Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
nuked-klan nuked-klan vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1419
SQL injection vulnerability in the Calendar module in nuked-klan 1.7.5 and previous versions allows remote malicious users to execute arbitrary SQL commands via the m parameter to index.php.
Nuked-klan Nuked-klan 1.2
Nuked-klan Nuked-klan 1.4
Nuked-klan Nuked-klan 1.2 Beta
Nuked-klan Nuked-klan 1.3
Nuked-klan Nuked-klan 1.5
Nuked-klan Nuked-klan 1.7
Nuked-klan Nuked-klan 1.5 Sp2
Nuked-klan Nuked-klan 1.3 Beta
Nuked-klan Nuked-klan
1 EDB exploit
NA
CVE-2007-0083
Cross-site scripting (XSS) vulnerability in Nuked Klan 1.7 and previous versions allows remote malicious users to inject arbitrary web script or HTML via a javascript: URI in a getURL statement in a .swf file, as demonstrated by "Remote Cookie Disclosure." NOTE: it coul...
Nuked-klan Nuked-klan 1.2
Nuked-klan Nuked-klan 1.4
Nuked-klan Nuked-klan 1.2 Beta
Nuked-klan Nuked-klan 1.3
Nuked-klan Nuked-klan 1.5
Nuked-klan Nuked-klan 1.7
Nuked-klan Nuked-klan 1.5 Sp2
Nuked-klan Nuked-klan 1.3 Beta
NA
CVE-2004-1937
Multiple directory traversal vulnerabilities in Nuked-KlaN 1.4b and 1.5b allow remote malicious users to read or include arbitrary files via .. sequences in (1) the user_langue parameter to index.php or (2) the langue parameter to update.php, or modify arbitrary GLOBAL variables ...
Nuked-klan Nuked-klan 1.2
Nuked-klan Nuked-klan 1.4
Nuked-klan Nuked-klan 1.2 Beta
Nuked-klan Nuked-klan 1.3
Nuked-klan Nuked-klan 1.5
Nuked-klan Nuked-klan 1.5 Sp2
Nuked-klan Nuked-klan 1.3 Beta
1 EDB exploit
NA
CVE-2003-1238
Cross-site scripting vulnerability (XSS) in Nuked-Klan 1.3 beta and previous versions allows remote malicious users to steal authentication information via cookies by injecting arbitrary HTML or script into op of the (1) Team, (2) News, and (3) Liens modules.
Nuked-klan Nuked-klan 1.2
Nuked-klan Nuked-klan 1.2 Beta
Nuked-klan Nuked-klan 1.3
Nuked-klan Nuked-klan 1.3 Beta
NA
CVE-2006-3479
Cross-site request forgery (CSRF) vulnerability in the del_block function in modules/Admin/block.php in Nuked-Klan 1.7.5 and previous versions and 1.7 SP4.2 allows remote malicious users to delete arbitrary "blocks" via a link with a modified bid parameter in a del_bloc...
Nuked-klan Nuked-klan 1.7 Sp4.2
Nuked-klan Nuked-klan
NA
CVE-2007-2556
SQL injection vulnerability in Nuked-klaN 1.7.6 allows remote malicious users to execute arbitrary SQL commands via the X-Forwarded-For (X_FORWARDED_FOR) HTTP header, as demonstrated by a request to the /nk/ URI.
Nuked-klan Nuked-klan 1.7.6
2 EDB exploits
NA
CVE-2007-6090
Cross-site scripting (XSS) vulnerability in index.php in Nuked-Klan 1.7.5 allows remote malicious users to inject arbitrary web script or HTML via the file parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information...
Nuked-klan Nuked-klan 1.7.5
NA
CVE-2005-3305
Multiple SQL injection vulnerabilities in Nuked Klan 1.7 allow remote malicious users to execute arbitrary SQL commands via the (1) forum_id or (2) thread_id parameter in the Forum file, (3) the link_id in the Links file, (4) the artid parameter in the Sections file, and (5) the ...
Nuked-klan Nuked-klan 1.7
4 EDB exploits
NA
CVE-2005-3436
Cross-site scripting (XSS) vulnerability in Nuked-Klan 1.7 allows remote malicious users to inject arbitrary web script or HTML via the (1) Search module, (2) certain edit fields in Guestbook, (3) the title in the Forum module, and (4) Textbox.
Nuked-klan Nuked-klan 1.7
NA
CVE-2006-0506
Cross-site scripting (XSS) vulnerability in index.php in Nuked-klaN 1.7 allows remote malicious users to inject arbitrary web script or HTML via the letter parameter.
Nuked-klan Nuked-klan 1.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »