Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
please project please vulnerabilities and exploits
(subscribe to this query)
3.3
CVSSv3
CVE-2021-31153
please prior to 0.4 allows a local unprivileged malicious user to gain knowledge about the existence of files or directories in privileged locations via the search_path function, the --check option, or the -d option.
Please Project Please
7.8
CVSSv3
CVE-2021-31154
pleaseedit in please prior to 0.4 uses predictable temporary filenames in /tmp and the target directory. This allows a local malicious user to gain full root privileges by staging a symlink attack.
Pleaseedit Project Pleaseedit
7.8
CVSSv3
CVE-2021-31155
Failure to normalize the umask in please prior to 0.4 allows a local malicious user to gain full root privileges if they are allowed to execute at least one command.
Umask Project Umask
NA
CVE-2009-1580
Session fixation vulnerability in SquirrelMail prior to 1.4.18 allows remote malicious users to hijack web sessions via a crafted cookie.
Squirrelmail Squirrelmail 0.3
Squirrelmail Squirrelmail 0.3.1
Squirrelmail Squirrelmail 1.0.4
Squirrelmail Squirrelmail 1.0.5
Squirrelmail Squirrelmail 1.2.0
Squirrelmail Squirrelmail 1.2.1
Squirrelmail Squirrelmail 1.2.7
Squirrelmail Squirrelmail 1.2.8
Squirrelmail Squirrelmail 1.4.1
Squirrelmail Squirrelmail 1.4.10a
Squirrelmail Squirrelmail 1.4.2
Squirrelmail Squirrelmail 1.4.3
Squirrelmail Squirrelmail 1.4.6
Squirrelmail Squirrelmail 1.0pre3
Squirrelmail Squirrelmail 1.0pre2
Squirrelmail Squirrelmail 0.3pre2
Squirrelmail Squirrelmail 0.4
Squirrelmail Squirrelmail 0.5
Squirrelmail Squirrelmail 1.0.6
Squirrelmail Squirrelmail 1.1.0
Squirrelmail Squirrelmail 1.2.10
Squirrelmail Squirrelmail 1.2.11
NA
CVE-2009-1579
The map_yp_alias function in functions/imap_general.php in SquirrelMail prior to 1.4.18 and NaSMail prior to 1.7 allows remote malicious users to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.
Squirrelmail Squirrelmail 1.4.0 Rc2a
Squirrelmail Squirrelmail 1.4.0
Squirrelmail Squirrelmail 1.3.0
Squirrelmail Squirrelmail 1.3.2
Squirrelmail Squirrelmail 1.2.11
Squirrelmail Squirrelmail 1.2.2
Squirrelmail Squirrelmail 1.0.5
Squirrelmail Squirrelmail 1.0pre2
Squirrelmail Squirrelmail 1.0.1
Squirrelmail Squirrelmail 1.0.2
Squirrelmail Squirrelmail 0.1
Squirrelmail Squirrelmail 0.2.1
Squirrelmail Squirrelmail 0.2
Squirrelmail Squirrelmail 1.4.10
Squirrelmail Squirrelmail 1.4.1
Squirrelmail Squirrelmail 1.2.8
Squirrelmail Squirrelmail 1.2.6
Squirrelmail Squirrelmail 1.2.3
Squirrelmail Squirrelmail 1.2.4
Squirrelmail Squirrelmail 0.1.1
Squirrelmail Squirrelmail 1.4.16
Squirrelmail Squirrelmail 1.1.3
NA
CVE-2009-1581
functions/mime.php in SquirrelMail prior to 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote malicious users to spoof the user interface, and conduct cross-site scripting (XSS) and ph...
Squirrelmail Squirrelmail 1.4.15 Rc1
Squirrelmail Squirrelmail 1.4.0
Squirrelmail Squirrelmail 1.2.9
Squirrelmail Squirrelmail 1.3.2
Squirrelmail Squirrelmail 1.3.1
Squirrelmail Squirrelmail 1.2.2
Squirrelmail Squirrelmail 1.2.1
Squirrelmail Squirrelmail 1.2.0 Rc3
Squirrelmail Squirrelmail 1.0pre2
Squirrelmail Squirrelmail 1.0.4
Squirrelmail Squirrelmail 1.0.2
Squirrelmail Squirrelmail 1.0.3
Squirrelmail Squirrelmail 0.2
Squirrelmail Squirrelmail 0.3.1
Squirrelmail Squirrelmail 1.4.16
Squirrelmail Squirrelmail
Squirrelmail Squirrelmail 1.4.10a
Squirrelmail Squirrelmail 1.4.10
Squirrelmail Squirrelmail 1.4.0 Rc1
Squirrelmail Squirrelmail 1.2.8
Squirrelmail Squirrelmail 1.2.5
Squirrelmail Squirrelmail 1.2.3
NA
CVE-2009-1578
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail prior to 1.4.18 and NaSMail prior to 1.7 allow remote malicious users to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_heade...
Squirrelmail Squirrelmail 1.4.10a
Squirrelmail Squirrelmail 1.4.10
Squirrelmail Squirrelmail 1.2.8
Squirrelmail Squirrelmail 1.2.6
Squirrelmail Squirrelmail 1.2.3
Squirrelmail Squirrelmail 1.2.4
Squirrelmail Squirrelmail 1.1.2
Squirrelmail Squirrelmail 1.1.3
Squirrelmail Squirrelmail 1.0
Squirrelmail Squirrelmail 0.4
Squirrelmail Squirrelmail 0.4pre1
Squirrelmail Squirrelmail 0.4pre2
Squirrelmail Squirrelmail 0.3pre1
Squirrelmail Squirrelmail
Squirrelmail Squirrelmail 1.4.12
Squirrelmail Squirrelmail 1.4.11
Squirrelmail Squirrelmail 1.4
Squirrelmail Squirrelmail 1.2.7
Squirrelmail Squirrelmail 1.4.0 Rc1
Squirrelmail Squirrelmail 1.2
Squirrelmail Squirrelmail 1.2.5
Squirrelmail Squirrelmail 1.2.10
6.5
CVSSv3
CVE-2021-29511
evm is a pure Rust implementation of Ethereum Virtual Machine. Prior to the patch, when executing specific EVM opcodes related to memory operations that use `evm_core::Memory::copy_large`, the `evm` crate can over-allocate memory when it is not needed, making it possible for an m...
Evm Project Evm 0.22.0
Evm Project Evm 0.23.0
Evm Project Evm 0.24.0
Evm Project Evm 0.25.0
Evm Project Evm 0.26.0
Evm Project Evm
9.8
CVSSv3
CVE-2021-41269
cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling malicious users to inject arbitrary Java EL expressions, leading to unauthen...
Cron-utils Project Cron-utils
1 Github repository
4.8
CVSSv3
CVE-2022-39373
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Administrator may store malicious code in entity name. This issue has been patched, ...
Glpi-project Glpi
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »