Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
php php 4.2 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2005-3823
The Users module in vTiger CRM 4.2 and previous versions allows remote malicious users to execute arbitrary PHP code via an arbitrary file in the templatename parameter, which is passed to the eval function.
Vtiger Vtiger Crm
685
VMScore
CVE-2010-5099
The fileDenyPattern functionality in the PHP file inclusion protection API in TYPO3 4.2.x prior to 4.2.16, 4.3.x prior to 4.3.9, and 4.4.x prior to 4.4.5 does not properly filter file types, which allows remote malicious users to bypass intended access restrictions and access arb...
Typo3 Typo3 4.2.0
Typo3 Typo3 4.2.7
Typo3 Typo3 4.2.8
Typo3 Typo3 4.2.15
Typo3 Typo3 4.2.3
Typo3 Typo3 4.2.4
Typo3 Typo3 4.2.11
Typo3 Typo3 4.2.12
Typo3 Typo3 4.2.5
Typo3 Typo3 4.2.6
Typo3 Typo3 4.2.13
Typo3 Typo3 4.2.14
Typo3 Typo3 4.2.1
Typo3 Typo3 4.2.2
Typo3 Typo3 4.2.9
Typo3 Typo3 4.2.10
Typo3 Typo3 4.3.7
Typo3 Typo3 4.3.8
Typo3 Typo3 4.3.2
Typo3 Typo3 4.3.3
Typo3 Typo3 4.3.4
Typo3 Typo3 4.3.5
1 EDB exploit
641
VMScore
CVE-2019-1607
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local malicious user to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI com...
Cisco Nx-os
641
VMScore
CVE-2019-1606
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local malicious user to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI com...
Cisco Nx-os
641
VMScore
CVE-2019-1608
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local malicious user to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI com...
Cisco Nx-os
641
VMScore
CVE-2019-1609
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local malicious user to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI com...
Cisco Nx-os
1 Github repository
641
VMScore
CVE-2019-1610
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local malicious user to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI com...
Cisco Nx-os
641
VMScore
CVE-2019-1611
A vulnerability in the CLI of Cisco NX-OS Software and Cisco FXOS Software could allow an authenticated, local malicious user to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments p...
Cisco Nx-os
Cisco Fx-os
641
VMScore
CVE-2019-1612
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local malicious user to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI com...
Cisco Nx-os
409
VMScore
CVE-2019-1613
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local malicious user to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI com...
Cisco Nx-os 7.0\\(3\\)i7\\(2\\)
Cisco Nx-os 7.0\\(3\\)f3\\(3\\)
Cisco Nx-os 9.2\\(1\\)
Cisco Nx-os 8.2\\(1\\)
Cisco Nx-os 9.2\\(2\\)
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »