Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xitami xitami 2.5 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2001-1481
Xitami 2.4 up to and including 2.5 b4 stores the Administrator password in plaintext in the default.aut file, whose default permissions are world-readable, which allows remote malicious users to gain privileges.
Xitami Xitami
Xitami Xitami 2.5
10
CVSSv2
CVE-2008-6519
Format string vulnerability in Xitami Web Server 2.2a up to and including 2.5c2, and possibly other versions, allows remote malicious users to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in a Long Running Web Process (...
Imatix Xitami 2.4d7
Imatix Xitami 2.5c2
Imatix Xitami 2.5
Imatix Xitami 2.2a
Imatix Xitami 2.4
1 EDB exploit
4.3
CVSSv2
CVE-2002-1965
Cross-site scripting (XSS) vulnerability in Errors.gsl in Imatix Xitami 2.5b4 and 2.5b5 allows remote malicious users to inject arbitrary web script or HTML via the (1) Javascript events, as demonstrated via an onerror event in an IMG SRC tag or (2) User-Agent field in an HTTP GE...
Imatix Xitami 2.5 B5
Imatix Xitami 2.5 B4
1 EDB exploit
7.5
CVSSv2
CVE-2007-5067
Multiple buffer overflows in iMatix Xitami Web Server 2.5c2 allow remote malicious users to execute arbitrary code via a long If-Modified-Since header to (1) xigui32.exe or (2) xitami.exe.
Imatix Xitami 2.5 C2
2 EDB exploits
5
CVSSv2
CVE-2002-1942
Imatix Xitami 2.5 b5 does not properly terminate certain Keep-Alive connections that have been broken or closed early, which allows remote malicious users to cause a denial of service (crash) via a large number of concurrent sessions.
Imatix Xitami 2.5 B5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started