Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
khashayar fereidani vulnerabilities and exploits
(subscribe to this query)
9
CVSSv2
CVE-2008-2081
Directory traversal vulnerability in index.php in Siteman 2.0.x2 allows remote authenticated administrators to include and execute arbitrary local files via a .. (dot dot) in the module parameter.
Siteman Siteman 2.0
1 EDB exploit
7.5
CVSSv2
CVE-2015-8562
Joomla! 1.5.x, 2.x, and 3.x prior to 3.4.6 allow remote malicious users to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.
Joomla Joomla! 1.6.4
Joomla Joomla! 2.5.19
Joomla Joomla! 2.5.7
Joomla Joomla! 2.5.17
Joomla Joomla! 1.5.24
Joomla Joomla! 3.1.4
Joomla Joomla! 3.1.3
Joomla Joomla! 1.7.1
Joomla Joomla! 3.3.3
Joomla Joomla! 2.5.25
Joomla Joomla! 1.5.26
Joomla Joomla! 1.5.11
Joomla Joomla! 3.2.1
Joomla Joomla! 1.5.25
Joomla Joomla! 1.6.3
Joomla Joomla! 1.5.13
Joomla Joomla! 2.5.22
Joomla Joomla! 3.4.4
Joomla Joomla! 1.5.3
Joomla Joomla! 3.4.2
Joomla Joomla! 3.3.4
Joomla Joomla! 2.5.8
2 EDB exploits
20 Github repositories
7.5
CVSSv2
CVE-2009-3824
Directory traversal vulnerability in include/processor.php in Greenwood PHP Content Manager 0.3.2 allows remote malicious users to include and execute arbitrary local files via a .. (dot dot) in the content_path parameter.
Michael J Greenwood Php Content Manager 0.3.2
1 EDB exploit
7.5
CVSSv2
CVE-2009-3541
PHP remote file inclusion vulnerability in CoupleDB.php in PHPGenealogy 2.0 allows remote malicious users to execute arbitrary PHP code via a URL in the DataDirectory parameter.
Phpgenealogy Phpgenealogy 2.0
1 EDB exploit
7.5
CVSSv2
CVE-2009-3543
SQL injection vulnerability in _phenotype/admin/login.php in Phenotype CMS prior to 2.9 allows remote malicious users to execute arbitrary SQL commands via the user parameter (aka the login name).
Phenotype-cms Phenotype Cms 1.0
Phenotype-cms Phenotype Cms 2.6
Phenotype-cms Phenotype Cms 2.4
Phenotype-cms Phenotype Cms 2.5
Phenotype-cms Phenotype Cms 2.7
Phenotype-cms Phenotype Cms 2.5.1
Phenotype-cms Phenotype Cms
Phenotype-cms Phenotype Cms 2.1
Phenotype-cms Phenotype Cms 2.2
Phenotype-cms Phenotype Cms 2.0
Phenotype-cms Phenotype Cms 2.3
1 EDB exploit
7.5
CVSSv2
CVE-2008-7005
include/modules/top/1-random_quote.php in Minb Is Not a Blog (minb) 0.1.0 allows remote malicious users to execute arbitrary PHP code via the quotes_to_edit parameter. NOTE: this issue has been reported as an unrestricted file upload by some sources, but that is a potential conse...
Minb Minb Is Not A Blog 0.1.0
1 EDB exploit
7.5
CVSSv2
CVE-2008-6989
SQL injection vulnerability in gallery.php in Easy Photo Gallery (aka Ezphotogallery) 2.1 allows remote malicious users to execute arbitrary SQL commands via the username parameter.
Ezphotogallery Ezphotogallery 2.1
1 EDB exploit
7.5
CVSSv2
CVE-2008-6983
modules/tool/hitcounter.php in devalcms 1.4a allows remote malicious users to execute arbitrary PHP code via the HTTP Referer header with a target file specified in the gv_folder_data parameter, as demonstrated by modifying modules/tool/url2header.php.
Devalcms Devalcms 1.4a
1 EDB exploit
7.5
CVSSv2
CVE-2008-6990
SQL injection vulnerability in gallery.php in Easy Photo Gallery (aka Ezphotogallery) 2.1 allows remote malicious users to execute arbitrary SQL commands via the password parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third pa...
Ezphotogallery Ezphotogallery 2.1
1 EDB exploit
7.5
CVSSv2
CVE-2008-6517
SQL injection vulnerability in NewsHOWLER 1.03 Beta allows remote malicious users to execute arbitrary SQL commands via the news_user cookie parameter.
Nick Jenkin Newshowler 1.0.3 Beta
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »