You can use the form below to search our site. Just enter the
keywords to search.
|
|
 |
Title |
Gallery 2 Multiple Vulnerabilities
|
Info |
Gallery2, the open source web based photo album organizer is
one of the most popular php web applications available today.
Gallery2 suffers from a number of vulnerabilities including
IP Spoofing via X_FORWARDED_FOR that may allow a malicious
user to hide their identity, script injection via the faulty
X_FORWARDED_FOR implementation, and also arbitrary file access
which could ultimately lead to the deletion of arbitrary files
on the webserver. A new version of Gallery 2 has been released
and users should upgrade their Gallery 2 installations. |
Date |
March 2, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
phpRPC Library Remote Code Execution
|
Info |
phpRPC is meant to be an easy to use xmlrpc library. phpRPC
is greatly simplified with the use of database/rpc-protocol
abstraction. It should run on any php server with most data
bases. Unfortunately, there is a easily exploitable remote php
code execution vulnerability in the phpRPC library that allows
an attacker to execute arbitrary code on the affected webserver.
This vulnerability, like previously discovered vulnerabilities
in various implementations of the XMLRPC protocol is possible
because of unsanitized data being passed to an eval call. This
of course could ultimately lead to a compromise of the under
lying web server, and disclosure of sensitive data. |
Date |
February 26, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
Mambo Multiple Vulnerabilities
|
Info |
Mambo is a popular Open Source Content Management System
released under the GNU General Public license (GNU GPL).
There are a number of security issues in Mambo which allows
for SQL Injection, Authentication Bypass, and possible remote
code execution via local file inclusion. There has been an
updated version of Mambo released and all users are advised
to upgrade as soon as possible. Also, please note that these
vulnerabilities are NOT related to any worms currently taking
advantage of vulnerable Mambo installations. |
Date |
February 24, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
PEAR LiveUser File Access Vulnerabilities
|
Info |
LiveUser is a user authentication and permission management
framework that is part of php's PEAR Library. LiveUser has
many different features, including the ability to remember
a user via cookies. Unfortunately there is an issue with
how extracted cookie data is handled by the LiveUser library
within the remember feature which makes it possible for an
attacker to gain access to, and even delete potentially
sensitive files on the webserver. An updated version of the
LiveUser framework has been released, and users are advised
to upgrade to LiveUser 0.16.9
|
Date |
February 21, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
Geeklog Remote Code Execution
|
Info |
Geeklog is one of the most popular content management systems
available today. Geeklog unfortunately is vulnerable to a
number of different attacks such as SQL Injection, and
arbitrary file inclusion. These attacks can be combined to
ultimately execute code on the vulnerable web server in a very
reliable manner. According to the developers these issues
affect pretty much every version of Geeklog ever released, so
users are strongly encouraged to upgrade to the latest version
of Geeklog which is Geeklog 1.4.0sr1 and 1.3.11sr4 |
Date |
February 19, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
ADOdb Library Cross Site Scripting
|
Info |
ADOdb is a database abstraction library for php used by a
great deal of projects to provide support for a number of
well known database api's. ADOdb also comes with various
functions to perform routine database related tasks. One
of the more useful of these functions is ADOdb's ability
to paginate the retrieved database records by using the
ADODB_Pager class. However, there are several cross site
scripting issues within the ADODB_Pager class that may
allow for an attacker to render malicious client side code
in the victims browser. An updated version of ADOdb has been
released, and users should update their ADOdb library. |
Date |
February 18, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
XMB Forums Multiple Vulnerabilities
|
Info |
XMB Forums is a popular forum software written in php and mysql
that allows you to open up your own online community or
messageboard. There are a number of security issues in XMB Forums
that may allow for an attacker to perform SQL injection attacks
or cross site scripting attacks against the vulnerable web
application. These types of attacks may allow for disclosure of
sensitive data such as cookie information or contents from the
underlying database. |
Date |
February 12, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
DB_eSession deleteSession() SQL injection
|
Info |
DB_eSession is a feature-packed PHP class that stores the
session data in a MySQL database rather than files. It is
powerful, designed with security in mind, and is easy to
utilize. The DB_eSession library is used in a number of
popular web applications, and private projects alike.
DB_eSession is vulnerable to SQL Injection attacks due to
unsafe use of cookie data in an SQL query, and can allow an
attacker to craft malicious SQL Queries and have them then
successfully executed. |
Date |
February 11, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
HiveMail Multiple Vulnerabilities
|
Info |
HiveMail is a powerful web-based email program that allows
you to offer personal email accounts to your visitors. This
makes HiveMail a popular choice for business and individuals
alike. Unfortunately there are a number of remote code
execution vulnerabilities in HiveMail due to unsafe eval
calls that may allow an attacker to compromise the underlying
web server. In addition there are also vulnerabilities that
allow an attacker to perform SQL Injection and Cross Site
Scripting attacks. |
Date |
February 10, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
CPAINT AJAX Library Cross Site Scripting
|
Info |
CPAINT (Cross-Platform Asynchronous INterface Toolkit) is a
multi-language toolkit that helps web developers design and
implement AJAX web applications with ease and flexibility.
CPAINT does not sanitize all user supplied data properly
which leads to cross site scripting. This makes not only
CPAINT vulnerable, but the applications that use CPAINT as
a third party library are vulnerable as well. |
Date |
February 9, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
eyeOS Remote Code Execution
|
Info |
eyeOS is a "web based operating system" written in php, that lets you
access your data and your applications from anywhere with an internet
connection. There is a very easy to exploit Remote Code Execution
issue in one of the core eyeOS files that affects eyeOS 0.8.9 and
earlier. A new version of eyeOS has been released and all users are
encouraged to upgrade immediately to eyeOS 0.8.10 |
Date |
February 7, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |
Title |
RunCMS Multiple Vulnerabilities
|
Info |
RunCMS is a very popular, full featured content management system based
on the XOOPS content management system. There are a number of fairly
serious vulnerabilities in RunCMS that may allow an attacker to overwrite
very important variables used by RunCMS and conduct SQL Injection attacks.
A new version of RunCMS has been released some time ago, and all users are
advised to upgrade immediately. |
Date |
August 19, 2021 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
MySQL Eventum Multiple Vulnerabilities
|
Info |
Eventum is a user-friendly and flexible issue tracking system that can
be used by a support department to track incoming technical support
requests, or by a software development team to quickly organize tasks
and bugs. Eventum is used by the MySQL AB Technical Support team.
Unfortunately Eventum is vulnerable to some highly exploitable SQL
Injection issues as well as cross site scripting issues. A new version
of Eventum has been released and users are strongly advised to upgrade
their Eventum installations. |
Date |
July 31, 2021 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
Kayako LiveResponse Multiple Vulnerabilities
|
Info |
Kayako liveResponse is a web based application aimed at providing live
support for websites and businesses. There are a number of vulnerabilities
in Kayako liveResponse that range from Cross Site Request Forgeries, Cross
Site Scripting, Information Disclosure, Script Injection, and SQL Injection
vulnerabilities which can lead to disclosure of sensitive data. Users are
suggested to update as soon as a secured version becomes available. |
Date |
July 30, 2021 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
Mozilla XPCOM Library Race Condition
|
Info |
xpcom, or cross platform component object model is a framework for
writing cross-platform, modular software. The xpcom library is used
in many applications including a majority of the popular browsers
such as FireFox, NetScape, Mozilla, Galeon, etc. It seems that
there is a race condition of sorts in xpcom that makes it possible
for an attacker to crash a victims browser by having them view a
malformed html document. This issue is not believed to be exploitable
by the Mozilla dev team, and will likely be addressed in full at a
later date by the development team. |
Date |
July 21, 2021 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
SquirrelMail Arbitrary Variable Overwriting
|
Info |
SquirrelMail is a standards-based webmail package written in php. It
includes built-in pure PHP support for the IMAP and SMTP protocols.
Unfortunately there is a fairly serious variable handling issue in one
of the core SquirrelMail scripts that can allow an attacker to take
control of variables used within the script, and influence functions
and actions within the script. An updated version of SquirrelMail can
be downloaded from their official website. Users are advised to update
their SquirrelMail installations as soon as possible. |
Date |
July 14, 2021 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
Simple Machines Forum SQL Injection
|
Info |
SMF or Simple Machines Forum as it is probably better known as
is a very popular forum system, and developed by members of the
YaBB SE development team. Simple Machine Forums versions prior
to the recently released 1.0.5 are vulnerable to a very serious
SQL Injection hole, as well as a more obscure, harder to exploit
SQL Injection hole. Both vulnerabilities have been resolved and
users should upgrade to the latest version of SMF immediately. |
Date |
July 03, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
PHPXMLRPC Library Remote Code Execution
|
Info |
PHPXMLRPC aka XML-RPC For PHP is a PHP implementation of the XML-RPC
web RPC protocol, and was originally developed by Edd Dumbill of Useful
Information Company. As of the 1.0 stable release, the project has been
opened to wider involvement and moved to SourceForge. PHPXMLRPC is used
in a large number of popular web applications such as PostNuke, Drupal,
b2evolution, and TikiWiki. Unfortunately PHPXMLRPC is vulnerable to a
remote php code execution vulnerability that may be exploited by an
attacker to compromise a vulnerable system. |
Date |
July 02, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
PEAR XML_RPC Library Remote Code Execution
|
Info |
PEAR XML_RPC is a PHP implementation of the XML-RPC web RPC protocol,
and used by many different developers across the world. PEAR XML_RPC
was originally developed by Edd Dumbill of Useful Information Company,
but has since been expanded by several individuals. Unfortunately PEAR
XML_RPC is vulnerable to a remote php code execution vulnerability that
may allow for an attacker to compromise a vulnerable server. Version
1.3.1 has been released to address these issues. |
Date |
July 01, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |

Title |
XOOPS 2.0.11 && Earlier Multiple Vulnerabilities
|
Info |
XOOPS is a very popular dynamic web content management system written
in Object Oriented PHP. One of the features of XOOPS is it's own XMLRPC
server that handles incoming XMLRPC requests. This particular feature
is vulnerable to a highly critical SQL Injection issue. Additionally
there are several cross site scripting issues in XOOPS as well which
could allow for theft of user data or client side code execution in the
context of the victim's web browser. |
Date |
June 29, 2022 |
BID |
Not Available
|
Credit |
James Bercegay |
|
|