Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
citrusdb citrusdb vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2005-0229
CitrusDB 0.3.5 and previous versions stores the newfile.txt temporary data file under the web root, which allows remote malicious users to steal credit card information via a direct request to newfile.txt.
Citrusdb Citrusdb Customer Database 0.3.5
Citrusdb Citrusdb Customer Database 0.3
Citrusdb Citrusdb Customer Database 0.3.1
Citrusdb Citrusdb Customer Database 0.1.2
Citrusdb Citrusdb Customer Database 0.2
Citrusdb Citrusdb Customer Database 0.2.1
1 EDB exploit
7.5
CVSSv2
CVE-2005-0411
Directory traversal vulnerability in index.php for CitrusDB 0.3.6 and previous versions allows remote attackers and local users to include arbitrary PHP files via .. (dot dot) sequences in the load parameter.
Citrusdb Citrusdb
1 EDB exploit
6.4
CVSSv2
CVE-2005-0409
CitrusDB 0.3.6 and previous versions does not verify authorization for the (1) importcc.php and (2) uploadcc.php, which allows remote malicious users to upload credit card data and obtain sensitive information such as the pathnames for temporary files that store credit card data,...
Citrusdb Citrusdb
2 EDB exploits
7.5
CVSSv2
CVE-2005-0408
CitrusDB 0.3.6 and previous versions generates easily predictable MD5 hashes of the user name for the id_hash cookie, which allows remote malicious users to bypass authentication and gain privileges by calculating the MD5 checksum of the user name combined with the "boogaade...
Citrusdb Citrusdb
1 EDB exploit
5
CVSSv2
CVE-2005-0410
SQL injection vulnerability in importcc.php for CitrusDB 0.3.6 and previous versions allows remote malicious users to inject data via the fields of a CSV file.
Citrusdb Citrusdb
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started