Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
liquidworm vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-4266
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-5123. Reason: This candidate is a reservation duplicate of CVE-2013-5123. Notes: All CVE users should reference CVE-2013-5123 instead of this candidate. All references and descriptions in this candidate have ...
1 EDB exploit
NA
CVE-2011-5155
Untrusted search path vulnerability in Help & Manual 5.5.1 Build 1296 allows local users to gain privileges via a Trojan horse ijl15.dll file in the current working directory, as demonstrated by a directory that contains a .hmxz, .hmxp, .hmskin, .hmx, .hm3, .hpj, .hlp, or .ch...
Helpandmanual Help \\& Manual 5.5.1
1 EDB exploit
NA
CVE-2015-7904
Unrestricted file upload vulnerability in Infinite Automation Mango Automation 2.5.x and 2.6.x prior to 2.6.0 build 430 allows remote authenticated users to execute arbitrary JSP code via vectors involving an upload of an image file.
Infinite Automation Systems Mango Automation 2.5.5
Infinite Automation Systems Mango Automation 2.5.0
Infinite Automation Systems Mango Automation 2.6.0
1 EDB exploit
NA
CVE-2014-5349
Stack-based buffer overflow in Baidu Spark Browser 26.5.9999.3511 allows remote malicious users to cause a denial of service (application crash) via nested calls to the window.print JavaScript function.
Baidu Spark Browser 26.5.9999.3511
1 EDB exploit
NA
CVE-2010-5281
Directory traversal vulnerability in ibrowser.php in the CMScout 2.09 IBrowser TinyMCE Plugin 1.4.1, when magic_quotes_gpc is disabled, allows remote malicious users to read arbitrary files via a .. (dot dot) in the lang parameter. NOTE: some of these details are obtained from th...
Net4visions Ibrowser 1.4.1
1 EDB exploit
NA
CVE-2005-3747
Unspecified vulnerability in Jetty prior to 5.1.6 allows remote malicious users to obtain source code of JSP pages, possibly involving requests for .jsp files with URL-encoded backslash ("%5C") characters. NOTE: this might be the same issue as CVE-2006-2758.
Mortbay Jetty 1.0.1
Mortbay Jetty 1.1
Mortbay Jetty 3.0.a9
Mortbay Jetty 3.0.a4
Mortbay Jetty 3.0.a1
Mortbay Jetty 3.0.0
Mortbay Jetty 2.1.b0
Mortbay Jetty 2.1.1
Mortbay Jetty 2.1.6
Mortbay Jetty 2.2
Mortbay Jetty 1.3.1
Mortbay Jetty 1.3.2
Mortbay Jetty 2.0
Mortbay Jetty 2.0.0
Mortbay Jetty 2.4.1
Mortbay Jetty 2.4.0
Mortbay Jetty 3.0.a92
Mortbay Jetty 3.0.a91
Mortbay Jetty 2.2.0
Mortbay Jetty 2.2.7
Mortbay Jetty 2.2.8
Mortbay Jetty 4.2.21
1 EDB exploit
NA
CVE-2014-5100
Multiple cross-site request forgery (CSRF) vulnerabilities in Omeka prior to 2.2.1 allow remote malicious users to hijack the authentication of administrators for requests that (1) add a new super user account via a request to admin/users/add, (2) insert cross-site scripting (XSS...
Omeka Omeka
1 EDB exploit
NA
CVE-2010-2321
Buffer overflow in Adobe InDesign CS3 10.0 allows user-assisted remote malicious users to execute arbitrary code via a crafted .indd file.
Adobe Indesign Cs3 10.0
1 EDB exploit
NA
CVE-2009-3859
Buffer overflow in eEye Retina WiFi Scanner 1.0.8.68, as used in Retina Network Security Scanner 5.10.14, allows user-assisted remote malicious users to cause a denial of service (application crash) or execute arbitrary code via a .rws file with a long RWS010 entry.
Eeye Retina Wifi Scanner 1.0.8.68
Eeye Retina Network Security Scanner 5.10.14
1 EDB exploit
NA
CVE-2014-8359
Untrusted search path vulnerability in Huawei Mobile Partner for Windows 23.009.05.03.1014 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wintab32.dll in the Mobile Partner directory.
Huawei Mobile Partner Firmware 23.009.05.03.1014
Huawei Ec177 -
Huawei Ec176 -
Huawei Ec156 -
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »