Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
arbitrary vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2007-0118
Multiple absolute path traversal vulnerabilities in EditTag 1.2 allow remote malicious users to read arbitrary files via an absolute pathname in the file parameter to (1) edittag.cgi, (2) edittag.pl, (3) edittag_mp.cgi, or (4) edittag_mp.pl.
Edittag Edittag 1.2
4 EDB exploits
7.5
CVSSv2
CVE-2017-9602
KBVault Mysql Free Knowledge Base application package 0.16a comes with a FileExplorer/Explorer.aspx?id=/Uploads file-management component. An unauthenticated user can access the file upload and deletion functionality. Through this functionality, a user can upload an ASPX script t...
Kbvault Mysql Project Kbvault Mysql 0.16a
1 EDB exploit
4
CVSSv2
CVE-2015-8309
Directory traversal vulnerability in Cherry Music prior to 0.36.0 allows remote authenticated users to read arbitrary files via the "value" parameter to "download."
Fomori Cherrymusic
1 EDB exploit
5
CVSSv2
CVE-2013-5877
Unspecified vulnerability in the Oracle Demantra Demand Management component in Oracle Supply Chain Products Suite 7.2.0.3 SQL-Server, 7.3.0, 7.3.1, 12.2.0, and 12.2.1 allows remote malicious users to affect confidentiality via unknown vectors related to DM Others.
Oracle Supply Chain Products Suite 7.2.0.3
Oracle Supply Chain Products Suite Sql-server 7.3.0
Oracle Supply Chain Products Suite Sql-server 12.2.0
Oracle Supply Chain Products Suite Sql-server 7.3.1
Oracle Supply Chain Products Suite Sql-server 12.2.1
1 EDB exploit
5.5
CVSSv2
CVE-2018-9038
Monstra CMS 3.0.4 allows remote malicious users to delete files via an admin/index.php?id=filesmanager&delete_dir=./&path=uploads/ request.
Monstra Monstra 3.0.4
1 EDB exploit
6.8
CVSSv2
CVE-2008-6619
Unrestricted file upload vulnerability in class/ApplyDB.php in ClassSystem 2.3 allows remote malicious users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in class/UploadHomepage/.
Netlab Classsystem 2.3
1 EDB exploit
6.4
CVSSv2
CVE-2005-0409
CitrusDB 0.3.6 and previous versions does not verify authorization for the (1) importcc.php and (2) uploadcc.php, which allows remote malicious users to upload credit card data and obtain sensitive information such as the pathnames for temporary files that store credit card data,...
Citrusdb Citrusdb
2 EDB exploits
7.5
CVSSv2
CVE-2004-0285
PHP remote file inclusion vulnerabilities in include/footer.inc.php in (1) AllMyVisitors, (2) AllMyLinks, and (3) AllMyGuests allow remote malicious users to execute arbitrary PHP code via a URL in the _AMVconfig[cfg_serverpath] parameter.
Allmyguests Project Allmyguests 0.4.1
Allmyguests Project Allmyguests 0.4
Allmyguests Project Allmyguests 0.3
Allmyguests Project Allmyguests 0.1.2
Allmylinks Project Allmylinks 0.3
Allmylinks Project Allmylinks 0.4
Allmylinks Project Allmylinks 0.4.1
Allmylinks Project Allmylinks 0.4.3
Allmylinks Project Allmylinks 0.4.4
Allmylinks Project Allmylinks 0.4.9
Allmylinks Project Allmylinks 0.5
Allmyvisitors Project Allmyvisitors 0.4
Allmyvisitors Project Allmyvisitors 0.3
3 EDB exploits
7.5
CVSSv2
CVE-2016-4010
Magento CE and EE prior to 2.0.6 allows remote malicious users to conduct PHP objection injection attacks and execute arbitrary PHP code via crafted serialized shopping cart data.
Magento Magento
1 EDB exploit
3 Github repositories
1 Article
6.8
CVSSv2
CVE-2014-2383
dompdf.php in dompdf prior to 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent malicious users to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base6...
Dompdf Dompdf
1 EDB exploit
2 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »