Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
7.5
CVSSv3
CVE-2018-7719
Published: 25/03/2018 Updated: 18/04/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Subscribe to Acrolinx
Vulnerability Summary
Acrolinx Server prior to 5.2.5 on Windows allows Directory Traversal.
Vulnerability Trend
Vulnerable Product
Search on Vulmon
Subscribe to Product
acrolinx acrolinx_server
Exploits
Exploit DB: Acrolinx Server < 5.2.5 - Directory Traversal
# Exploit Title: Acrolinx Dashboard Directory Traversal # CVE: CVE 2018-7719 # Date: 19022017 # Exploit Author: Berk Dusunur # Vendor Homepage: wwwacrolinxcom # Version:Before 525 PoC Acrolinx dashboard windows works on the server localhost/\\\\\\\\\\\\\\windows\winini wwwberkdusunurnet/2018/ ...
References
CWE-22
https://support.acrolinx.com/hc/en-us/articles/213987685-Acrolinx-Server-Version-5-1-including-subsequent-service-releases-
https://www.exploit-db.com/exploits/44345/
https://nvd.nist.gov
https://www.exploit-db.com/exploits/44345/
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started