Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
darkjoker vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-0394
SQL injection vulnerability in login.php in Pre Lecture Exercises (PLEs) CMS 1.0 beta 4.2 allows remote malicious users to execute arbitrary SQL commands via the school parameter.
Ple Cms Ple Cms 1.0
1 EDB exploit
NA
CVE-2009-0406
SQL injection vulnerability in index.php in Community CMS 0.4 and previous versions allows remote malicious users to execute arbitrary SQL commands via the id parameter.
Community Cms Community Cms
Community Cms Community Cms 0.1.1
Community Cms Community Cms 0.1
Community Cms Community Cms 0.3
Community Cms Community Cms 0.2
1 EDB exploit
NA
CVE-2009-0768
SQL injection vulnerability in forumhop.php in YapBB 1.2 and previous versions allows remote malicious users to execute arbitrary SQL commands via the forumID parameter in a next action.
Yapbb Yapbb
Yapbb Yapbb 1.1
Yapbb Yapbb 1.2
1 EDB exploit
NA
CVE-2009-3750
SQL injection vulnerability in read.php in ToyLog 0.1 allows remote malicious users to execute arbitrary SQL commands via the idm parameter.
Santostefano Giovanni Toylog 0.1
1 EDB exploit
NA
CVE-2009-3597
Digitaldesign CMS 0.1 stores sensitive information under the web root with insufficient access control, which allows remote malicious users to download the database file via a direct request for autoconfig.dd.
Digitaldesign Cms Project Digitaldesign Cms 0.1
1 EDB exploit
NA
CVE-2009-3713
SQL injection vulnerability in fichero.php in MorcegoCMS 1.7.6 and previous versions allows remote malicious users to execute arbitrary SQL commands via the query string.
Morcego Morcegocms
Morcego Morcegocms 1.5.0
Morcego Morcegocms 1.1.0
Morcego Morcegocms 0.9.6
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2