Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
open source development network slashcode 2.2.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2002-1748
Unknown vulnerability in Slash 2.1.x and 2.2 up to and including 2.2.2, as used in Slashcode, allows remote authenticated users to gain access to arbitrary accounts.
Open Source Development Network Slashcode 2.2.2
Open Source Development Network Slashcode 2.1
Open Source Development Network Slashcode 2.1.1
Open Source Development Network Slashcode 2.2
Open Source Development Network Slashcode 2.2.1
6.8
CVSSv2
CVE-2002-1681
Cross-site scripting (XSS) vulnerability in Slashcode CVS releases June 17 through July 1 2002 allows remote malicious users to execute arbitrary script as other users by injecting script into the paragraph <P> tag.
Open Source Development Network Slashcode 2.2.2
Open Source Development Network Slashcode 2.2.3
Open Source Development Network Slashcode 2.2.4
Open Source Development Network Slashcode 2.2.5
Open Source Development Network Slashcode 2.2.1
2.6
CVSSv2
CVE-2002-0292
Cross-site scripting vulnerability in Slash prior to 2.2.5, as used in Slashcode and elsewhere, allows remote malicious users to steal cookies and authentication information from other users via Javascript in a URL, possibly in the formkey field.
Open Source Development Network Slashcode 2.1
Open Source Development Network Slashcode 2.1.1
Open Source Development Network Slashcode 2.0
Open Source Development Network Slashcode 2.2.2
Open Source Development Network Slashcode 2.2.3
Open Source Development Network Slashcode 2.2.4
Open Source Development Network Slashcode
Open Source Development Network Slashcode 2.2
Open Source Development Network Slashcode 2.2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started