Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
7.5
CVSSv2
CVE-2013-6225
Published: 13/01/2020 Updated: 17/01/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Subscribe to Livezilla
Vulnerability Summary
LiveZilla 5.0.1.4 has a Remote Code Execution vulnerability
Vulnerability Trend
Vulnerable Product
Search on Vulmon
Subscribe to Product
livezilla livezilla 5.0.1.4
Exploits
Exploit DB: LiveZilla 5.0.1.4 - Remote Code Execution
CVE-2013-6225: Security Advisory – Curesec Research Team 1 Introduction Advisory ID: Cure-2013-1007 Advisory URL: wwwcureseccom/de/veroeffentlichungen /advisorieshtml Blog URL: cureblogde/2013/11/remote-code-execution-in-livezilla/ Affected Product: LiveZilla version 5014 Affected Systems Linux/Windows Fix ...
Exploit DB: Livezilla Code Execution / Local File Inclusion
Livezilla versions prior to 5100 suffers from a local file inclusion vulnerability that allows for remote code execution ...
References
CWE-22
http://www.exploit-db.com/exploits/29672
https://curesec.com/de/veroeffentlichungen/advisories.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/89051
https://nvd.nist.gov
https://www.exploit-db.com/exploits/29672/
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started