Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
liquidworm vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-4865
Buffer overflow in Oreans Themida 2.1.8.0 allows remote malicious users to execute arbitrary code via a crafted .TMD file.
Oreans Themida 2.1.8.0
1 EDB exploit
5.9
CVSSv3
CVE-2013-5123
The mirroring support (-M, --use-mirrors) in Python Pip prior to 1.5 uses insecure DNS querying and authenticity checks which allows malicious users to perform man-in-the-middle attacks.
Pypa Pip
Virtualenv Virtualenv 12.0.7
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Redhat Openshift 1.0
Redhat Openshift 2.0
Redhat Software Collections -
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
1 EDB exploit
NA
CVE-2014-4034
SQL injection vulnerability in zero_view_article.php in ZeroCMS 1.0 allows remote malicious users to execute arbitrary SQL commands via the article_id parameter.
Aas9 Zerocms 1.0
1 EDB exploit
NA
CVE-2012-2905
Artiphp CMS 5.5.0 Neo (r422) stores database backups with predictable names under the web root with insufficient access control, which allows remote malicious users to obtain sensitive information via a direct request.
Artiphp Artiphp Cms 5.5.0
1 EDB exploit
NA
CVE-2008-5667
The scanning engine in VirusBlokAda VBA32 Personal Antivirus 3.12.8.x allows remote malicious users to cause a denial of service (memory corruption and application crash) via a malformed RAR archive.
Virusblokada Vba32 Personal Antivirus 3.12.8
1 EDB exploit
NA
CVE-2012-2740
SQL injection vulnerability in public_html/lists/admin in phpList prior to 2.10.18 allows remote malicious users to execute arbitrary SQL commands via the sortby parameter in a find action.
Phplist Phplist 2.10.13
Phplist Phplist 2.10.16
Phplist Phplist 2.10.15
Phplist Phplist 2.10.14
Phplist Phplist 2.10.9
Phplist Phplist 2.10.8
Phplist Phplist 2.10.7
Phplist Phplist 2.10.5
Phplist Phplist 2.10.4
Phplist Phplist 2.10.11
Phplist Phplist 2.10.3
Phplist Phplist 2.10.1
Phplist Phplist 2.10.12
Phplist Phplist 2.10.10
Phplist Phplist 2.10.2
Phplist Phplist
1 EDB exploit
NA
CVE-2012-2741
Cross-site scripting (XSS) vulnerability in public_html/lists/admin/ in phpList prior to 2.10.18 allows remote malicious users to inject arbitrary web script or HTML via the num parameter in a reconcileusers action.
Phplist Phplist 2.10.12
Phplist Phplist 2.10.10
Phplist Phplist 2.10.2
Phplist Phplist
Phplist Phplist 2.10.16
Phplist Phplist 2.10.15
Phplist Phplist 2.10.14
Phplist Phplist 2.10.13
Phplist Phplist 2.10.8
Phplist Phplist 2.10.7
Phplist Phplist 2.10.5
Phplist Phplist 2.10.4
Phplist Phplist 2.10.11
Phplist Phplist 2.10.9
Phplist Phplist 2.10.3
Phplist Phplist 2.10.1
1 EDB exploit
NA
CVE-2010-3154
Untrusted search path vulnerability in Adobe Extension Manager CS5 5.0.298 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .mxi or .mxp file.
Adobe Extension Manager Cs5 5.0.298
1 EDB exploit
NA
CVE-2010-3155
Untrusted search path vulnerability in Adobe ExtendScript Toolkit (ESTK) CS5 3.5.0.52 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .jsx file.
Adobe Extendedscript Toolkit Cs5 3.5.0.52
1 EDB exploit
NA
CVE-2014-9101
Multiple cross-site request forgery (CSRF) vulnerabilities in Oxwall 1.7.0 (build 7907 and 7906) and SkaDate Lite 2.0 (build 7651) allow remote malicious users to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks or possibly ...
Skalfa Skadate Lite 2.0
Oxwall Oxwall 1.7.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »