Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
liquidworm vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2015-1422
Multiple cross-site scripting (XSS) vulnerabilities in Gecko CMS 2.2 and 2.3 allow remote malicious users to inject arbitrary web script or HTML via the (1) horder[], (2) jak_catid, (3) jak_content, (4) jak_css, (5) jak_delete_log[], (6) jak_email, (7) jak_extfile, (8) jak_file, ...
Jakweb Gecko Cms 2.3
Jakweb Gecko Cms 2.2
1 EDB exploit
6.5
CVSSv2
CVE-2015-1423
Multiple SQL injection vulnerabilities in Gecko CMS 2.2 and 2.3 allow remote administrators to execute arbitrary SQL commands via the (1) jak_delete_log[] or (2) ssp parameter to admin/index.php.
Jakweb Gecko Cms 2.2
Jakweb Gecko Cms 2.3
1 EDB exploit
5
CVSSv2
CVE-2008-5667
The scanning engine in VirusBlokAda VBA32 Personal Antivirus 3.12.8.x allows remote malicious users to cause a denial of service (memory corruption and application crash) via a malformed RAR archive.
Virusblokada Vba32 Personal Antivirus 3.12.8
1 EDB exploit
9.3
CVSSv2
CVE-2010-2321
Buffer overflow in Adobe InDesign CS3 10.0 allows user-assisted remote malicious users to execute arbitrary code via a crafted .indd file.
Adobe Indesign Cs3 10.0
1 EDB exploit
6.8
CVSSv2
CVE-2010-5281
Directory traversal vulnerability in ibrowser.php in the CMScout 2.09 IBrowser TinyMCE Plugin 1.4.1, when magic_quotes_gpc is disabled, allows remote malicious users to read arbitrary files via a .. (dot dot) in the lang parameter. NOTE: some of these details are obtained from th...
Net4visions Ibrowser 1.4.1
1 EDB exploit
10
CVSSv2
CVE-2016-1606
Multiple stack-based buffer overflows in COM objects in Micro Focus Rumba 9.4.x prior to 9.4 HF 13960 allow remote malicious users to execute arbitrary code via (1) the NetworkName property value to ObjectXSNAConfig.ObjectXSNAConfig in iconfig.dll, (2) the CPName property value t...
Microfocus Rumba 9.4
1 EDB exploit
9.3
CVSSv2
CVE-2010-3134
Untrusted search path vulnerability in Google Earth 5.1.3535.3218 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse quserex.dll that is located in the same folder as a .kmz file.
Google Earth 5.1.3535.3218
1 EDB exploit
9.3
CVSSv2
CVE-2010-3137
Untrusted search path vulnerability in Nullsoft Winamp 5.581, and probably other versions, allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wnaspi32.dll that is located in the same folder as a .669, ...
Nullsoft Winamp 5.581
1 EDB exploit
9.3
CVSSv2
CVE-2010-3154
Untrusted search path vulnerability in Adobe Extension Manager CS5 5.0.298 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .mxi or .mxp file.
Adobe Extension Manager Cs5 5.0.298
1 EDB exploit
9.3
CVSSv2
CVE-2010-3155
Untrusted search path vulnerability in Adobe ExtendScript Toolkit (ESTK) CS5 3.5.0.52 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .jsx file.
Adobe Extendedscript Toolkit Cs5 3.5.0.52
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5274
CVE-2024-35388
CVE-2024-35396
elevation of privilege
CVE-2021-47544
file upload
CVE-2021-47545
memory leak
CVE-2024-4956
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »