Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cells vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-2978
A vulnerability was found in Abstrium Pydio Cells 4.2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Change Subscription Handler. The manipulation leads to authorization bypass. The exploit has been disclosed to the publ...
Abstrium Pydio Cells 4.2.0
NA
CVE-2023-2979
A vulnerability classified as critical has been found in Abstrium Pydio Cells 4.2.0. This affects an unknown part of the component User Creation Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been discl...
Abstrium Pydio Cells 4.2.0
NA
CVE-2023-2980
A vulnerability classified as critical was found in Abstrium Pydio Cells 4.2.0. This vulnerability affects unknown code of the component User Creation Handler. The manipulation leads to improper control of resource identifiers. The attack can be initiated remotely. The exploit ha...
Abstrium Pydio Cells 4.2.0
578
VMScore
CVE-2022-32393
Prison Management System v1.0 exists to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/cells/view_cell.php:4
Prison Management System Project Prison Management System 1.0
578
VMScore
CVE-2022-32398
Prison Management System v1.0 exists to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/cells/manage_cell.php:4
Prison Management System Project Prison Management System 1.0
NA
CVE-2022-25646
All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells.
X-data-spreadsheet Project X-data-spreadsheet
570
VMScore
CVE-2007-4097
Tor prior to 0.1.2.15 sends "destroy cells" containing the reason for tearing down a circuit, which allows remote malicious users to obtain sensitive information, contrary to specifications.
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.1.1.2 Alpha
Tor Tor 0.1.0.10
Tor Tor 0.1.0.11
Tor Tor 0.1.1.20
Tor Tor 0.1.1.23
Tor Tor 0.1.0.12
Tor Tor 0.1.0.13
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.1.4 Alpha
Tor Tor 0.1.0.14
Tor Tor 0.1.0.18
Tor Tor 0.1.1.5 Alpha
Tor Tor 0.1.2.1 Alpha-cvs
Tor Tor 0.1.2.14
516
VMScore
CVE-2007-4098
Tor prior to 0.1.2.15 does not properly distinguish "streamids from different exits," which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams.
Tor Tor 0.1.0.10
Tor Tor 0.1.1.2 Alpha
Tor Tor 0.1.1.20
Tor Tor 0.1.0.11
Tor Tor 0.1.0.12
Tor Tor 0.1.1.23
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.0.13
Tor Tor 0.1.0.14
Tor Tor 0.1.1.4 Alpha
Tor Tor 0.1.1.5 Alpha
Tor Tor 0.1.0.18
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.1.2.1 Alpha-cvs
Tor Tor 0.1.2.14
NA
CVE-2024-22368
The Spreadsheet::ParseXLSX package prior to 0.28 for Perl can encounter an out-of-memory condition during parsing of a crafted XLSX document. This occurs because the memoize implementation does not have appropriate constraints on merged cells.
Tozt Spreadsheet\\ \\
828
VMScore
CVE-2007-1751
Microsoft Internet Explorer 5.01, 6, and 7 allows remote malicious users to execute arbitrary code by causing Internet Explorer to access an uninitialized or deleted object, related to prototype variables and table cells, aka "Uninitialized Memory Corruption Vulnerability.&q...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »