PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
CPE | Name | Operator | Version |
---|---|---|---|
spring | eq | 3.2 | |
document sciences xpression | eq | 4.1 | |
bugzilla | eq | 4.4 | |
nagios looking glass | eq | 1.1 | |
wordpress | eq | 3.6 | |
spip | eq | 2.1 | |
tweet blender | eq | 4.0 | |
ilias elearning | eq | 4.4 | |
pydio | eq | 5.0 | |
struts | eq | 2.3 |
vulners.com/securityvulns/securityvulns:doc:30052
vulners.com/securityvulns/securityvulns:doc:30053
vulners.com/securityvulns/securityvulns:doc:30054
vulners.com/securityvulns/securityvulns:doc:30055
vulners.com/securityvulns/securityvulns:doc:30056
vulners.com/securityvulns/securityvulns:doc:30057
vulners.com/securityvulns/securityvulns:doc:30058
vulners.com/securityvulns/securityvulns:doc:30059
vulners.com/securityvulns/securityvulns:doc:30060
vulners.com/securityvulns/securityvulns:doc:30061
vulners.com/securityvulns/securityvulns:doc:30062
vulners.com/securityvulns/securityvulns:doc:30063
vulners.com/securityvulns/securityvulns:doc:30064
vulners.com/securityvulns/securityvulns:doc:30074
vulners.com/securityvulns/securityvulns:doc:30075
vulners.com/securityvulns/securityvulns:doc:30076
vulners.com/securityvulns/securityvulns:doc:30077
vulners.com/securityvulns/securityvulns:doc:30078
vulners.com/securityvulns/securityvulns:doc:30082
vulners.com/securityvulns/securityvulns:doc:30083
vulners.com/securityvulns/securityvulns:doc:30084
vulners.com/securityvulns/securityvulns:doc:30086
vulners.com/securityvulns/securityvulns:doc:30087
vulners.com/securityvulns/securityvulns:doc:30088
vulners.com/securityvulns/securityvulns:doc:30089
vulners.com/securityvulns/securityvulns:doc:30090
vulners.com/securityvulns/securityvulns:doc:30091
vulners.com/securityvulns/securityvulns:doc:30093
vulners.com/securityvulns/securityvulns:doc:30094
vulners.com/securityvulns/securityvulns:doc:30096
vulners.com/securityvulns/securityvulns:doc:30097
vulners.com/securityvulns/securityvulns:doc:30099
vulners.com/securityvulns/securityvulns:doc:30100
vulners.com/securityvulns/securityvulns:doc:30101
vulners.com/securityvulns/securityvulns:doc:30102
vulners.com/securityvulns/securityvulns:doc:30103
vulners.com/securityvulns/securityvulns:doc:30104
vulners.com/securityvulns/securityvulns:doc:30105
vulners.com/securityvulns/securityvulns:doc:30106
vulners.com/securityvulns/securityvulns:doc:30107
vulners.com/securityvulns/securityvulns:doc:30108
vulners.com/securityvulns/securityvulns:doc:30109
vulners.com/securityvulns/securityvulns:doc:30110
vulners.com/securityvulns/securityvulns:doc:30111
vulners.com/securityvulns/securityvulns:doc:30112
vulners.com/securityvulns/securityvulns:doc:30115
vulners.com/securityvulns/securityvulns:doc:30116
vulners.com/securityvulns/securityvulns:doc:30117
vulners.com/securityvulns/securityvulns:doc:30121
vulners.com/securityvulns/securityvulns:doc:30124