Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
imatix vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-6519
Format string vulnerability in Xitami Web Server 2.2a up to and including 2.5c2, and possibly other versions, allows remote malicious users to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in a Long Running Web Process (...
Imatix Xitami 2.4d7
Imatix Xitami 2.5c2
Imatix Xitami 2.5
Imatix Xitami 2.2a
Imatix Xitami 2.4
1 EDB exploit
5
CVSSv2
CVE-2001-0391
Xitami 2.5d4 and previous versions allows remote malicious users to crash the server via an HTTP request to the /aux directory.
Imatix Xitami 2.4d7
Imatix Xitami 2.5d4
4.3
CVSSv2
CVE-2002-1965
Cross-site scripting (XSS) vulnerability in Errors.gsl in Imatix Xitami 2.5b4 and 2.5b5 allows remote malicious users to inject arbitrary web script or HTML via the (1) Javascript events, as demonstrated via an onerror event in an IMG SRC tag or (2) User-Agent field in an HTTP GE...
Imatix Xitami 2.5 B5
Imatix Xitami 2.5 B4
1 EDB exploit
7.5
CVSSv2
CVE-2007-5067
Multiple buffer overflows in iMatix Xitami Web Server 2.5c2 allow remote malicious users to execute arbitrary code via a long If-Modified-Since header to (1) xigui32.exe or (2) xitami.exe.
Imatix Xitami 2.5 C2
2 EDB exploits
5
CVSSv2
CVE-2002-1942
Imatix Xitami 2.5 b5 does not properly terminate certain Keep-Alive connections that have been broken or closed early, which allows remote malicious users to cause a denial of service (crash) via a large number of concurrent sessions.
Imatix Xitami 2.5 B5
5
CVSSv2
CVE-2000-1225
Xitami 2.5b installs the testcgi.exe program by default in the cgi-bin directory, which allows remote malicious users to gain sensitive configuration information about the web server by accessing the program.
Imatix Xitami 2.5 B
10
CVSSv2
CVE-2008-6520
Multiple format string vulnerabilities in the SSI filter in Xitami Web Server 2.5c2, and possibly other versions, allow remote malicious users to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in a URI that ends in (1) .s...
Imatix Xitami 2.5c2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4040
privilege escalation
CVE-2024-4112
CVE-2024-32872
man-in-the-middle
CVE-2024-32788
bypass
CVE-2024-3400
CVE-2024-28976
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started