Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
activecampaign supporttrio vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2006-0970
PHP remote file inclusion vulnerability in index.php in one or more ActiveCampaign products, possibly SupportTrio, allows remote malicious users to include and execute arbitrary files via the page parameter.
Activecampaign Supporttrio
Activecampaign Visualedit
Activecampaign 1-2-all
Activecampaign General
Activecampaign Isalient
Activecampaign Knowledgebuilder
435
VMScore
CVE-2006-1487
Cross-site scripting (XSS) vulnerability in ActiveCampaign SupportTrio 2.50.2 allows remote malicious users to inject arbitrary web script or HTML via unspecified parameters to the KnowledgeBase search module.
Activecampaign Supporttrio 2.50.2
1 EDB exploit
445
VMScore
CVE-2006-1488
ActiveCampaign SupportTrio 2.5 allows remote malicious users to obtain the full path of the server via invalid (1) article or (2) print parameters in a kb action to index.php, or (3) an invalid category parameter to modules/KB/pdf.php, which leaks the path in an error message.
Activecampaign Supporttrio 2.50.2
668
VMScore
CVE-2005-4634
SQL injection vulnerability in index.php in ActiveCampaign SupportTrio 1.4 allows remote malicious users to execute arbitrary SQL commands via the page parameter. NOTE: the provenance of this information is unknown because the source URL is not available; the details are obtained...
Activecampaign Supporttrio 1.4
445
VMScore
CVE-2005-3830
index.php in ActiveCampaign SupportTrio 1.4 and previous versions allows remote malicious users to read or include arbitrary files via the page parameter, possibly due to a directory traversal vulnerability.
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started