PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
CPE | Name | Operator | Version |
---|---|---|---|
mojoportal | eq | 2.3 | |
phpfox | eq | 3.6 | |
virtuemart | eq | 2.0 | |
owncloud | eq | 5.0 | |
struts | eq | 2.3 | |
xymon | eq | 4.2 | |
soltech.cms | eq | 0.4 | |
cacti | eq | 0.8 | |
avaya ip office customer call reporter | eq | 9.0 | |
testimonial | eq | 2.2 |
vulners.com/securityvulns/securityvulns:doc:29730
vulners.com/securityvulns/securityvulns:doc:29731
vulners.com/securityvulns/securityvulns:doc:29732
vulners.com/securityvulns/securityvulns:doc:29733
vulners.com/securityvulns/securityvulns:doc:29734
vulners.com/securityvulns/securityvulns:doc:29735
vulners.com/securityvulns/securityvulns:doc:29736
vulners.com/securityvulns/securityvulns:doc:29737
vulners.com/securityvulns/securityvulns:doc:29738
vulners.com/securityvulns/securityvulns:doc:29739
vulners.com/securityvulns/securityvulns:doc:29740
vulners.com/securityvulns/securityvulns:doc:29741
vulners.com/securityvulns/securityvulns:doc:29742
vulners.com/securityvulns/securityvulns:doc:29743
vulners.com/securityvulns/securityvulns:doc:29744
vulners.com/securityvulns/securityvulns:doc:29745
vulners.com/securityvulns/securityvulns:doc:29746
vulners.com/securityvulns/securityvulns:doc:29747
vulners.com/securityvulns/securityvulns:doc:29748
vulners.com/securityvulns/securityvulns:doc:29749
vulners.com/securityvulns/securityvulns:doc:29750
vulners.com/securityvulns/securityvulns:doc:29751
vulners.com/securityvulns/securityvulns:doc:29752
vulners.com/securityvulns/securityvulns:doc:29753
vulners.com/securityvulns/securityvulns:doc:29754
vulners.com/securityvulns/securityvulns:doc:29755
vulners.com/securityvulns/securityvulns:doc:29756
vulners.com/securityvulns/securityvulns:doc:29757
vulners.com/securityvulns/securityvulns:doc:29758
vulners.com/securityvulns/securityvulns:doc:29759
vulners.com/securityvulns/securityvulns:doc:29760
vulners.com/securityvulns/securityvulns:doc:29761
vulners.com/securityvulns/securityvulns:doc:29762
vulners.com/securityvulns/securityvulns:doc:29763
vulners.com/securityvulns/securityvulns:doc:29764
vulners.com/securityvulns/securityvulns:doc:29765
vulners.com/securityvulns/securityvulns:doc:29766
vulners.com/securityvulns/securityvulns:doc:29767
vulners.com/securityvulns/securityvulns:doc:29768
vulners.com/securityvulns/securityvulns:doc:29769
vulners.com/securityvulns/securityvulns:doc:29770
vulners.com/securityvulns/securityvulns:doc:29771
vulners.com/securityvulns/securityvulns:doc:29772
vulners.com/securityvulns/securityvulns:doc:29773
vulners.com/securityvulns/securityvulns:doc:29774
vulners.com/securityvulns/securityvulns:doc:29775
vulners.com/securityvulns/securityvulns:doc:29776
vulners.com/securityvulns/securityvulns:doc:29777
vulners.com/securityvulns/securityvulns:doc:29778
vulners.com/securityvulns/securityvulns:doc:29779
vulners.com/securityvulns/securityvulns:doc:29780
vulners.com/securityvulns/securityvulns:doc:29781
vulners.com/securityvulns/securityvulns:doc:29782
vulners.com/securityvulns/securityvulns:doc:29783
vulners.com/securityvulns/securityvulns:doc:29784
vulners.com/securityvulns/securityvulns:doc:29785
vulners.com/securityvulns/securityvulns:doc:29786
vulners.com/securityvulns/securityvulns:doc:29787
vulners.com/securityvulns/securityvulns:doc:29788