Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
middlebury college segue cms vulnerabilities and exploits
(subscribe to this query)
5.1
CVSSv2
CVE-2006-5722
Multiple PHP remote file inclusion vulnerabilities in Segue CMS 1.5.9 and previous versions, when magic_quotes_gpc is enabled, allow remote malicious users to execute arbitrary PHP code via a URL in the theme parameter to (1) themesettings.php or (2) index.php, a different vector...
Middlebury College Segue Cms 1.5.8
Middlebury College Segue Cms
Middlebury College Segue Cms 1.3.5
Middlebury College Segue Cms 1.5.7
1 EDB exploit
7.5
CVSSv2
CVE-2005-4814
Unrestricted file upload vulnerability in Segue CMS prior to 1.3.6, when the Apache HTTP Server handles .phtml files with the PHP interpreter, allows remote malicious users to upload and execute arbitrary PHP code by placing .phtml files in the userfiles/ directory.
Middlebury College Segue Cms
7.5
CVSSv2
CVE-2006-5490
Multiple SQL injection vulnerabilities in Segue Content Management System (CMS) prior to 1.5.8 allow remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Middlebury College Segue Cms
7.5
CVSSv2
CVE-2006-5498
Directory traversal vulnerability in themes/program/themesettings.inc.php in Segue CMS 1.5.8 and previous versions allows remote malicious users to include and execute arbitrary local files via a .. (dot dot) in the theme parameter.
Middlebury College Segue Cms
7.5
CVSSv2
CVE-2006-5497
PHP remote file inclusion vulnerability in themes/program/themesettings.inc.php in Segue CMS 1.5.8 and previous versions, when register_globals is enabled, allows remote malicious users to execute arbitrary PHP code via a URL in the themesdir parameter.
Middlebury College Segue Cms
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
XXE
CVE-2024-34490
SQL injection
CVE-2024-34488
CVE-2024-4507
CVE-2023-7028
CVE-2024-23187
TCP
CVE-2024-4439
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started