Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xoops xoops 1.3.5 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2003-1453
Cross-site scripting (XSS) vulnerability in the MytextSanitizer function in XOOPS 1.3.5 up to and including 1.3.9 and XOOPS 2.0 up to and including 2.0.1 allows remote malicious users to inject arbitrary web script or HTML via a javascript: URL in an IMG tag.
Xoops Xoops 2.0.1
Xoops Xoops 1.3.9
Xoops Xoops 2.0
Xoops Xoops 1.3.5
Xoops Xoops 1.3.6
Xoops Xoops 1.3.7
Xoops Xoops 1.3.8
1 EDB exploit
7.5
CVSSv2
CVE-2005-0743
The custom avatar uploading feature (uploader.php) for XOOPS 2.0.9.2 and previous versions allows remote malicious users to upload arbitrary PHP scripts, whose file extensions are not filtered.
Xoops Xoops 1.0 Rc1
Xoops Xoops 1.0 Rc3
Xoops Xoops 1.3.9
Xoops Xoops 2.0
Xoops Xoops 1.3.5
Xoops Xoops 1.3.6
Xoops Xoops 2.0.5
Xoops Xoops 2.0.5.1
Xoops Xoops 1.3.7
Xoops Xoops 1.3.8
Xoops Xoops 2.0.5.2
Xoops Xoops 2.0.9.2
Xoops Xoops 1.0 Rc3.0.5
Xoops Xoops 1.3.10
Xoops Xoops 2.0.1
Xoops Xoops 2.0.2
Xoops Xoops 2.0.3
5
CVSSv2
CVE-2009-4851
The activation resend function in the Profiles module in XOOPS prior to 2.4.1 sends activation codes in response to arbitrary activation requests, which allows remote malicious users to bypass administrative approval via a request involving activate.php.
Xoops Xoops 1.0
Xoops Xoops 1.0 Rc3
Xoops Xoops 1.3.10
Xoops Xoops 1.3.9
Xoops Xoops 2.0.0 Rc2
Xoops Xoops 2.0.5 Rc
Xoops Xoops 2.0.5.2
Xoops Xoops 2.0.9.2
Xoops Xoops 2.0.10 Rc
Xoops Xoops 2.0.13
Xoops Xoops 2.0.13.2
Xoops Xoops 2.0.18
Xoops Xoops 2.3.0 Alpha1
Xoops Xoops 2.3.0
Xoops Xoops 2.3.1
Xoops Xoops 2.4.0 Beta 2
Xoops Xoops
Xoops Xoops 1.3.5
Xoops Xoops 1.3.6
Xoops Xoops 1.3.7
Xoops Xoops 1.3.8
Xoops Xoops 2.0.6
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-34377
CVE-2024-20859
CVE-2023-49606
inject
arbitrary
CVE-2024-33788
CVE-2024-30973
IDOR
CVE-2024-33907
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started