Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
audit vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-5389
SQL injection vulnerability in content-audit-schedule.php in the Content Audit plugin prior to 1.6.1 for WordPress allows remote malicious users to execute arbitrary SQL commands via the "Audited content types" option in the content-audit page to wp-admin/options-genera...
Content Audit Project Content Audit 1.6.0
Content Audit Project Content Audit 1.6
6.8
CVSSv3
CVE-2018-9137
Open-AudIT prior to 2.2 has CSV Injection.
Open-audit Open-audit
1 EDB exploit
5.3
CVSSv3
CVE-2015-5186
Audit prior to 2.4.4 in Linux does not sanitize escape characters in filenames.
Linux Audit Project Linux Audit
6.1
CVSSv3
CVE-2017-18560
The content-audit plugin prior to 1.9.2 for WordPress has XSS.
Content Audit Project Content Audit
8.8
CVSSv3
CVE-2018-8979
Open-AudIT Professional 2.1 has CSRF, as demonstrated by modifying a user account or inserting XSS sequences via the credentials URI.
Open-audit Open-audit 2.1
1 EDB exploit
5.4
CVSSv3
CVE-2018-8903
Open-AudIT Professional 2.1 allows XSS via the Name or Description field on the Credentials screen.
Open-audit Open-audit 2.1
1 EDB exploit
6.1
CVSSv3
CVE-2018-8937
An issue exists in Open-AudIT Professional 2.1. It is possible to inject a malicious payload in the redirect_url parameter to the /login URI to trigger an open redirect. A "data:text/html;base64," payload can be used with JavaScript code.
Open-audit Open-audit 2.1
5.4
CVSSv3
CVE-2018-8978
Open-AudIT Professional 2.1 has XSS via a crafted src attribute of an IMG element within a URI.
Open-audit Open-audit 2.1
5.4
CVSSv3
CVE-2018-9155
Cross-site scripting (XSS) vulnerability in Open-AudIT Professional 2.1.1 allows remote malicious users to inject arbitrary web script or HTML via a crafted name of a component, as demonstrated by the Admin->Logs section (with a logs?logs.type= URI) and the Manage->Attribut...
Open-audit Open-audit 2.1.1
1 EDB exploit
NA
CVE-2006-4901
Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, and eTrust Audit 1.5 and r8, allows remote malicious users to spoof alerts and conduct replay attacks by invoking eTSAPISend.exe with the desired arguments.
Broadcom Etrust Audit Client 1.5
Broadcom Etrust Security Command Center 1.0
Broadcom Etrust Security Command Center 8
Broadcom Etrust Audit Policy Manager 1.5
Broadcom Etrust Audit Policy Manager 8.0
Broadcom Etrust Audit Datatools 8.0
Broadcom Etrust Audit Client 8.0
Broadcom Etrust Audit Datatools 1.5
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3661
open redirect
CVE-2024-25512
CVE-2024-33788
command injection
SSTI
CVE-2024-0043
CVE-2024-29210
CVE-2024-25510
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »