Max CVSS | 9.3 | Min CVSS | 5.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2019-12939 | 7.5 |
LiveZilla Server before 8.0.1.1 is vulnerable to SQL Injection in server.php via the p_ext_rse parameter.
|
26-06-2019 - 10:15 | 24-06-2019 - 16:15 | |
CVE-2003-1178 | 7.5 |
Eval injection vulnerability in comments.php in Advanced Poll 2.0.2 allows remote attackers to execute arbitrary PHP code via the (1) id, (2) template_set, or (3) action parameter.
|
19-10-2018 - 15:29 | 31-12-2003 - 05:00 | |
CVE-2003-1179 | 7.5 |
Multiple PHP remote file inclusion vulnerabilities in Advanced Poll 2.0.2 allow remote attackers to execute arbitrary PHP code via the include_path parameter in (1) booth.php, (2) png.php, (3) poll_ssi.php, or (4) popup.php, the (5) base_path paramet
|
19-10-2018 - 15:29 | 31-12-2003 - 05:00 | |
CVE-2006-1308 | 9.3 |
Unspecified vulnerability in Microsoft Excel 2000 through 2004 allows user-assisted attackers to execute arbitrary code via a .xls file with a crafted FNGROUPCOUNT value.
|
12-10-2018 - 21:39 | 13-07-2006 - 22:05 | |
CVE-2008-1942 | 6.8 |
Foxit Reader 2.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with (1) a malformed ExtGState resource containing a /Font resource, or (2) an XObject resource with a Rotate setting, wh
|
08-08-2017 - 01:30 | 25-04-2008 - 06:05 | |
CVE-2003-1181 | 5.0 |
Advanced Poll 2.0.2 allows remote attackers to obtain sensitive information via an HTTP request to info.php, which invokes the phpinfo() function.
|
11-07-2017 - 01:29 | 25-10-2003 - 04:00 | |
CVE-2003-1180 | 7.5 |
Directory traversal vulnerability in Advanced Poll 2.0.2 allows remote attackers to read arbitrary files or inject arbitrary local PHP files via .. sequences in the base_path or pollvars[lang] parameters to the admin files (1) index.php, (2) admin_tp
|
11-07-2017 - 01:29 | 31-12-2003 - 05:00 | |
CVE-2017-6325 | 6.0 |
The Symantec Messaging Gateway can encounter a file inclusion vulnerability, which is a type of vulnerability that is most commonly found to affect web applications that rely on a scripting run time. This issue is caused when an application builds a
|
07-07-2017 - 01:29 | 26-06-2017 - 21:29 |