Security
Headlines
HeadlinesLatestCVEs

Tag

#auth

DiCal-RED 4009 Weak Hashing

DiCal-RED version 4009 has a password that is stored in the file /etc/deviceconfig as a plain MD5 hash, i.e. without any salt or computational cost function.

Packet Storm
#vulnerability#web#mac#linux#auth#wifi
DiCal-RED 4009 Missing Authentication

DiCal-RED version 4009 provides an FTP service on TCP port 21. This service allows anonymous access, i.e. logging in as the user "anonymous" with an arbitrary password. Anonymous users get read access to the whole file system of the device, including files that contain sensitive configuration information, such as /etc/deviceconfig. The respective process on the system runs as the system user "ftp". Therefore, a few files with restrictive permissions are not accessible via FTP.

DiCal-RED 4009 Missing Authentication

DiCal-RED version 4009 provides a Telnet service on TCP port 23. This service grants access to an interactive shell as the system's root user and does not require authentication.

PlantUML 1.2024.6 Cross Site Scripting

PlantUML version 1.2024.6 suffers from a cross site scripting vulnerability.

Crime Complaints Reporting Management System 1.0 Shell Upload

Crime Complaints Reporting Management System version 1.0 suffers from a remote shell upload vulnerability.

Courier Management System 1.0 Cross Site Request Forgery

Courier Management System version 1.0 suffers from a cross site request forgery vulnerability.

Company Visitor Management 1.0 SQL Injection

Company Visitor Management version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

CMSsite 1.0 Shell Upload

CMSsite version 1.0 suffers from a remote shell upload vulnerability.

CMS RIMI 1.3 Cross Site Request Forgery / File Upload

CMS RIMI version 1.3 suffers from cross site request forgery and arbitrary file upload vulnerabilities.

Client Management System 1.0 SQL Injection

Client Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.