Search
|
You can use the form below to search our site. Just enter the
keywords to search.
|
|
 |
Title |
Multiple Vulnerabilities In DU Ware Products
|
Info |
DU Ware are a company that offers a very large number of web based applications for both purchase and free download. Their products are vulnerable to a substantial number of attacks, and contain many weaknesses. This includes but is not limited to: Account HiJacking, Code Execution, Arbitrary File Upload, Privilege Escalation and more. There are currently no fixes for these issues, and no patches will be issued. I guess thier customers will have to wait til the new software versions to have thier data and servers be secure.
|
Date |
December 15, 2021 |
BID |
9246
|
Credit |
James Bercegay |
Title |
Security Issues In CGINews And CGIForum
|
Info |
CGINews and CGIForum are two fairly popular scripts by Markus Triska.
CGINews is a multi-user Web site news posting system written in Perl.
And CGIForum is A template based discussion board also written in Perl.
However they both rely on a very weak encryption algorithm that can be
decrypted easily. The author has no plans on switching to a more secure
one way encryption, so if security is a concern try another forum system. |
Date |
December 14, 2021 |
BID |
9214
|
Credit |
James Bercegay |
Title |
osCommerce 2.2-MS1 SQL Injection Vulnerability
|
Info |
osCommerce is one of the most popular Open Source e-commerce solutions in the world today.
It comes with many out of the box features and is constantly being developed by the Open
Source Community. Recently GulfTech Security Research has discovered an SQL Injection vuln
in the create_account_process.php and the account_edit_process.php files. This vulnerability
is present in osCommerce 2.2-MS1 but does not appear to be an issue in osCommerce 2.2-MS2.
Advice to all osCommerce shop owners is to upgrade to the latest version of osCommerce by
clicking here. |
Date |
December 12, 2021 |
BID |
9211
|
Credit |
James Bercegay |
Title |
Multiple Vulnerabilities In Snitz Forums 2000
|
Info |
Snitz forums is a full-featured UBB-style ASP discussion
board application used by thousands of people across the
web. Recently I found many serious vulnerabilities in this
application that may allow an attacker to take over an
entire Snitz forum. The vulnerabilities include cross
site scripting issues, cookie authentication bypass
vulnerability, and a password reset vulnerability. Users
are encouraged to upgrade as soon as possible. |
Date |
June 16, 2022 |
BID |
7922
7924
7925
|
Credit |
James Bercegay |
Title |
Multiple Vulnerabilities In Max Web Portal
|
Info |
MaxWebPortal is a web portal and online community
system which includes advanced features such as
web-based administration, poll, private/public
events calendar, user customizable color themes,
classifieds, user control panel, online pager,
link, file, article, picture managers and much
more. Easy-to-use and powerful user interface
allows members to add news, content, write
reviews and share information among other
registered users. MaxWebPortal has multiple
vulnerabilities which include cross site
scripting, hidden form weaknesses, Database
exposure, and a password reset vulnerability. |
Date |
June 06, 2022 |
BID |
7837
|
Credit |
James Bercegay |
Title |
QPC MegaBrowser Multiple Vulnerabilities
|
Info |
QPC MegaBrowser is a webserver / FTP server in one.
Aimed at home users and small business who would like
to run their own FTP and HTTP servers. However it is
vulnerable to a directory traversal vulnerability
which allows access to any file on the system as well
as directory viewing of the root web directory. There
is also a user enumeration vulnerability in the FTP
server that allows an attacker to enumerate valid
usernames. |
Date |
June 04, 2022 |
BID |
7802
7803
|
Credit |
James Bercegay |
Title |
Vulns In Pablo Software Solutions FTP Service 1.2
|
Info |
FTPService.exe is a service-version of Pablo's FTP Server. This service enables you to have the Pablo FTP server active even when you're not logged into Windows. By default this application is totally open to compromise, and also leaves the users machine open to attacks by allowing access to any file in the C drive. This can be prevented by changing privileges of, or disabling access to the anonymous account. The passwords for Pablo FTP Service are also stored in plaintext, which can definitely be a big threat if the default anonymous account is enabled.
|
Date |
June 03, 2022 |
BID |
7799
7801
|
Credit |
James Bercegay |
Title |
WinMX Plaintext Password Vulnerabilities
|
Info |
WinMX 2.6 is an older version of the popular file
sharing client WinMX. While the current version is
3.31, 2.6 still remains quite popular. Especially
amongst users on private networks. I believe this
is largely due to the fact that 2.6 does not have
the option to output .wsx file (WinMX server list
files) This helps keep the addresses for private
OpenNap servers out of the hands of uninvited users
(amongst other reasons). The problems with WinMX 2.6
is that it provides pretty much NO password protection.
This can be exploited both locally and remotely. Again,
I think all of us have seen the bad habit that most
people have of using the same password for multiple
accounts etc etc. |
Date |
June 02, 2022 |
BID |
7771
|
Credit |
James Bercegay |
Title |
Vulnerabilities In P-Synch Password Management
|
Info |
P-Synch is a total password management solution. It is intended to
reduce the cost of ownership of password systems, and simultaneously
improve the security of password protected systems. This is done
through: Password Synchronization. Enforcing an enterprise wide
password strength policy. Allowing authenticated users to reset their
own forgotten passwords and enable their locked out accounts.
Streamlining help desk call resolution for password resets. P-Synch is
available for both internal use, on the corporate Intranet, as well as
for the Internet deployment in B2B and B2C applications. There are a few
vulnerabilities in P-Synch such as path disclosure, cross site scripting,
and arbitrary file inclusion. Users should upgrade immediately. |
Date |
May 30, 2022 |
BID |
7740
7745
7747
|
Credit |
James Bercegay |
Title |
Invision Board Plaintext Password Vulnerability
|
Info |
Invision Board has been stores restricted forum credentials as plain text
embedded in cookie data. These are the forums where you need a password to
get access into the forum. If the Invision Board admin 'pass protected'
option is activated for a specific forum, on attempted access to the
controlled area, the restricted forum password is stored as plaintext in a
local cookie. This is dangerous because if an attacker can steal the legit
users cookie via cross site scripting or some other method, then they can
gain access to the restricted forum(s). This vulnerability affects all
versions of Invision Power Board. Users should under no circumstances
disclose any sensitive or personal information on these "restricted" forums,
as they are not secure and prone to attack.
|
Date |
April 25, 2022 |
BID |
7440
|
Credit |
James Bercegay |
|
|