Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
w. cashdollar vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-2014-8604
The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! returns the MySQL password in cleartext to a text box in the configuration panel, which allows remote malicious users to obtain sensitive information via unspecified vectors.
Xcloner Xcloner 3.5.1
Xcloner Xcloner 3.1.1
1 EDB exploit
505
VMScore
CVE-2014-8605
The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! stores database backup files with predictable names under the web root with insufficient access control, which allows remote malicious users to obtain sensitive information via a direct request to a backup file in admin...
Xcloner Xcloner 3.5.1
Xcloner Xcloner 3.1.1
1 EDB exploit
215
VMScore
CVE-2014-8607
The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! provides the MySQL username and password on the command line, which allows local users to obtain sensitive information via the ps command.
Xcloner Xcloner 3.5.1
Xcloner Xcloner 3.1.1
1 EDB exploit
725
VMScore
CVE-2003-0497
Caché Database 5.x installs /cachesys/bin/cache with world-writable permissions, which allows local users to gain privileges by modifying cache and executing it via cuxs.
Intersystems Cache Database 5
1 EDB exploit
655
VMScore
CVE-2014-8603
cloner.functions.php in the XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! allows remote administrators to execute arbitrary code via shell metacharacters in the (1) file name when creating a backup or vectors related to the (2) $_CONFIG[tarpath], (3) $exclude, (4) $_CO...
Xcloner Xcloner 3.5.1
Xcloner Xcloner 3.1.1
1 EDB exploit
405
VMScore
CVE-2014-8606
Directory traversal vulnerability in the XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! allows remote administrators to read arbitrary files via a .. (dot dot) in the file parameter in a json_return action in the xcloner_show page to wp-admin/admin-ajax.php.
Xcloner Xcloner 3.5.1
Xcloner Xcloner 3.1.1
1 EDB exploit
755
VMScore
CVE-2000-0589
SawMill 5.0.21 uses weak encryption to store passwords, which allows malicious users to easily decrypt the password and modify the SawMill configuration.
Sawmill Sawmill 5.0.21
1 EDB exploit
505
VMScore
CVE-2000-0588
SawMill 5.0.21 CGI program allows remote malicious users to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands.
Sawmill Sawmill 5.0.21
1 EDB exploit
755
VMScore
CVE-2015-4455
Unrestricted file upload vulnerability in includes/upload.php in the Aviary Image Editor Add-on For Gravity Forms plugin 3.0 beta for WordPress allows remote malicious users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct...
Aviary Image Editor Add-on For Gravity Forms Project Aviary Image Editor Add-on For Gravity Forms
1 EDB exploit
755
VMScore
CVE-2015-4614
Multiple SQL injection vulnerabilities in includes/Function.php in the Easy2Map plugin prior to 1.2.5 for WordPress allow remote malicious users to execute arbitrary SQL commands via the mapName parameter in an e2m_img_save_map_name action to wp-admin/admin-ajax.php and other uns...
Easy2map Project Easy2map
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »