Inventivetec

Mediacast

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.26%
  • Veröffentlicht 10.05.2011 19:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

MediaCAST 8 and earlier stores passwords in cleartext, which makes it easier for context-dependent attackers to obtain sensitive information by reading an unspecified password data store, a different vulnerability than CVE-2010-0216.

Exploit
  • EPSS 0.47%
  • Veröffentlicht 10.05.2011 19:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The default configuration of the New Atlanta BlueDragon administrative interface in MediaCAST 8 and earlier enables external TCP connections to port 10000, instead of connections only from 127.0.0.1, which makes it easier for remote attackers to have...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 10.05.2011 19:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple cross-site scripting (XSS) vulnerabilities in the New Atlanta BlueDragon administrative interface in MediaCAST 8 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Exploit
  • EPSS 0.53%
  • Veröffentlicht 10.05.2011 19:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

MediaCAST 8 and earlier allows remote attackers to have an unspecified impact via a (1) CP_RIGHTSOURCE or (2) bdclient_Inventive cookie to the default URI under inventivex/managetraining/, related to an "XML injection" issue.

Exploit
  • EPSS 0.42%
  • Veröffentlicht 10.05.2011 19:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple SQL injection vulnerabilities in MediaCAST 8 and earlier allow remote attackers to execute arbitrary SQL commands via (1) a CP_ENLARGESTYLE cookie to the default URI under inventivex/managetraining/ or (2) unspecified input to authenticate_a...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 10.05.2011 19:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

MediaCAST 8 and earlier does not properly handle requests for inventivex/isptools/release/metadata/globalIncludeFolders.txt, which allows remote attackers to obtain sensitive information via unspecified vectors related to the Public/ directory tree.

Exploit
  • EPSS 0.52%
  • Veröffentlicht 10.05.2011 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

authenticate_ad_setup_finished.cfm in MediaCAST 8 and earlier allows remote attackers to discover usernames and cleartext passwords by reading the error messages returned for requests that use the UserID parameter.