Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cells vulnerabilities and exploits
(subscribe to this query)
5.4
CVSSv3
CVE-2023-2981
A vulnerability, which was classified as problematic, has been found in Abstrium Pydio Cells 4.2.0. This issue affects some unknown processing of the component Chat. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been d...
Abstrium Pydio Cells 4.2.0
8.8
CVSSv3
CVE-2023-2979
A vulnerability classified as critical has been found in Abstrium Pydio Cells 4.2.0. This affects an unknown part of the component User Creation Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been discl...
Abstrium Pydio Cells 4.2.0
4.3
CVSSv3
CVE-2023-2978
A vulnerability was found in Abstrium Pydio Cells 4.2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Change Subscription Handler. The manipulation leads to authorization bypass. The exploit has been disclosed to the publ...
Abstrium Pydio Cells 4.2.0
8.8
CVSSv3
CVE-2022-32393
Prison Management System v1.0 exists to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/cells/view_cell.php:4
Prison Management System Project Prison Management System 1.0
8.8
CVSSv3
CVE-2022-32398
Prison Management System v1.0 exists to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/cells/manage_cell.php:4
Prison Management System Project Prison Management System 1.0
6.1
CVSSv3
CVE-2022-25646
All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells.
X-data-spreadsheet Project X-data-spreadsheet
NA
CVE-2007-4097
Tor prior to 0.1.2.15 sends "destroy cells" containing the reason for tearing down a circuit, which allows remote malicious users to obtain sensitive information, contrary to specifications.
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.1.1.2 Alpha
Tor Tor 0.1.0.10
Tor Tor 0.1.0.11
Tor Tor 0.1.1.20
Tor Tor 0.1.1.23
Tor Tor 0.1.0.12
Tor Tor 0.1.0.13
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.1.4 Alpha
Tor Tor 0.1.0.14
Tor Tor 0.1.0.18
Tor Tor 0.1.1.5 Alpha
Tor Tor 0.1.2.1 Alpha-cvs
Tor Tor 0.1.2.14
NA
CVE-2007-4098
Tor prior to 0.1.2.15 does not properly distinguish "streamids from different exits," which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams.
Tor Tor 0.1.0.10
Tor Tor 0.1.1.2 Alpha
Tor Tor 0.1.1.20
Tor Tor 0.1.0.11
Tor Tor 0.1.0.12
Tor Tor 0.1.1.23
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.0.13
Tor Tor 0.1.0.14
Tor Tor 0.1.1.4 Alpha
Tor Tor 0.1.1.5 Alpha
Tor Tor 0.1.0.18
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.1.2.1 Alpha-cvs
Tor Tor 0.1.2.14
5.5
CVSSv3
CVE-2024-22368
The Spreadsheet::ParseXLSX package prior to 0.28 for Perl can encounter an out-of-memory condition during parsing of a crafted XLSX document. This occurs because the memoize implementation does not have appropriate constraints on merged cells.
Tozt Spreadsheet\\ \\
NA
CVE-2007-1751
Microsoft Internet Explorer 5.01, 6, and 7 allows remote malicious users to execute arbitrary code by causing Internet Explorer to access an uninitialized or deleted object, related to prototype variables and table cells, aka "Uninitialized Memory Corruption Vulnerability.&q...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »