Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cutenews vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-2249
Multiple cross-site scripting (XSS) vulnerabilities in search.php in CuteNews 1.4.1 and previous versions, and possibly 1.4.5, allow remote malicious users to inject arbitrary web script or HTML via the (1) user, (2) story, or (3) title parameters.
Cutephp Cutenews 1.3
Cutephp Cutenews 1.3.1
Cutephp Cutenews 0.88
Cutephp Cutenews
Cutephp Cutenews 1.3.2
Cutephp Cutenews 1.3.6
Cutephp Cutenews 1.4.0
Cutephp Cutenews 1.4.5
1 EDB exploit
NA
CVE-2006-1340
CuteNews 1.4.1 and possibly other versions allows remote malicious users to obtain the installation path via unspecified vectors involving an invalid file path.
Cutephp Cutenews
Cutephp Cutenews 0.88
Cutephp Cutenews 1.3
Cutephp Cutenews 1.3.6
Cutephp Cutenews 1.4.0
Cutephp Cutenews 1.3.1
Cutephp Cutenews 1.3.2
NA
CVE-2005-3009
Cross-site scripting (XSS) vulnerability in CuteNews allows remote malicious users to inject arbitrary web script or HTML via the mod parameter to index.php.
Cutephp Cutenews 1.3.6
Cutephp Cutenews 1.3.1
Cutephp Cutenews 1.3.2
Cutephp Cutenews
Cutephp Cutenews 0.88
Cutephp Cutenews 1.3
NA
CVE-2004-1659
Cross-site scripting (XSS) vulnerability in index.php in CuteNews 1.3.6 and previous versions allows remote attackers with Administrator, Editor, Journalist or Commenter privileges to inject arbitrary web script or HTML via the mod parameter.
Cutephp Cutenews 1.3.6
Cutephp Cutenews 1.3.1
Cutephp Cutenews 1.3.2
Cutephp Cutenews 0.88
Cutephp Cutenews 1.3
1 EDB exploit
NA
CVE-2006-4445
Multiple PHP remote file inclusion vulnerabilities in CuteNews 1.3.x allow remote malicious users to execute arbitrary PHP code via a URL in the cutepath parameter to (1) show_news.php or (2) search.php. NOTE: CVE analysis as of 20060829 has not identified any scenarios in which ...
Cutephp Cutenews 1.3.6
Cutephp Cutenews 1.3.2
Cutephp Cutenews 1.3
Cutephp Cutenews 1.3.1
NA
CVE-2009-4250
Multiple cross-site scripting (XSS) vulnerabilities in CutePHP CuteNews 1.4.6 and UTF-8 CuteNews prior to 8b allow remote malicious users to inject arbitrary web script or HTML via (1) the result parameter to register.php; (2) the user parameter to search.php; the (3) cat_msg, (4...
Korn19 Utf-8 Cutenews 4
Korn19 Utf-8 Cutenews 3
Korn19 Utf-8 Cutenews 7
Korn19 Utf-8 Cutenews 6
Korn19 Utf-8 Cutenews 5
Korn19 Utf-8 Cutenews 2
Cutephp Cutenews 1.4.6
Korn19 Utf-8 Cutenews
2 EDB exploits
NA
CVE-2004-1573
The documentation for AJ-Fork 167 implies that users should set permissions for users.db.php to 777, which allows local users to execute arbitrary PHP code and gain privileges as the administrator.
Cutephp Cutenews 0.88
Cutephp Cutenews 1.3
Cutephp Cutenews 1.3.1
Cutephp Cutenews 1.3.2
Cutephp Cutenews 1.3.6
Aj-fork Aj-fork 167
NA
CVE-2004-0660
Cross-site scripting (XSS) vulnerability in (1) show_archives.php, (2) show_news.php, and possibly other php files in CuteNews 1.3.1 allows remote malicious users to inject arbitrary script or HTML via the id parameter.
Cutephp Cutenews 0.88
Cutephp Cutenews 1.3
Cutephp Cutenews 1.3.1
5 EDB exploits
NA
CVE-2009-4172
Cross-site scripting (XSS) vulnerability in index.php in CutePHP CuteNews 1.4.6 and UTF-8 CuteNews 8 and 8b, when magic_quotes_gpc is disabled, allows remote malicious users to inject arbitrary web script or HTML via the body of a news article in an addnews action.
Korn19 Utf-8 Cutenews 8
Korn19 Utf-8 Cutenews 8b
Cutephp Cutenews 1.4.6
2 EDB exploits
NA
CVE-2006-6546
PHP remote file inclusion vulnerability in inc/shows.inc.php in cutenews aj-fork (CN:AJ) 167f and previous versions allows remote malicious users to execute arbitrary PHP code via a URL in the cutepath parameter.
Cutenews Aj-fork Cutenews Aj-fork Beta
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-3675
CVE-2024-3400
CVE-2024-23557
mass assignment
CVE-2023-1389
local file inclusion
CVE-2024-32596
file upload
CVE-2024-32593
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »