Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cells vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-2979
A vulnerability classified as critical has been found in Abstrium Pydio Cells 4.2.0. This affects an unknown part of the component User Creation Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been discl...
Abstrium Pydio Cells 4.2.0
NA
CVE-2023-2980
A vulnerability classified as critical was found in Abstrium Pydio Cells 4.2.0. This vulnerability affects unknown code of the component User Creation Handler. The manipulation leads to improper control of resource identifiers. The attack can be initiated remotely. The exploit ha...
Abstrium Pydio Cells 4.2.0
NA
CVE-2023-2981
A vulnerability, which was classified as problematic, has been found in Abstrium Pydio Cells 4.2.0. This issue affects some unknown processing of the component Chat. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been d...
Abstrium Pydio Cells 4.2.0
6.5
CVSSv2
CVE-2022-32393
Prison Management System v1.0 exists to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/cells/view_cell.php:4
Prison Management System Project Prison Management System 1.0
6.5
CVSSv2
CVE-2022-32398
Prison Management System v1.0 exists to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/cells/manage_cell.php:4
Prison Management System Project Prison Management System 1.0
NA
CVE-2022-25646
All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells.
X-data-spreadsheet Project X-data-spreadsheet
6.4
CVSSv2
CVE-2007-4097
Tor prior to 0.1.2.15 sends "destroy cells" containing the reason for tearing down a circuit, which allows remote malicious users to obtain sensitive information, contrary to specifications.
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.1.1.2 Alpha
Tor Tor 0.1.0.10
Tor Tor 0.1.0.11
Tor Tor 0.1.1.20
Tor Tor 0.1.1.23
Tor Tor 0.1.0.12
Tor Tor 0.1.0.13
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.1.4 Alpha
Tor Tor 0.1.0.14
Tor Tor 0.1.0.18
Tor Tor 0.1.1.5 Alpha
Tor Tor 0.1.2.1 Alpha-cvs
Tor Tor 0.1.2.14
5.8
CVSSv2
CVE-2007-4098
Tor prior to 0.1.2.15 does not properly distinguish "streamids from different exits," which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams.
Tor Tor 0.1.0.10
Tor Tor 0.1.1.2 Alpha
Tor Tor 0.1.1.20
Tor Tor 0.1.0.11
Tor Tor 0.1.0.12
Tor Tor 0.1.1.23
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.0.13
Tor Tor 0.1.0.14
Tor Tor 0.1.1.4 Alpha
Tor Tor 0.1.1.5 Alpha
Tor Tor 0.1.0.18
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.1.2.1 Alpha-cvs
Tor Tor 0.1.2.14
NA
CVE-2024-22368
The Spreadsheet::ParseXLSX package prior to 0.28 for Perl can encounter an out-of-memory condition during parsing of a crafted XLSX document. This occurs because the memoize implementation does not have appropriate constraints on merged cells.
Tozt Spreadsheet\\ \\
9.3
CVSSv2
CVE-2007-1751
Microsoft Internet Explorer 5.01, 6, and 7 allows remote malicious users to execute arbitrary code by causing Internet Explorer to access an uninitialized or deleted object, related to prototype variables and table cells, aka "Uninitialized Memory Corruption Vulnerability.&q...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »