Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
r vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-1578
The default installation of SAP R/3, when using Oracle and SQL*net V2 3.x, 4.x, and 6.10, allows remote malicious users to obtain arbitrary, sensitive SAP data by directly connecting to the Oracle database and executing queries against the database, which is not password-protecte...
Sap Sap R 3
7.5
CVSSv2
CVE-2002-1752
csChatRBox.cgi in CGIScript.net csChat-R-Box allows remote malicious users to execute arbitrary Perl code via the setup parameter, which is processed by the Perl eval function.
Cgiscript Cschat-r-box 1.0
3.6
CVSSv2
CVE-2000-0379
The Netopia R9100 router does not prevent authenticated users from modifying SNMP tables, even if the administrator has configured it to do so.
Netopia R-series Routers 4.6.2
1 EDB exploit
6.5
CVSSv2
CVE-2018-2436
Executing transaction WRCK in SAP R/3 Enterprise Retail (EHP6) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
Sap R\\/3 Enterprise Retail -
7.5
CVSSv2
CVE-2009-3061
SQL injection vulnerability in lesson.php in Alqatari Q R Script 1.0 allows remote malicious users to execute arbitrary SQL commands via the id parameter. NOTE: some of these details are obtained from third party information.
Alqa6ari Script Q R 1.0
1 EDB exploit
5
CVSSv2
CVE-2020-13896
The web interface of Maipu MP1800X-50 7.5.3.14(R) devices allows remote malicious users to obtain sensitive information via the form/formDeviceVerGet URI, such as system id, hardware model, hardware version, bootloader version, software version, software image file, compilation t...
Maipu Mp1800x-50 Firmware 7.5.3.14\\(r\\)
7.5
CVSSv2
CVE-2002-1577
SAP R/3 2.0B to 4.6D installs several clients with default users and passwords, which allows remote malicious users to gain privileges via the (1) SAP*, (2) SAPCPIC, (3) DDIC, (4) EARLYWATCH, or (5) TMSADM accounts.
Sap Sap R 3 2.0b To 4.6d
7.5
CVSSv2
CVE-2006-1781
PHP remote file inclusion vulnerability in functions.php in Circle R Monster Top List (MTL) 1.4 allows remote malicious users to execute arbitrary PHP code via a URL in the root_path parameter. NOTE: It was later reported that 1.4.2 and previous versions are affected.
Circle R Monster Top List
2 EDB exploits
9.3
CVSSv2
CVE-2007-4750
Unspecified vulnerability in RemoteDocs R-Viewer prior to 1.6.3768 allows user-assisted remote malicious users to execute arbitrary code via a crafted RDZ archive in which the first file has an executable extension.
Data-vision Remotedocs R-viewer
1.9
CVSSv2
CVE-2007-4751
RemoteDocs R-Viewer prior to 1.6.3768 stores encrypted RDZ file data in unencrypted temporary files, which allows local users to obtain sensitive information by reading the temporary files.
Data-vision Remotedocs R-viewer
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »