technical support and other various
support issues. This application is vulnerable to both Cross Site Scripting and SQL Injection
vulnerabilities. The SQL Injection vulnerabilities are fairly serious and may allow for an
attacker to influence SQL queries. Full details inside. |
Read This Article
|
Article Read 1266 Times
|

Document Object Model Hijacking Explained
|
December 10, 2021 |
The 2004
Merriam-Webster word of the year was “blog�. For those of you that do not know,
blog is short for weblog. Millions of people around the world keep blogs, and
these people are not just limited to the tech savvy crowd. Blogs are not the
only increasingly popular web applications though. Wiki’s for example allow
many users to build an entire community and more by allowing anyone who wants
to contribute, to do so. Security is usually a fairly primary concern in an environment
with many users, and measures such as script filtering are taken to ensure that
no one tries anything “bad�, and that if they do they are unsuccessful in their
attempts. Unfortunately though, a good number of these applications are
susceptible to Document Object Model Hijacking. |
Read This Article
|
Article Read 4058 Times
|

Multiple phpGroupWare Vulnerabilities
|
December 14, 2021 |
phpGroupWare (formerly known as webdistro) is a multi-user
groupware suite written in PHP. It provides a Web-based calendar,
todo-list, addressbook, email, news headlines, and a file manager.
The calendar supports repeating events. The email system supports
inline graphics and file attachments. The system as a whole supports
user preferences, themes, user permissions, multi-language support,
an advanced API, and user groups. There have been a number of vulnerabilities found in phpGroupWare, including Cross Site Scripting, SQL Injection, and Full Path Disclosure. This application comes with some linux distributions, so check to see if you have it installed. The SQL Injection can be fairly critical. |
Read This Article
|
Article Read 1520 Times
|

Multiple Vulnerabilities In SugarCRM
|
December 1, 2021 |
Sugar Sales Professional is the solution for companies who use Sugar Sales in a production environment for
mission-critical sales knowledge management. Sugar Sales Professional is a visible source CRM application
that offers more features than the open source application. It also includes support by SugarCRM staff.
Sugar Sales Professional expands the open source application benefits so that your company experiences better
performance, integration and support. Multiple vulnerabilities (some high risk) have been discovered in SugarCRM.
A recet version was released recently, and was believed to include security fixes, but several of the vulnerabilities
still exist in the recently released version 2.0 |
Read This Article
|
Article Read 1618 Times
|

dbPowerAmp Buffer Overflow And DoS Vulnerabilities
|
September 27, 2021 |
Often called the Swiss Army knife of audio, dMC can digitally
rip sound from audio CDs to a multitude of formats. Convert
from one format to another while preserving ID tags. Nearly
every audio type is supported, including MP3, MP4, Windows Media
Audio (WMA), OGG Vorbis, AAC, Monkey's Audio, and FLAC (with
optional installs from Codec Central). For Windows Explorer
integration, right-click Convert To to pop up useful information
on audio files (such as bit rate and length). Record from LPs with
an optional Auxiliary Input install. dBpowerAmp Audio Player (dAP)
has a digital conditioning equalizer and an advanced music
collection. It's skinnable and has a cross-fader, a playlist
editor, and a tag editor. dAP plays MP3s, WMA, Ogg Vorbis, Monkeys
Audio, Real Audio, WAV, MIDI, and many more. These programs are vulnerable to buffer overflow as well as denial of service vulnerabilities. |
Read This Article
|
Article Read 2698 Times
|

Multiple Vulnerabilities In EmuLive Server4
|
September 20, 2021 |
Server4 is real-time media broadcasting software that works
in conjunction with Emulive producer software to create
digital television-like channels on the Internet. To web
browsers, Server4 appears as a standard web server. Visitors
to a Server4 system can browse and view available channels,
chat with other users, remotely control cameras, remotely
control devices, create user accounts, extend user accounts,
purchase time and access controlled subscriptions, purchase
one-to-one exclusive conferences, tip channel hosts, purchase
additional time and more. Server4 is prone to unauthorized remote administrative access as well as a vulnerability that will allow an attacker to crash a Server4 instalattion remotely. Proof Of Concept code is included. |
Read This Article
|
Article Read 1264 Times
|

When Small Mistakes Can Cause Big Problems
|
September 18, 2021 |
GulfTech Security Research was able to find in the past few weeks, cross site
scripting issues that existed on eBay, Amazon, Half.com, HBO, CareerBuilder,
AOL, CNN, MTV, and many others. The cross site scripting issues on these websites
could allow an attacker to take control of arbitrary accounts, or steal sensitive
info. Websites such as eBay, Amazon, and Half.com (for example) have fairly good
Security when it comes to protecting their user’s accounts, but even they are
vulnerable to data theft via these vulnerabilities. For example, it may be somewhat
useless to steal a victim’s cookie, or try and render malicious code, or force
command execution on a website with tight account security. So instead of relying
on some great technological advantage an attacker could simply attempt to take
advantage of the human element and have the victim simply give the attacker their
account information. This can be done by using the cross site scripting
vulnerabilities to temporarily deface a website. So, instead of rendering malicious
code, or trying to steal a user’s cookie, the attacker can link to an offsite
JavaScript, and have it render a login form using the vulnerable website’s own HTML
and Style Sheet so that it looks nearly identical to the legitimate login form. Of
course when a victim logs in to this form it actually just steals their login
credentials. The attacker could also use the same methods of temporarily defacing
the website to show someone a fictitious news story on a major news website. |
Read This Article
|
Article Read 4785 Times
|

RhinoSoft DNS4ME HTTP Server Vulnerabilities
|
September 16, 2021 |
DNS4Me is the dynamic DNS service that you need to
start hosting your own Internet services. When you have
a dynamic IP address, you need something to associate a
static domain name with it to make it easier for visitors
to access the services you provide. With DNS4Me, you can
take control of your Web site by running your own HTTP
server. Without a hosting company, you've eliminated the
cost of hosting as well as a layer of contact between you
and your Web site. This gives you unparalleled control
overits configuration, content, and delivery. But the
benefits of dynamic DNS aren't just for HTTP servers. Any
service that can make use of a domain name can benefit from
DNS4Me. This includes FTP servers, e-mail servers, daemons
for today's popular computer games, NetMeeting… With the
reliability and excellent support you've come to expect of
RhinoSoft.com backing up DNS4Me, you'll get a powerful, no
hassle dynamic DNS solution. The RhinoSoft DNS4ME HTTP server
is prone to multiple vulnerabilities, and users are encouraged
to upgrade as soon as possible.
|
Read This Article
|
Article Read 1206 Times
|

Multiple Vulnerabilities In phpWebsite
|
August 31, 2021 |
phpWebSite provides a complete web site content management
solution. All client output is valid XHTML 1.0 and meets the
W3C's Web Accessibility Initiative requirements. Currently
features: announcement posting, form generator, user
management with granulated administration, calendar, poll,
faq, photoalbum, bulletin board, rss feeds, user
customizable theme support and more. It is one of the most
popular content managment systems in the world. However, it
is vulnerabile to a number of attacks, some of which allow an
attacker to completely take control of a vulnerable phpWebsite
installation. Other vulnerabilties in phpWebsite include script
injection, SQL injection, forced command execution, and cross
site scripting. A security update is available and all phpWebsite
users should upgrade their installation as soon as possible. |
Read This Article
|
Article Read 4373 Times
|

Multiple Vulnerabilities In Xedus Webserver
|
August 30, 2021 |
Xedus is a Peer-to-Peer web server and provides you with the
ability to share files, music, and any other media, as well
as create robust and dynamic web sites, which can feature
database access, file system access, with full .net support.
Powered by a built in server-side, Microsoft C#, scripting
language; Xedus boasts the ability to create sites that can
rival web applications built on any other enterprise servers
like Apache, IIS, Iplanet… With Xedus, you will never need
to pay to host your sites again. Using the peer-to-peer mode,
other members of LIVE can access you site by keyword using
Internet Explorer even if you do not have a static IP address!
Xedus is prone to a number of vulnerabilities, which include
Denial Of Service, Cross Site Scripting, and Directory Traversal
attacks. These vulnerabilities can allow an attacker to retrieve
arbitrary files from the host machine, as well as deny legitimate
users access to the webserver. |
Read This Article
|
Article Read 890 Times
|

Results 51 - 10 of 10
|
Results per-page: 5 | 10 | 20 | 50
|
|