Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jouko pynnonen vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0025
Multiple SQL injection vulnerabilities in IMP 2.2.8 and previous versions allow remote malicious users to perform unauthorized database activities and possibly gain privileges via certain database functions such as check_prefs() in db.pgsql, as demonstrated using mailbox.php3.
Horde Imp 2.2
Horde Imp 2.2.7
Horde Imp 2.2.8
Horde Imp 2.2.1
Horde Imp 2.2.2
Horde Imp 2.2.3
Horde Imp 2.2.4
Horde Imp 2.2.5
Horde Imp 2.2.6
NA
CVE-2003-0113
Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote malicious users to execute arbitrary code via an HTTP response containing long values in (1) Content-type and (2) Content-encoding fields.
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
1 EDB exploit
NA
CVE-2004-1029
The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote malicious users to load unsafe classes and execute...
Hp Java Sdk-rte 1.3
Sun Jdk 1.3.1 02
Sun Jdk 1.3.1 03
Sun Jdk 1.3.1 06
Sun Jdk 1.4.0 02
Sun Jdk 1.4.0 03
Sun Jdk 1.4.1
Sun Jdk 1.4.1 03
Sun Jdk 1.4.2 03
Sun Jdk 1.4
Sun Jre 1.3.0
Sun Jre 1.3.1
Sun Jre 1.3.1 02
Sun Jre 1.3.1 05
Sun Jre 1.3.1 06
Sun Jre 1.3.1 09
Sun Jre 1.4.0 03
Sun Jre 1.4.1
Sun Jre 1.4.1 07
Sun Jre 1.4.2
Conectiva Linux 10.0
Sun Jdk 1.3.1 05
1 EDB exploit
NA
CVE-2001-0722
Internet Explorer 5.5 and 6.0 allows remote malicious users to read and modify user cookies via Javascript in an about: URL, aka the "First Cookie Handling Vulnerability."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2001-0034
KTH Kerberos IV allows local users to specify an alternate proxy using the krb4_proxy variable, which allows the user to generate false proxy responses and possibly gain privileges.
Kth Kth Kerberos
1 EDB exploit
NA
CVE-2004-2280
Buffer overflow in IBM Lotus Notes 6.5.x prior to 6.5.3 and 6.0.x prior to 6.0.5 allows remote malicious users to cause a denial of service (crash) via unknown vectors related to Java applets, as identified by KSPR62F4KN.
Ibm Lotus Notes 6.0.5
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.4
Ibm Lotus Notes 6.5.3
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.0.3
1 EDB exploit
NA
CVE-2015-2314
SQL injection vulnerability in the WPML plugin prior to 3.1.9 for WordPress allows remote malicious users to execute arbitrary SQL commands via the lang parameter in the HTTP Referer header in a wp-link-ajax action to comments/feed.
Wpml Wpml
1 EDB exploit
NA
CVE-2015-2315
Cross-site scripting (XSS) vulnerability in the WPML plugin prior to 3.1.9 for WordPress allows remote malicious users to inject arbitrary web script or HTML via the target parameter in a reminder_popup action to the default URI.
Wpml Wpml
1 EDB exploit
1 Github repository
NA
CVE-2015-2791
The "menu sync" function in the WPML plugin prior to 3.1.9 for WordPress allows remote malicious users to delete arbitrary posts, pages, and menus via a crafted request to sitepress-multilingual-cms/menu/menus-sync.php.
Wpml Wpml
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started