Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ihsan sencan vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2017-17645
Bus Booking Script 1.0 has SQL Injection via the txtname parameter to admin/index.php.
Phpautoclassifiedscript Bus Booking Script 1.0
1 EDB exploit
7.5
CVSSv2
CVE-2017-17651
Paid To Read Script 2.0.5 has SQL Injection via the admin/userview.php uid parameter, the admin/viewemcamp.php fnum parameter, or the admin/viewvisitcamp.php fn parameter.
Paid To Read Script Project Paid To Read Script 2.0.5
1 EDB exploit
7.5
CVSSv2
CVE-2018-18755
K-iwi Framework 1775 has SQL Injection via the admin/user/group/update user_group_id parameter or the admin/user/user/update user_id parameter.
K-iwi K-iwi 1775
1 EDB exploit
5
CVSSv2
CVE-2018-18759
Modbus Slave 7.0.0 in modbus tools has a Buffer Overflow.
Modbustools Modbus Slave 7.0.0
1 EDB exploit
4.3
CVSSv2
CVE-2018-18760
RhinOS 3.0 build 1190 allows CSRF.
Saltos Rhinos 3.0
1 EDB exploit
7.5
CVSSv2
CVE-2018-18761
SaltOS 3.1 r8126 allows action=login&querystring=&user=[SQL] SQL Injection.
Saltos Saltos 3.1
1 EDB exploit
4.3
CVSSv2
CVE-2018-18762
SaltOS 3.1 r8126 contains a database download vulnerability.
Saltos Saltos 3.1
1 EDB exploit
7.5
CVSSv2
CVE-2018-18763
SaltOS 3.1 r8126 allows action=ajax&query=numbers&page=usuarios&action2=[SQL] SQL Injection.
Saltos Saltos 3.1
1 EDB exploit
7.5
CVSSv2
CVE-2018-5970
SQL Injection exists in the JGive 2.0.9 component for Joomla! via the filter_org_ind_type or campaign_countries parameter.
Techjoomla Jgive 2.0.9
1 EDB exploit
7.5
CVSSv2
CVE-2018-5971
SQL Injection exists in the MediaLibrary Free 4.0.12 component for Joomla! via the id parameter or the mid array parameter.
Ordasoft Medialibrary 4.0.12
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »