store | blogs | forums | twitter | facebook | wiki | downloads | support portal
Atomic Secure Linux
It is currently Sun Nov 17, 2019 9:44 pm

» Feed - Atomicorp

All times are UTC - 5 hours [ DST ]




Post new topic Reply to topic  [ 1 post ] 
Author Message
 Post subject: Threat/Vulnerability report week of May 30 (no action req.)
Unread postPosted: Mon Jun 06, 2016 4:57 pm 
Offline
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
User avatar

Joined: Thu Feb 07, 2008 7:49 pm
Posts: 4087
Location: Chantilly, VA
This report is an analysis of all published vulnerabilities in any product, weaknesses in technologies, exploits Internet wide, current internet threats associated with platforms and products our customer use, and if any action is required to protect their assets from these these vulnerabilities, weaknesses and exploits depending on the Atomicorp product they are using.

Please see this forum post for an explanation of the categories used in this report.

CVEs are sometimes created after a vulnerability is published (sometimes far after it has been made public). When CVEs are referenced, it is because a CVE was created today, not because an issue was resolved today, and it is included here for reference.

ASL users

Summary: No action necessary.

Already protected against/Known Method/No update required

Wordpress Levo-Slideshow 2.3 Shell Upload by Unprivileged user
Levo Slideshow 2.3 Stored XSS Wordpress Plugin *youtube
Joomla Jumi 3.0.5 Cross Site Scripting
WordPress Realia 0.8.5 Cross Site Scripting
PHPList 3.2.4 Cross Site Request Forgery / Cross Site Scripting
CMSimple 4.6.2 Cross Site Scripting
Joomla SecurityCheck 2.8.9 Cross Site Scripting / SQL Injection
WordPress Double Opt-In For Download 2.0.9 SQL Injection
Saudi Softech 5.0.1 Cross Site Scripting / SQL Injection
rConfig 3.1.1 <= 2.0 RCE & AFD & XSS Multiple Vulnerabilities
rConfig LFI
Nagios XI SQL and command injection
CVE-2016-3670 Stored Cross Site Scripting in Liferay CE
Magento 2.0.6 Unserialize Remote Code Execution
WordPress WP Mobile Detector 3.5 Shell Upload
Notilus 2012 R3 SQL Injection
Zoho OpManager Cross Site Request Forgery / Cross Site Scripting
Open Source Real Estate Script 3.6.0 SQL Injection
PHP Real Estate Script 4.9.0 SQL Injection
Joomla Simple Calendar 0.7.6b SQL Injection
Real Estate Portal 4.1 Cross Site Scripting
Real Estate Portal 4.1 Remote Code Execution
EduSec 4.2.5 SQL Injection
Postfix Admin 2.93 Cross Site Request Forgery
WordPress Brafton 3.3.10 Cross Site Scripting
TYPO3 6.2.19 / 7.6.4 RemoveXSS.php Filter Bypass
AjaxExplorer 1.10.3.2 CSRF / XSS / Command Execution
Relay Ajax Directory Manager 1.5.3 File Upload / Command Execution
ProcessMaker 3.0.1.7 Cross Site Request Forgery / Cross Site Scripting
FlatPress 1.0.3 Cross Site Request Forgery / Shell Upload
WordPress Ninja Forms Unauthenticated File Upload
Real Estate Portal 4.1 Remote Code Execution
Open-Xchange OX AppSuite 7.8.0 XSS / Open Redirect
Dounia Creation 1.4 Weak Password / SQL Injection
Oracle ATS Arbitrary File Upload
XenAPI For XenForo 1.4.1 SQL Injection
JobScript Remote Code Execution
WEBONE CMS 6 SQL Injection
Lws-Construction Management 1.0 SQL Injection
Calliope 2.31 Authentication Bypass / SQL Injection
Annuaire de Salon et Foire 1.4 Authentication Bypass / SQL Injection
Sitizy 2.0 Authentication Bypass / SQL Injection
Torop Tourisme 2.0 SQL Injection
Collectd-Web 0.4.0 Cross Site Scripting
Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

None.

Rules only users

Summary: No action necessary.

Already protected against/Known Method/No update required

Wordpress Levo-Slideshow 2.3 Shell Upload by Unprivileged user
Levo Slideshow 2.3 Stored XSS Wordpress Plugin *youtube
Joomla Jumi 3.0.5 Cross Site Scripting
WordPress Realia 0.8.5 Cross Site Scripting
PHPList 3.2.4 Cross Site Request Forgery / Cross Site Scripting
CMSimple 4.6.2 Cross Site Scripting
Joomla SecurityCheck 2.8.9 Cross Site Scripting / SQL Injection
WordPress Double Opt-In For Download 2.0.9 SQL Injection
Saudi Softech 5.0.1 Cross Site Scripting / SQL Injection
rConfig 3.1.1 <= 2.0 RCE & AFD & XSS Multiple Vulnerabilities
rConfig LFI
Nagios XI SQL and command injection
CVE-2016-3670 Stored Cross Site Scripting in Liferay CE
Magento 2.0.6 Unserialize Remote Code Execution
WordPress WP Mobile Detector 3.5 Shell Upload
Notilus 2012 R3 SQL Injection
Zoho OpManager Cross Site Request Forgery / Cross Site Scripting
Open Source Real Estate Script 3.6.0 SQL Injection
PHP Real Estate Script 4.9.0 SQL Injection
Joomla Simple Calendar 0.7.6b SQL Injection
Real Estate Portal 4.1 Cross Site Scripting
Real Estate Portal 4.1 Remote Code Execution
EduSec 4.2.5 SQL Injection
Postfix Admin 2.93 Cross Site Request Forgery
WordPress Brafton 3.3.10 Cross Site Scripting
TYPO3 6.2.19 / 7.6.4 RemoveXSS.php Filter Bypass
AjaxExplorer 1.10.3.2 CSRF / XSS / Command Execution
Relay Ajax Directory Manager 1.5.3 File Upload / Command Execution
ProcessMaker 3.0.1.7 Cross Site Request Forgery / Cross Site Scripting
FlatPress 1.0.3 Cross Site Request Forgery / Shell Upload
WordPress Ninja Forms Unauthenticated File Upload
Real Estate Portal 4.1 Remote Code Execution
Open-Xchange OX AppSuite 7.8.0 XSS / Open Redirect
Dounia Creation 1.4 Weak Password / SQL Injection
Oracle ATS Arbitrary File Upload
XenAPI For XenForo 1.4.1 SQL Injection
JobScript Remote Code Execution
WEBONE CMS 6 SQL Injection
Lws-Construction Management 1.0 SQL Injection
Calliope 2.31 Authentication Bypass / SQL Injection
Annuaire de Salon et Foire 1.4 Authentication Bypass / SQL Injection
Sitizy 2.0 Authentication Bypass / SQL Injection
Torop Tourisme 2.0 SQL Injection
Collectd-Web 0.4.0 Cross Site Scripting

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

None.

_________________
Michael Shinn
Atomicorp - Security For Everyone


Top
 Profile  
Reply with quote  
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 1 post ] 

» Feed - Atomicorp

All times are UTC - 5 hours [ DST ]


Who is online

Users browsing this forum: No registered users and 3 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group