Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xoops xoops 1.3.9 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-1453
Cross-site scripting (XSS) vulnerability in the MytextSanitizer function in XOOPS 1.3.5 up to and including 1.3.9 and XOOPS 2.0 up to and including 2.0.1 allows remote malicious users to inject arbitrary web script or HTML via a javascript: URL in an IMG tag.
Xoops Xoops 2.0.1
Xoops Xoops 1.3.9
Xoops Xoops 2.0
Xoops Xoops 1.3.5
Xoops Xoops 1.3.6
Xoops Xoops 1.3.7
Xoops Xoops 1.3.8
1 EDB exploit
NA
CVE-2005-0743
The custom avatar uploading feature (uploader.php) for XOOPS 2.0.9.2 and previous versions allows remote malicious users to upload arbitrary PHP scripts, whose file extensions are not filtered.
Xoops Xoops 1.0 Rc1
Xoops Xoops 1.0 Rc3
Xoops Xoops 1.3.9
Xoops Xoops 2.0
Xoops Xoops 1.3.5
Xoops Xoops 1.3.6
Xoops Xoops 2.0.5
Xoops Xoops 2.0.5.1
Xoops Xoops 1.3.7
Xoops Xoops 1.3.8
Xoops Xoops 2.0.5.2
Xoops Xoops 2.0.9.2
Xoops Xoops 1.0 Rc3.0.5
Xoops Xoops 1.3.10
Xoops Xoops 2.0.1
Xoops Xoops 2.0.2
Xoops Xoops 2.0.3
NA
CVE-2009-4851
The activation resend function in the Profiles module in XOOPS prior to 2.4.1 sends activation codes in response to arbitrary activation requests, which allows remote malicious users to bypass administrative approval via a request involving activate.php.
Xoops Xoops 1.0
Xoops Xoops 1.0 Rc3
Xoops Xoops 1.3.10
Xoops Xoops 1.3.9
Xoops Xoops 2.0.0 Rc2
Xoops Xoops 2.0.5 Rc
Xoops Xoops 2.0.5.2
Xoops Xoops 2.0.9.2
Xoops Xoops 2.0.10 Rc
Xoops Xoops 2.0.13
Xoops Xoops 2.0.13.2
Xoops Xoops 2.0.18
Xoops Xoops 2.3.0 Alpha1
Xoops Xoops 2.3.0
Xoops Xoops 2.3.1
Xoops Xoops 2.4.0 Beta 2
Xoops Xoops
Xoops Xoops 1.3.5
Xoops Xoops 1.3.6
Xoops Xoops 1.3.7
Xoops Xoops 1.3.8
Xoops Xoops 2.0.6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started