PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
CPE | Name | Operator | Version |
---|---|---|---|
woltlab burning board | eq | 3.9 | |
php-font-lib | eq | 0.3 | |
e-store | eq | 2.0 | |
cacti | eq | 0.8 | |
vtiger crm | eq | 6.0 | |
synology dsm | eq | 4.3 | |
mediawiki | eq | 1.22 | |
phpmybackuppro | eq | 2.4 | |
telligent evolution | eq | 7.5 | |
phpfox | eq | 3.7 |
vulners.com/securityvulns/securityvulns:doc:30615
vulners.com/securityvulns/securityvulns:doc:30616
vulners.com/securityvulns/securityvulns:doc:30618
vulners.com/securityvulns/securityvulns:doc:30621
vulners.com/securityvulns/securityvulns:doc:30622
vulners.com/securityvulns/securityvulns:doc:30624
vulners.com/securityvulns/securityvulns:doc:30625
vulners.com/securityvulns/securityvulns:doc:30627
vulners.com/securityvulns/securityvulns:doc:30628
vulners.com/securityvulns/securityvulns:doc:30629
vulners.com/securityvulns/securityvulns:doc:30630
vulners.com/securityvulns/securityvulns:doc:30631
vulners.com/securityvulns/securityvulns:doc:30632
vulners.com/securityvulns/securityvulns:doc:30633
vulners.com/securityvulns/securityvulns:doc:30634
vulners.com/securityvulns/securityvulns:doc:30637
vulners.com/securityvulns/securityvulns:doc:30638
vulners.com/securityvulns/securityvulns:doc:30639
vulners.com/securityvulns/securityvulns:doc:30640
vulners.com/securityvulns/securityvulns:doc:30641
vulners.com/securityvulns/securityvulns:doc:30642
vulners.com/securityvulns/securityvulns:doc:30643
vulners.com/securityvulns/securityvulns:doc:30644
vulners.com/securityvulns/securityvulns:doc:30645
vulners.com/securityvulns/securityvulns:doc:30647
vulners.com/securityvulns/securityvulns:doc:30648
vulners.com/securityvulns/securityvulns:doc:30649
vulners.com/securityvulns/securityvulns:doc:30652
vulners.com/securityvulns/securityvulns:doc:30653
vulners.com/securityvulns/securityvulns:doc:30654
vulners.com/securityvulns/securityvulns:doc:30655
vulners.com/securityvulns/securityvulns:doc:30656
vulners.com/securityvulns/securityvulns:doc:30658
vulners.com/securityvulns/securityvulns:doc:30662
vulners.com/securityvulns/securityvulns:doc:30663
vulners.com/securityvulns/securityvulns:doc:30664
vulners.com/securityvulns/securityvulns:doc:30665
vulners.com/securityvulns/securityvulns:doc:30666
vulners.com/securityvulns/securityvulns:doc:30667
vulners.com/securityvulns/securityvulns:doc:30668
vulners.com/securityvulns/securityvulns:doc:30669
vulners.com/securityvulns/securityvulns:doc:30672
vulners.com/securityvulns/securityvulns:doc:30673
vulners.com/securityvulns/securityvulns:doc:30675
vulners.com/securityvulns/securityvulns:doc:30676
vulners.com/securityvulns/securityvulns:doc:30677
vulners.com/securityvulns/securityvulns:doc:30678
vulners.com/securityvulns/securityvulns:doc:30679
vulners.com/securityvulns/securityvulns:doc:30680
vulners.com/securityvulns/securityvulns:doc:30683
vulners.com/securityvulns/securityvulns:doc:30684