Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
deadly demon vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2010-4619
SQL injection vulnerability in profil.php in Mafya Oyun Scrpti (aka Mafia Game Script) allows remote malicious users to execute arbitrary SQL commands via the id parameter.
Webscripti Mafya Oyun Scrpti
2 EDB exploits
7.5
CVSSv2
CVE-2010-4842
SQL injection vulnerability in admin/login.php in MHP DownloadScript (aka MH Products Download Center) 2.2 allows remote malicious users to execute arbitrary SQL commands via the Name parameter. NOTE: some of these details are obtained from third party information.
Mhproducts Download Center 2.2
1 EDB exploit
7.5
CVSSv2
CVE-2010-4845
Multiple SQL injection vulnerabilities in MH Products Projekt Shop allow remote malicious users to execute arbitrary SQL commands via the (1) ts parameter to details.php and possibly the (2) ilceler parameter to index.php.
Mhproducts Projekt Shop
1 EDB exploit
7.5
CVSSv2
CVE-2010-4846
SQL injection vulnerability in view_item.php in MH Products Pay Pal Shop Digital allows remote malicious users to execute arbitrary SQL commands via the ItemID parameter.
Mhproducts Pay Pal Shop Digital
1 EDB exploit
7.5
CVSSv2
CVE-2010-4614
SQL injection vulnerability in item.php in Ero Auktion 2010 allows remote malicious users to execute arbitrary SQL commands via the id parameter, a different vector than CVE-2010-0723.
Mhproducts Ero Auktion 2010
1 EDB exploit
7.5
CVSSv2
CVE-2010-4615
Multiple SQL injection vulnerabilities in Oto Galeri Sistemi 1.0 allow remote malicious users to execute arbitrary SQL commands via the (1) arac parameter to carsdetail.asp and the (2) marka parameter to twohandscars.asp.
Iskenderaltuntas Oto Galeri Sistemi 1.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started