Search | Research | Contact Us Tuesday January 17, 2022
Languages
Most Viewed Items
  1 PHPXMLRPC Library Remote Code Execution
  2 Multiple Invision Power Board Vulnerabilities
  3 eBay And Amazon Still Vulnerable
  4 XOOPS 2.0.11 && Earlier Multiple Vulnerabilities
  5 Woltlab Burning Board SQL Injection Vulnerability
  6 When Small Mistakes Can Cause Big Problems
  7 Multiple Vulnerabilities In phpWebsite
  8 Critical Vulnerability In Help Center Live
  9 dbPowerAmp Buffer Overflow And DoS Vulnerabilities
10 Document Object Model Hijacking Explained
Need Secure Code?
Quick Search
You can use the form below to search our site. Just enter the keywords to search.
Home Services Archives Research Downloads Contact
JpegX Password Bypass Vulnerability
April 20, 2022
Vendor : NerdLogic
URL : http://nerdlogic.org/jpegx/index.html
Version : Jpegx 2.0.3
Risk : Password Bypass Vulnerability
BID : http://www.securityfocus.com/bid/7298


Description:
Jpegx is a modern day application of steganography. It will encrypt and hide messages in jpeg files to provide ample medium for sending secure information. The images remain visually unchanged but the code inside is altered to hide your message. Anyone with the Jpegx program could read your message as long as they know the password that you encrypted it with.


Password Bypass Vulnerability:
JpegX is prone to a password bypass vulnerability. When no password credentials are supplied if using the JpegX wizard to decrypt, encrypted data contained in JPEG files JpegX will decipher the file regardless. This vulnerability may lead to sensitive information disclosure. Users should upgrade immediately.


Credits:
James Bercegay of the GulfTech Security Research Team.