Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
farhad koosha vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-0854
betaparticle blog (bp blog), posisbly before version 4, allows remote malicious users to bypass authentication and (1) upload files via a direct request to upload.asp or (2) delete files via a direct request to myFiles.asp.
Betaparticle Betaparticle Blog 3.0
Betaparticle Betaparticle Blog 2.0
2 EDB exploits
NA
CVE-2005-3208
Multiple SQL injection vulnerabilities in (1) aeNovo, (2) aeNovoShop and (3) aeNovoWYSI allow remote malicious users to execute arbitrary SQL code via (a) the password parameter in control.asp, and (b) the strSQL parameter in search.asp, which can enable XSS attacks in resulting ...
Aenovo Aenovoshop
Aenovo Aenovowysi
Aenovo Aenovo
2 EDB exploits
NA
CVE-2005-0802
Cross-site scripting (XSS) vulnerability in search.asp in ACS Blog 0.8 up to and including 1.1b allows remote malicious users to execute arbitrary web script or HTML via the search parameter.
Asp Press Acs Blog 0.8
Asp Press Acs Blog 1.0
Asp Press Acs Blog 1.1b
Asp Press Acs Blog 0.9
1 EDB exploit
NA
CVE-2005-0853
betaparticle blog (bp blog) stores the database under the web root, which allows remote malicious users to obtain sensitive information via a direct request to (1) dbBlogMX.mdb for versions prior to 3.0, or (2) Blog.mdb for versions 3.0 and later. NOTE: it was later reported that...
Betaparticle Betaparticle Blog 3.0
Betaparticle Betaparticle Blog 2.0
1 EDB exploit
NA
CVE-2005-3320
Cross-site scripting (XSS) vulnerability in SiteTurn Domain Manager Pro allows remote malicious users to inject arbitrary web script or HTML via the err parameter in the panel script.
Siteturn Domain Manager Pro
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started