Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
validation vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2023-22955
An issue exists on AudioCodes VoIP desk phones up to and including 3.4.4.1000. The validation of firmware images only consists of simple checksum checks for different firmware components. Thus, by knowing how to calculate and where to store the required checksums for the flasher ...
Audiocodes C470hd Firmware
Audiocodes C455hd Firmware
Audiocodes C435hd Firmware
Audiocodes 445hd Firmware
Audiocodes 405hd Firmware
Audiocodes C450hd Firmware
NA
CVE-2005-4622
Directory traversal vulnerability in eFileGo 3.01 allows remote malicious users to execute arbitrary code, read arbitrary files, and upload arbitrary files via a ... (triple dot) in (1) the URL on port 608 and (2) the argument to upload.exe.
Efilego Efilego 3.0.1
1 EDB exploit
NA
CVE-2006-0240
Multiple SQL injection vulnerabilities in Simple Blog 2.1 allow remote malicious users to execute arbitrary SQL commands via the month parameter in an archives view operation and possibly certain other parameters in unspecified scripts.
8pixel.net Simple Blog
1 EDB exploit
NA
CVE-2007-3354
Multiple SQL injection vulnerabilities in NetClassifieds Premium Edition allow remote malicious users to execute arbitrary SQL commands via the s_user_id parameter to ViewCat.php and other unspecified vectors. NOTE: the CatID/ViewCat.php, CatID/gallery.php, and ItemNum/ViewItem.p...
Scriptdevelopers.net Netclassifieds 1.9.6.3
Scriptdevelopers.net Netclassifieds 1.0.1
Scriptdevelopers.net Netclassifieds 1.5.1
1 EDB exploit
9.8
CVSSv3
CVE-2018-19971
JFrog Artifactory Pro 6.5.9 has Incorrect Access Control.
Jfrog Artifactory 6.5.9
NA
CVE-2006-2699
Cross-site scripting (XSS) vulnerability in getimage.php in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to inject arbitrary HTML or web script via the image argument in a show action.
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.5 Sr1
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.8 1
Geeklog Geeklog 1.3.8 1 Sr1
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.9 Rc2
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.10 Rc1
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.11 Sr4
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.7 Sr4
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.11 Rc1
1 EDB exploit
7.5
CVSSv3
CVE-2020-29043
An issue exists in BigBlueButton up to and including 2.2.29. When at attacker is able to view an account_activations/edit?token= URI, the attacker can create an approved user account associated with an email address that has an arbitrary domain name.
Bigbluebutton Bigbluebutton
NA
CVE-2006-5943
Multiple SQL injection vulnerabilities in inventory/display/imager.asp in Website Designs for Less Inventory Manager allow remote malicious users to execute arbitrary SQL commands via the (1) pictable, (2) picfield, or (3) where parameter.
Website Designs For Less Inventory Manager
1 EDB exploit
NA
CVE-2010-0614
SQL injection vulnerability in ajax.php in evalSMSI 2.1.03 allows remote malicious users to execute arbitrary SQL commands via the query parameter in the (1) question action, and possibly the (2) sub_par or (3) num_quest actions.
Myshell Evalsmsi 2.1.03
1 EDB exploit
NA
CVE-2005-4205
Cross-site scripting (XSS) vulnerability in searchdb.asp in LocazoList 1.03c and previous versions allows remote malicious users to inject arbitrary web script or HTML via the q parameter.
Locazo Locazolist Classifieds
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-34377
CVE-2024-20859
CVE-2023-49606
inject
arbitrary
CVE-2024-33788
CVE-2024-30973
IDOR
CVE-2024-33907
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »