Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
deadly demon vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-4619
SQL injection vulnerability in profil.php in Mafya Oyun Scrpti (aka Mafia Game Script) allows remote malicious users to execute arbitrary SQL commands via the id parameter.
Webscripti Mafya Oyun Scrpti
2 EDB exploits
NA
CVE-2010-4842
SQL injection vulnerability in admin/login.php in MHP DownloadScript (aka MH Products Download Center) 2.2 allows remote malicious users to execute arbitrary SQL commands via the Name parameter. NOTE: some of these details are obtained from third party information.
Mhproducts Download Center 2.2
1 EDB exploit
NA
CVE-2010-4845
Multiple SQL injection vulnerabilities in MH Products Projekt Shop allow remote malicious users to execute arbitrary SQL commands via the (1) ts parameter to details.php and possibly the (2) ilceler parameter to index.php.
Mhproducts Projekt Shop
1 EDB exploit
NA
CVE-2010-4846
SQL injection vulnerability in view_item.php in MH Products Pay Pal Shop Digital allows remote malicious users to execute arbitrary SQL commands via the ItemID parameter.
Mhproducts Pay Pal Shop Digital
1 EDB exploit
NA
CVE-2010-4614
SQL injection vulnerability in item.php in Ero Auktion 2010 allows remote malicious users to execute arbitrary SQL commands via the id parameter, a different vector than CVE-2010-0723.
Mhproducts Ero Auktion 2010
1 EDB exploit
NA
CVE-2010-4615
Multiple SQL injection vulnerabilities in Oto Galeri Sistemi 1.0 allow remote malicious users to execute arbitrary SQL commands via the (1) arac parameter to carsdetail.asp and the (2) marka parameter to twohandscars.asp.
Iskenderaltuntas Oto Galeri Sistemi 1.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started