Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cold zero vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-2089
Multiple PHP remote file inclusion vulnerabilities in the Jx Development Article 1.1 and previous versions component for Mambo and Joomla! allow remote malicious users to execute arbitrary PHP code via a URL in the absolute_path parameter to com_articles.php in (1) components/ or...
Jx Development Article Component
1 EDB exploit
NA
CVE-2007-2143
PHP remote file inclusion vulnerability in index.php in the Be2004-2 template for Joomla! allows remote malicious users to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
Bonoestente Joomla Template Be2004-2
1 EDB exploit
NA
CVE-2007-0568
PHP remote file inclusion vulnerability in system/lib/package.php in MyPHPCommander 2.0 allows remote malicious users to execute arbitrary PHP code via a URL in the gl_root parameter.
Myphpcommander Myphpcommander 2.0
1 EDB exploit
NA
CVE-2006-4605
PHP remote file inclusion vulnerability in index.php in Longino Jacome php-Revista 1.1.2 allows remote malicious users to execute arbitrary PHP code via the adodb parameter.
Longino Jacome Php-revista 1.1.2
2 EDB exploits
NA
CVE-2006-4606
Multiple SQL injection vulnerabilities in Longino Jacome php-Revista 1.1.2 allow remote malicious users to execute arbitrary SQL commands via the (1) id_temas parameter in busqueda_tema.php, the (2) cadena parameter in busqueda.php, the (3) id_autor parameter in autor.php, the (4...
Longino Jacome Php-revista 1.1.2
2 EDB exploits
NA
CVE-2006-3142
SQL injection vulnerability in forum.php in VBZooM 1.11 allows remote malicious users to execute arbitrary SQL commands via the MainID parameter.
Vbzoom Vbzoom 1.11
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4