Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
arbitrary code vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-0209
Horde 3.3.12, Horde Groupware 1.2.10, and Horde Groupware Webmail Edition 1.2.10, as distributed by FTP between November 2011 and February 2012, contains an externally introduced modification (Trojan Horse) in templates/javascript/open_calendar.js, which allows remote malicious u...
Horde Groupware 1.2.10
Horde Horde 3.3.12
1 EDB exploit
NA
CVE-2010-0366
Multiple unrestricted file upload vulnerabilities in (1) register.php and (2) addvideo.php in BitScripts Bits Video Script 2.04 and 2.05 Gold Beta allow remote malicious users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a dire...
Bitscripts Bits Video Script 2.04
Bitscripts Bits Video Script 2.05
2 EDB exploits
NA
CVE-2023-47268
PrusaSlicer versions 2.6.1 and below suffer from an arbitrary code execution vulnerability.
NA
CVE-2009-3890
Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress prior to 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code...
Wordpress Wordpress
1 EDB exploit
7.8
CVSSv3
CVE-2019-20357
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vul...
Trendmicro Antivirus \\+ Security 2019 15.0
Trendmicro Antivirus \\+ Security 2020 16.0
Trendmicro Internet Security 2019 15.0
Trendmicro Internet Security 2020 16.0
Trendmicro Maximum Security 2019 15.0
Trendmicro Maximum Security 2020 16.0
Trendmicro Premium Security 2019 15.0
Trendmicro Premium Security 2020 16.0
8.8
CVSSv3
CVE-2023-31874
Yank Note (YN) 3.52.1 allows execution of arbitrary code when a crafted file is opened, e.g., via nodeRequire('child_process').
Yank-note Yank Note 3.52.1
NA
CVE-2000-1053
Allaire JRun 2.3.3 server allows remote malicious users to compile and execute JSP code by inserting it via a cross-site scripting (CSS) attack and directly calling the com.livesoftware.jrun.plugins.JSP JSP servlet.
Macromedia Jrun 2.3.x
1 EDB exploit
7.2
CVSSv3
CVE-2018-7046
Arbitrary code execution vulnerability in Kentico 9 through 11 allows remote authenticated users to execute arbitrary operating system commands in a dynamic .NET code evaluation context via C# code in a "Pages -> Edit -> Template -> Edit template properties -> La...
Kentico Kentico Cms
NA
CVE-2007-5663
Adobe Reader and Acrobat 8.1.1 and previous versions allows remote malicious users to execute arbitrary code via a crafted PDF file that calls an insecure JavaScript method in the EScript.api plug-in. NOTE: this issue might be subsumed by CVE-2008-0655.
Adobe Acrobat
Adobe Acrobat Reader
NA
CVE-2001-1290
admin.cgi in Active Classifieds Free Edition 1.0, and possibly commercial versions, allows remote malicious users to modify the configuration, gain privileges, and execute arbitrary Perl code via the table_width parameter.
Active Web Suite Technologies Active Classifieds 1.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »