Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
5
CVSSv2
CVE-2018-7719
Published: 25/03/2018 Updated: 18/04/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Vulnerability Summary
Acrolinx Server prior to 5.2.5 on Windows allows Directory Traversal.
Subscribe to Acrolinx Server
Vulnerability Trend
Vulnerable Product
Search on Vulmon
Subscribe to Product
acrolinx acrolinx server
Exploits
Exploit DB: Acrolinx Server < 5.2.5 - Directory Traversal
# Exploit Title: Acrolinx Dashboard Directory Traversal # CVE: CVE 2018-7719 # Date: 19022017 # Exploit Author: Berk Dusunur # Vendor Homepage: wwwacrolinxcom # Version:Before 525 PoC Acrolinx dashboard windows works on the server localhost/\\\\\\\\\\\\\\windows\winini wwwberkdusunurnet/2018/ ...
References
CWE-22
https://support.acrolinx.com/hc/en-us/articles/213987685-Acrolinx-Server-Version-5-1-including-subsequent-service-releases-
https://www.exploit-db.com/exploits/44345/
https://nvd.nist.gov
https://www.exploit-db.com/exploits/44345/
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started