PHP inclusions, SQL injections, directory traversals, crossite scripting, etc.
CPE | Name | Operator | Version |
---|---|---|---|
horde passwd | eq | 2.2 | |
woltlab burning board | eq | 2.3 | |
imp | eq | 3.2 | |
forwards | eq | 2.2 | |
phpmyadmin | eq | 2.6 | |
phpmyvisites | eq | 1.3 | |
comersus asp shopping cart | eq | 6.01 | |
webapp | eq | 0.9 | |
mnemo | eq | 1.1 | |
php-nuke | eq | 7.6 |
vulners.com/securityvulns/securityvulns:doc:8419
vulners.com/securityvulns/securityvulns:doc:8420
vulners.com/securityvulns/securityvulns:doc:8421
vulners.com/securityvulns/securityvulns:doc:8422
vulners.com/securityvulns/securityvulns:doc:8423
vulners.com/securityvulns/securityvulns:doc:8424
vulners.com/securityvulns/securityvulns:doc:8425
vulners.com/securityvulns/securityvulns:doc:8430
vulners.com/securityvulns/securityvulns:doc:8431
vulners.com/securityvulns/securityvulns:doc:8432
vulners.com/securityvulns/securityvulns:doc:8433
vulners.com/securityvulns/securityvulns:doc:8434
vulners.com/securityvulns/securityvulns:doc:8435
vulners.com/securityvulns/securityvulns:doc:8436
vulners.com/securityvulns/securityvulns:doc:8437
vulners.com/securityvulns/securityvulns:doc:8438
vulners.com/securityvulns/securityvulns:doc:8439
vulners.com/securityvulns/securityvulns:doc:8440
vulners.com/securityvulns/securityvulns:doc:8445
vulners.com/securityvulns/securityvulns:doc:8446
vulners.com/securityvulns/securityvulns:doc:8452
vulners.com/securityvulns/securityvulns:doc:8453
vulners.com/securityvulns/securityvulns:doc:8454
vulners.com/securityvulns/securityvulns:doc:8455
vulners.com/securityvulns/securityvulns:doc:8456
vulners.com/securityvulns/securityvulns:doc:8457
vulners.com/securityvulns/securityvulns:doc:8458
vulners.com/securityvulns/securityvulns:doc:8459
vulners.com/securityvulns/securityvulns:doc:8466
vulners.com/securityvulns/securityvulns:doc:8467
vulners.com/securityvulns/securityvulns:doc:8477
vulners.com/securityvulns/securityvulns:doc:8478
vulners.com/securityvulns/securityvulns:doc:8479
vulners.com/securityvulns/securityvulns:doc:8480
vulners.com/securityvulns/securityvulns:doc:8481
vulners.com/securityvulns/securityvulns:doc:8482
vulners.com/securityvulns/securityvulns:doc:8483
vulners.com/securityvulns/securityvulns:doc:8485
vulners.com/securityvulns/securityvulns:doc:8486
vulners.com/securityvulns/securityvulns:doc:8487
vulners.com/securityvulns/securityvulns:doc:8495
vulners.com/securityvulns/securityvulns:doc:8497
vulners.com/securityvulns/securityvulns:doc:8501
vulners.com/securityvulns/securityvulns:doc:8502
vulners.com/securityvulns/securityvulns:doc:8503
vulners.com/securityvulns/securityvulns:doc:8507
vulners.com/securityvulns/securityvulns:doc:8509
vulners.com/securityvulns/securityvulns:doc:8511