Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2021-26723
Disclosure Date: February 06, 2021 (last updated February 22, 2025)
Jenzabar 9.2.x through 9.2.2 allows /ics?tool=search&query= XSS.
0
Attacker Value
Unknown
CVE-2020-8434
Disclosure Date: May 19, 2020 (last updated February 21, 2025)
Jenzabar JICS (aka Internet Campus Solution) before 9.0.1 Patch 3, 9.1 before 9.1.2 Patch 2, and 9.2 before 9.2.2 Patch 8 has session cookies that are a deterministic function of the username. There is a hard-coded password to supply a PBKDF feeding into AES to encrypt a username and base64 encode it to a client-side cookie for persistent session authentication. By knowing the key and algorithm, an attacker can select any username, encrypt it, base64 encode it, and save it in their browser with the correct JICSLoginCookie cookie format to impersonate any real user in the JICS database without the need for authenticating (or verifying with MFA if implemented).
0
Attacker Value
Unknown
CVE-2019-10011
Disclosure Date: March 25, 2019 (last updated November 08, 2023)
ICS/StaticPages/AddTestUsers.aspx in Jenzabar JICS (aka Internet Campus Solution) before 2019-02-06 allows remote attackers to create an arbitrary number of accounts with a password of 1234.
0
Attacker Value
Unknown
CVE-2019-10012
Disclosure Date: March 25, 2019 (last updated November 08, 2023)
Jenzabar JICS (aka Internet Campus Solution) before 9 allows remote attackers to upload and execute arbitrary .aspx code by placing it in a ZIP archive and using the MoxieManager (for .NET) plugin before 2.1.4 in the moxiemanager directory within the installation folder ICS\ICS.NET\ICSFileServer.
0
Attacker Value
Unknown
CVE-2018-16778
Disclosure Date: December 21, 2018 (last updated November 27, 2024)
Cross-site scripting (XSS) vulnerability in Jenzabar v8.2.1 through 9.2.0 allows remote attackers to inject arbitrary web script or HTML via the query parameter (aka the Search Field).
0