Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
aj square aj auction 2.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-6965
AJ Square AJ Auction OOPD, Pro Platinum Skin #1, Pro Platinum Skin #2, and Web 2.0 send a redirect but do not exit when certain scripts are called directly, which allows remote malicious users to bypass authentication via a direct request to (1) site.php, (2) auction.php, (3) mai...
Aj Square Aj Auction 2.0
Aj Square Aj Auction Web 2.0
Aj Square Aj Auction 1.0
Aj Square Aj Auction
1 EDB exploit
NA
CVE-2008-5212
SQL injection vulnerability in classifide_ad.php in AJ Auction 6.2.1 and previous versions allows remote malicious users to execute arbitrary SQL commands via the item_id parameter.
Aj Square Aj Auction 1.0
Aj Square Aj Auction Web 2.0
Aj Square Aj Auction
1 EDB exploit
NA
CVE-2008-6004
Cross-site scripting (XSS) vulnerability in search.php in AJ Auction Pro Platinum 2 allows remote malicious users to inject arbitrary web script or HTML via the product parameter.
Aj Square Aj Auction 2.0
1 EDB exploit
NA
CVE-2008-6414
SQL injection vulnerability in detail.php in AJ Auction Pro Platinum Skin 2 allows remote malicious users to execute arbitrary SQL commands via the item_id parameter.
Aj Square Aj Auction 2.0
1 EDB exploit
NA
CVE-2008-6003
SQL injection vulnerability in sellers_othersitem.php in AJ Auction Pro Platinum 2 allows remote malicious users to execute arbitrary SQL commands via the seller_id parameter.
Aj Square Aj Auction 2.0
1 EDB exploit
NA
CVE-2008-2860
SQL injection vulnerability in category.php in AJSquare AJ Auction Pro web 2.0 allows remote malicious users to execute arbitrary SQL commands via the cate_id parameter.
Aj Square Aj Auction Web 2.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started