Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checklist checklist vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2019-16525
An XSS issue exists in the checklist plugin prior to 1.1.9 for WordPress. The fill parameter is not correctly filtered in the checklist-icon.php file, and it is possible to inject JavaScript code.
Checklist Checklist
755
VMScore
CVE-2018-7318
SQL Injection exists in the CheckList 1.1.1 component for Joomla! via the title_search, tag_search, name_search, description_search, or filter_order parameter.
Belitsoft Checklist 1.1.1
Oracle Data Integrator 11.1.1.9.0
Oracle Data Integrator 12.2.1.3.0
Oracle Data Integrator 12.2.1.4.0
1 EDB exploit
605
VMScore
CVE-2008-5998
Multiple SQL injection vulnerabilities in the ajax_checklist_save function in the Ajax Checklist module 5.x prior to 5.x-1.1 for Drupal allow remote authenticated users, with "update ajax checklists" permissions, to execute arbitrary SQL commands via a save operation, r...
Drupal Ajax Checklist 5.x-1.0
1 EDB exploit
NA
CVE-2024-1977
The Restaurant Solutions – Checklist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Checklist points in version 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrato...
NA
CVE-2023-45847
Mattermost fails to to check the length when setting the title in a run checklist in Playbooks, allowing an malicious user to send a specially crafted request and crash the Playbooks plugin
Mattermost Mattermost Server
312
VMScore
CVE-2008-5999
Cross-site scripting (XSS) vulnerability in the Ajax Checklist module 5.x prior to 5.x-1.1 for Drupal allows remote authenticated users, with create and edit permissions for posts, to inject arbitrary web script or HTML via unspecified vectors involving the ajax_checklist filter.
Drupal Ajax Checklist 5.x-1.0
1000
VMScore
CVE-2000-0666
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote malicious users to gain root privileges.
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 5.0
Conectiva Linux 5.1
Conectiva Linux 4.0
Conectiva Linux 4.0es
Debian Debian Linux 2.2
Debian Debian Linux 2.3
Redhat Linux 6.1
Suse Suse Linux 6.4
Redhat Linux 6.2
Suse Suse Linux 7.0
Redhat Linux 6.0
Suse Suse Linux 6.3
Trustix Secure Linux 1.0
Trustix Secure Linux 1.1
3 EDB exploits
605
VMScore
CVE-2019-5774
Omission of the .desktop filetype from the Safe Browsing checklist in SafeBrowsing in Google Chrome on Linux before 72.0.3626.81 allowed an attacker who convinced a user to download a .desktop file to execute arbitrary code via a downloaded .desktop file.
Google Chrome
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Fedoraproject Fedora 29
Fedoraproject Fedora 30
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started