Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
open newsletter open newsletter vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2006-6785
The (1) settings.php and (2) subscribers.php scripts in Open Newsletter 2.5 and previous versions do not exit when authentication fails, which allows remote malicious users to perform unauthorized administrative actions, or execute arbitrary code in conjunction with another vulne...
Open Newsletter Open Newsletter 2.0
Open Newsletter Open Newsletter
1 EDB exploit
6.5
CVSSv2
CVE-2006-6786
Open Newsletter 2.5 and previous versions allows remote authenticated administrators to execute arbitrary PHP code by inserting the code into the email parameter to (1) subscribe.php or (2) unsubscribe.php.
Open Newsletter Open Newsletter
Open Newsletter Open Newsletter 2.0
1 EDB exploit
4.3
CVSSv2
CVE-2007-6301
Cross-site scripting (XSS) vulnerability in compose.php in OpenNewsletter 2.5 and previous versions allows remote malicious users to inject arbitrary web script or HTML via the type parameter.
Open Newsletter Open Newsletter
1 EDB exploit
6.8
CVSSv2
CVE-2020-24429
Acrobat Reader DC versions 2020.012.20048 (and previous versions), 2020.001.30005 (and previous versions) and 2017.011.30175 (and previous versions) for macOS are affected by a signature verification bypass that could result in local privilege escalation. Exploitation of this iss...
Adobe Acrobat
Adobe Acrobat Dc
Adobe Acrobat Reader
Adobe Acrobat Reader Dc
4.3
CVSSv2
CVE-2020-24438
Acrobat Reader DC versions 2020.012.20048 (and previous versions), 2020.001.30005 (and previous versions) and 2017.011.30175 (and previous versions) are affected by a use-after-free vulnerability that could result in a memory address leak. Exploitation of this issue requires user...
Adobe Acrobat
Adobe Acrobat Dc
Adobe Acrobat Reader
Adobe Acrobat Reader Dc
5.8
CVSSv2
CVE-2020-24431
Acrobat Reader DC versions 2020.012.20048 (and previous versions), 2020.001.30005 (and previous versions) and 2017.011.30175 (and previous versions) for macOS are affected by a security feature bypass that could result in dynamic library code injection by the Adobe Reader process...
Adobe Acrobat
Adobe Acrobat Dc
Adobe Acrobat Reader
Adobe Acrobat Reader Dc
5.1
CVSSv2
CVE-2020-24428
Acrobat Reader DC versions 2020.012.20048 (and previous versions), 2020.001.30005 (and previous versions) and 2017.011.30175 (and previous versions) for macOS are affected by a time-of-check time-of-use (TOCTOU) race condition vulnerability that could result in local privilege es...
Adobe Acrobat
Adobe Acrobat Dc
Adobe Acrobat Reader
Adobe Acrobat Reader Dc
6.8
CVSSv2
CVE-2020-24430
Acrobat Reader DC versions 2020.012.20048 (and previous versions), 2020.001.30005 (and previous versions) and 2017.011.30175 (and previous versions) are affected by a use-after-free vulnerability when handling malicious JavaScript. This vulnerability could result in arbitrary cod...
Adobe Acrobat
Adobe Acrobat Dc
Adobe Acrobat Reader
Adobe Acrobat Reader Dc
6.8
CVSSv2
CVE-2020-24437
Acrobat Reader DC versions 2020.012.20048 (and previous versions), 2020.001.30005 (and previous versions) and 2017.011.30175 (and previous versions) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execut...
Adobe Acrobat
Adobe Acrobat Dc
Adobe Acrobat Reader
Adobe Acrobat Reader Dc
4.3
CVSSv2
CVE-2020-24426
Acrobat Reader DC versions 2020.012.20048 (and previous versions), 2020.001.30005 (and previous versions) and 2017.011.30175 (and previous versions) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage t...
Adobe Acrobat
Adobe Acrobat Dc
Adobe Acrobat Reader
Adobe Acrobat Reader Dc
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »