Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache roller 5.0.1 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2014-0030
The XML-RPC protocol support in Apache Roller prior to 5.0.3 allows malicious users to conduct XML External Entity (XXE) attacks via unspecified vectors.
Apache Roller 4.0.1
Apache Roller 3.1
Apache Roller 4.0
Apache Roller 5.0
Apache Roller 5.0.1
Apache Roller 5.0.2
1 EDB exploit
NA
CVE-2012-2381
Multiple cross-site scripting (XSS) vulnerabilities in Apache Roller prior to 5.0.1 allow remote authenticated users to inject arbitrary web script or HTML by leveraging the blogger role.
Apache Roller 1.1.2
Apache Roller 1.1.1
Apache Roller 1.1
Apache Roller 1.0.1
Apache Roller 0.9.6
Apache Roller 0.9.5
Apache Roller 3.0
Apache Roller 4.0.1
Apache Roller 2.1.1
Apache Roller 2.0.2
Apache Roller 0.9.9
Apache Roller 0.9.8.2
Apache Roller 0.9.8.1
Apache Roller 0.9.7.2
Apache Roller 2.3
Apache Roller 3.1
Apache Roller 2.0.1
Apache Roller 2.0
Apache Roller 1.2
Apache Roller 1.0
Apache Roller 0.9.7
Apache Roller 0.9.6.3
NA
CVE-2012-2380
Multiple cross-site request forgery (CSRF) vulnerabilities in the admin/editor console in Apache Roller prior to 5.0.1 allow remote malicious users to hijack the authentication of admins or editors by leveraging the HTTP POST functionality.
Apache Roller
Apache Roller 2.3
Apache Roller 1.1.1
Apache Roller 1.1
Apache Roller 1.0.1
Apache Roller 1.0
Apache Roller 2.1.1
Apache Roller 2.0.2
Apache Roller 2.0.1
Apache Roller 2.1
Apache Roller 0.9.8.1
Apache Roller 0.9.7.2
Apache Roller 0.9.7.1
Apache Roller 0.9.7
Apache Roller 3.1
Apache Roller 4.0.1
Apache Roller 2.0
Apache Roller 1.2
Apache Roller 0.9.9
Apache Roller 0.9.6.3
Apache Roller 0.9.5
Apache Roller 4.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started