Summary
Detail | |||
---|---|---|---|
Vendor | Oneorzero | First view | 2003-06-09 |
Product | Oneorzero Helpdesk | Last view | 2009-03-12 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5 | 2009-03-12 | CVE-2009-0886 | Directory traversal vulnerability in login.php in OneOrZero Helpdesk 1.6.5.7 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the default_language parameter. |
4.3 | 2007-10-30 | CVE-2007-5727 | Incomplete blacklist vulnerability in the stripScripts function in common.php in OneOrZero Helpdesk 1.6.5.4, 1.6.4.2, and possibly other versions, allows remote attackers to conduct cross-site scripting (XSS) attacks and inject arbitrary web script or HTML via XSS sequences without SCRIPT tags in the description parameter to (1) tcreate.php or (2) tupdate.php, as demonstrated using an onmouseover event in a b tag. |
7.5 | 2006-10-24 | CVE-2006-5474 | The "forgot password" function in OneOrZero Helpdesk before 1.6.5.4 generates insecure passwords by concatenating the current timestamp with the username, which allows remote attackers to gain access as an arbitrary user by requesting a password reset. |
10 | 2003-06-09 | CVE-2003-0304 | one||zero (aka One or Zero) Helpdesk 1.4 rc4 allows remote attackers to create administrator accounts by directly calling the install.php Helpdesk Installation script. |
5 | 2003-06-09 | CVE-2003-0303 | SQL injection vulnerability in one||zero (aka One or Zero) Helpdesk 1.4 rc4 allows remote attackers to modify arbitrary ticket number descriptions via the sg parameter. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
50% (1) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
50% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-6 | Argument Injection |
CAPEC-15 | Command Delimiters |
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-19 | Embedding Scripts within Scripts |
CAPEC-32 | Embedding Scripts in HTTP Query Strings |
CAPEC-43 | Exploiting Multiple Input Interpretation Layers |
CAPEC-56 | Removing/short-circuiting 'guard logic' |
CAPEC-63 | Simple Script Injection |
CAPEC-71 | Using Unicode Encoding to Bypass Validation Logic |
CAPEC-73 | User-Controlled Filename |
CAPEC-80 | Using UTF-8 Encoding to Bypass Validation Logic |
CAPEC-85 | Client Network Footprinting (using AJAX/XSS) |
CAPEC-86 | Embedding Script (XSS ) in HTTP Headers |
CAPEC-91 | XSS in IMG Tags |
CAPEC-106 | Cross Site Scripting through Log Files |
CAPEC-163 | Spear Phishing |
CAPEC-198 | Cross-Site Scripting in Error Pages |
CAPEC-199 | Cross-Site Scripting Using Alternate Syntax |
CAPEC-209 | Cross-Site Scripting Using MIME Type Mismatch |
CAPEC-232 | Exploitation of Privilege/Trust |
CAPEC-243 | Cross-Site Scripting in Attributes |
CAPEC-244 | Cross-Site Scripting via Encoded URI Schemes |
CAPEC-245 | Cross-Site Scripting Using Doubled Characters, e.g. %3C%3Cscript |
CAPEC-246 | Cross-Site Scripting Using Flash |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
52709 | OneOrZero Helpdesk login.php default_language Parameter Traversal Arbitrary F... |
38836 | OneOrZero Helpdesk tupdate.php description Parameter XSS |
38215 | OneOrZero Helpdesk tcreate.php description Parameter XSS |
29979 | OneOrZero Helpdesk Password Reset Predictable Password Generation |
11644 | one||zero Helpdesk install.php Arbitrary Admin Account Creation |
10102 | OneOrZero Helpdesk tupdate.php sg Parameter SQL injection |
OpenVAS Exploits
id | Description |
---|---|
2009-03-10 | Name : OneOrZero Helpdesk 'login.php' Local File Include Vulnerability File : nvt/OneOrZero_helpdesk_local_file_include.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2009-03-09 | Name: The remote web server contains a PHP script that is affected by a local file ... File: oneorzero_default_language_lfi.nasl - Type: ACT_ATTACK |
2003-05-21 | Name: The remote host has an application that is affected by a SQL injection vulner... File: oneorzero_flaws.nasl - Type: ACT_GATHER_INFO |