Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vb vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-0488
Directory traversal vulnerability in tseekdir.cgi in VB Marketing allows remote malicious users to include and execute arbitrary local files via directory traversal sequences in the location parameter.
Vb Marketing Vb Marketing
1 EDB exploit
NA
CVE-1999-0364
Microsoft Access 97 stores a database password as plaintext in a foreign mdb, allowing access to data.
Microsoft Access 97
Fms Inc. Total Vb Sourcebook 6.0
NA
CVE-2001-0153
Buffer overflow in VB-TSQL debugger object (vbsdicli.exe) in Visual Studio 6.0 Enterprise Edition allows remote malicious users to execute arbitrary commands.
Microsoft Visual Basic 6.0
Microsoft Visual Studio 6.0
6.5
CVSSv3
CVE-2019-17130
vBulletin up to and including 5.5.4 mishandles external URLs within the /core/vb/vurl.php file and the /core/vb/vurl directories.
Vbulletin Vbulletin
NA
CVE-2008-1659
Unspecified vulnerability in HP LDAP-UX vB.04.10 through vB.04.15 allows local users to gain privileges via unknown vectors.
Hp Ldap-ux B.04.12
Hp Ldap-ux B.04.13
Hp Ldap-ux B.04.14
Hp Ldap-ux B.04.15
Hp Ldap-ux B.04.10
Hp Ldap-ux B.04.11
NA
CVE-2012-5224
PHP remote file inclusion vulnerability in vb/includes/vba_cmps_include_bottom.php in vBadvanced CMPS 3.2.2 and previous versions allows remote malicious users to execute arbitrary PHP code via a URL in the pages[template] parameter.
Vbadvanced Vbadvanced Cmps
Vbadvanced Vbadvanced Cmps 3.2.1
1 EDB exploit
9.8
CVSSv3
CVE-2018-18805
Point Of Sales 1.0 allows SQL injection via the login screen, related to LoginForm1.vb.
Pointofsales Project Pointofsales 1.0
1 EDB exploit
NA
CVE-2006-4732
Unspecified vulnerability in Microsoft Visual Basic (VB) 6 has an unknown impact ("overflow") via a project that contains a certain Click event procedure, as demonstrated using the msgbox function and the VB.Label object.
Microsoft Visual Basic 6.0
NA
CVE-2012-5216
Cross-site request forgery (CSRF) vulnerability on HP ProCurve 1700-8 (aka J9079A) switches with software before VA.02.09 and 1700-24 (aka J9080A) switches with software before VB.02.09 allows remote malicious users to hijack the authentication of unspecified victims via unknown ...
Hp Procurve Switch Software H.08.109
Hp Procurve Switch Software H.10.21
Hp Procurve Switch Software H.08.104
Hp Procurve Switch Software H.08.98
Hp Procurve Switch Software H.08.96
Hp Procurve Switch Software H.08.90
Hp Procurve Switch Software H.08.87
Hp Procurve Switch Software H.08.81
Hp Procurve Switch Software H.08.77
Hp Procurve Switch Software H.08.75
Hp Procurve Switch Software H.08.67
Hp Procurve Switch Software H.08.64
Hp Procurve Switch Software H.08.59
Hp Procurve Switch Software H.08.57
Hp Procurve Switch Software H.07.46
Hp Procurve Switch Software H.07.41
Hp Procurve Switch Software H.10.27
Hp Procurve Switch Software H.10.29
Hp Procurve Switch Software H.10.37
Hp Procurve Switch Software H.10.39
Hp Procurve Switch Software H.10.45
Hp Procurve Switch Software H.10.47
NA
CVE-2013-4768
The web services APIs in Eucalyptus 2.0 up to and including 3.4.1 allow remote malicious users to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMw...
Eucalyptus Eucalyptus 3.4.0
Eucalyptus Eucalyptus 3.2.0
Eucalyptus Eucalyptus 3.2.2
Eucalyptus Eucalyptus 3.0
Eucalyptus Eucalyptus 3.0.1
Eucalyptus Eucalyptus 3.1.0
Eucalyptus Eucalyptus 3.1.1
Eucalyptus Eucalyptus 3.3.1
Eucalyptus Eucalyptus 2.0.3
Eucalyptus Eucalyptus 2.0.2
Eucalyptus Eucalyptus 2.0.1
Eucalyptus Eucalyptus 3.4.1
Eucalyptus Eucalyptus 3.3.2
Eucalyptus Eucalyptus 3.1.2
Eucalyptus Eucalyptus 3.2.1
Eucalyptus Eucalyptus 3.3.0
Eucalyptus Eucalyptus 2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3661
open redirect
CVE-2024-25512
CVE-2024-33788
command injection
SSTI
CVE-2024-0043
CVE-2024-29210
CVE-2024-25510
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »