store | blogs | forums | twitter | facebook | wiki | downloads | support portal
Atomic Secure Linux
It is currently Sat Aug 24, 2019 7:24 am

» Feed - Atomicorp

All times are UTC - 5 hours [ DST ]




Post new topic Reply to topic  [ 1 post ] 
Author Message
 Post subject: Threat/Vulnerability report week of July 4 (no action req.)
Unread postPosted: Tue Jul 12, 2016 6:58 pm 
Offline
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
User avatar

Joined: Thu Feb 07, 2008 7:49 pm
Posts: 4082
Location: Chantilly, VA
This report is an analysis of all published vulnerabilities in any product, weaknesses in technologies, exploits Internet wide, current internet threats associated with platforms and products our customer use, and if any action is required to protect their assets from these these vulnerabilities, weaknesses and exploits depending on the Atomicorp product they are using.

Please see this forum post for an explanation of the categories used in this report.

CVEs are sometimes created after a vulnerability is published (sometimes far after it has been made public). When CVEs are referenced, it is because a CVE was created today, not because an issue was resolved today, and it is included here for reference.

ASL users

Summary: No action necessary.

Already protected against/Known Method/No update required

OpenFire 4.0.1 Cross Site Request Forgery / Cross Site Scripting
eCardMAX 10.5 Cross Site Scripting / SQL Injection
Nagios XI Chained Remote Code Execution
WebCalendar 1.2.7 PHP Code Injection
Ktools Photostore 4.7.5 Blind SQL Injection
AWBS 2.9.6 SQL Injection / Cross Site Scripting
Tiki Wiki 15.1 Unauthenticated File Upload
WordPress Easy Forms For MailChimp 6.0.5.5 Local File Inclusion
WordPress WP Fastest Cache 0.8.5.9 Local File Inclusion
WordPress Profile Builder 2.4.0 Cross Site Scripting
WordPress Master Slider 2.7.1 Cross Site Scripting
WordPress Email Users 4.8.2 Cross Site Scripting
WordPress WP Job Manager 1.25 Shell Upload
Clinic Management System Blind SQL Injection
Beauty Parlour And SPA Saloon Management System SQL Injection
WordPress All In One SEO Pack 2.3.6.1 Cross Site Scripting
Tiki Wiki CMS 15.0 Arbitrary File Download
WordPress Activity Log 2.3.1 Persistent Cross Site Scripting
WordPress Live Chat Support 6.2.00 Cross Site Scripting
Joomla Branch 3.0 SQL Injection
The Realm / Dashgum Software CMS 1.0.1 SQL Injection
Joomla XMap 2.3.4 SQL Injection
MoneyTrackin Cross Site Scripting
LearnVest Cross Site Scripting
Joomla Forms 1.3.1 SQL Injection
Joomla Services SQL Injection
MetInfo 5.0.4 SQL Injection
Ersoft CMS 1.0 SQL Injection
WordPress Ultimate Member 1.3.64 Local File Inclusion
Joomla Threate 1.1.4 SQL Injection
Streamo Online Radio / TV Streaming CMS SQL Injection
PHP Real Estate Script 3 Arbitrary File Disclosure
Joomla Topics 1.5.12 SQL Injection
WordPress Lazy Content Slider 3.4 Cross Site Request Forgery
IPS Community Suite 4.1.12.3 PHP Code Injection
Simpla Admin 1.02 Shell Upload / SQL Injection
OPAC KpwinSQL Cross Site Scripting / Local File Inclusion
Micron CMS 5.3 SQL Injection
WordPress CodeCanyon Real3D FlipBook 2.18.8 File Deletion / Upload / XSS
WSPHP CMS 1.6.995 Cross Site Scripting
WebCalendar 1.2.7 PHP Code Injection
24 Online 8.3.7 Build 9.0 SQL Injection
Joomla SmartFormer 2.4.1 Shell Upload
WordPress Ultimate Membership Pro 3.3 SQL Injection
Concrete5 5.7.3.1 Local File Inclusion and XSS
Alfine CMS 2.6 SQL Injection
Mutualaid CMS 4.3.1 SQL Injection
Riverbed SteelCentral NetProfiler/NetExpress Remote Code Execution


Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

None.

Rules only users

Summary: No action necessary.

Already protected against/Known Method/No update required

OpenFire 4.0.1 Cross Site Request Forgery / Cross Site Scripting
eCardMAX 10.5 Cross Site Scripting / SQL Injection
WebCalendar 1.2.7 PHP Code Injection
Ktools Photostore 4.7.5 Blind SQL Injection
Nagios XI Chained Remote Code Execution
AWBS 2.9.6 SQL Injection / Cross Site Scripting
Tiki Wiki 15.1 Unauthenticated File Upload
WordPress Easy Forms For MailChimp 6.0.5.5 Local File Inclusion
WordPress WP Fastest Cache 0.8.5.9 Local File Inclusion
WordPress Profile Builder 2.4.0 Cross Site Scripting
WordPress Master Slider 2.7.1 Cross Site Scripting
WordPress Email Users 4.8.2 Cross Site Scripting
WordPress WP Job Manager 1.25 Shell Upload
Clinic Management System Blind SQL Injection
Beauty Parlour And SPA Saloon Management System SQL Injection
WordPress All In One SEO Pack 2.3.6.1 Cross Site Scripting
Tiki Wiki CMS 15.0 Arbitrary File Download
WordPress Activity Log 2.3.1 Persistent Cross Site Scripting
WordPress Live Chat Support 6.2.00 Cross Site Scripting
Joomla Branch 3.0 SQL Injection
The Realm / Dashgum Software CMS 1.0.1 SQL Injection
Joomla XMap 2.3.4 SQL Injection
MoneyTrackin Cross Site Scripting
LearnVest Cross Site Scripting
Joomla Forms 1.3.1 SQL Injection
Joomla Services SQL Injection
MetInfo 5.0.4 SQL Injection
Ersoft CMS 1.0 SQL Injection
WordPress Ultimate Member 1.3.64 Local File Inclusion
Joomla Threate 1.1.4 SQL Injection
Streamo Online Radio / TV Streaming CMS SQL Injection
PHP Real Estate Script 3 Arbitrary File Disclosure
Joomla Topics 1.5.12 SQL Injection
WordPress Lazy Content Slider 3.4 Cross Site Request Forgery
IPS Community Suite 4.1.12.3 PHP Code Injection
Simpla Admin 1.02 Shell Upload / SQL Injection
OPAC KpwinSQL Cross Site Scripting / Local File Inclusion
Micron CMS 5.3 SQL Injection
WordPress CodeCanyon Real3D FlipBook 2.18.8 File Deletion / Upload / XSS
WSPHP CMS 1.6.995 Cross Site Scripting
WebCalendar 1.2.7 PHP Code Injection
24 Online 8.3.7 Build 9.0 SQL Injection
Joomla SmartFormer 2.4.1 Shell Upload
WordPress Ultimate Membership Pro 3.3 SQL Injection
Concrete5 5.7.3.1 Local File Inclusion and XSS
Alfine CMS 2.6 SQL Injection
Mutualaid CMS 4.3.1 SQL Injection
Riverbed SteelCentral NetProfiler/NetExpress Remote Code Execution

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

None.

_________________
Michael Shinn
Atomicorp - Security For Everyone


Top
 Profile  
Reply with quote  
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 1 post ] 

» Feed - Atomicorp

All times are UTC - 5 hours [ DST ]


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group