PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
CPE | Name | Operator | Version |
---|---|---|---|
python-jinja | eq | 2.5 | |
struts | eq | 2.3 | |
dotclear | eq | 6.2 | |
icinga | eq | 1.11 | |
continuity cms | eq | 4.2 | |
revive adserver | eq | 3.0 | |
codeigniter | eq | 2.1 | |
fckeditor | eq | 2.6 | |
transform foundation server | eq | 5.2 | |
participants database | eq | 1.5 |
vulners.com/securityvulns/securityvulns:doc:30825
vulners.com/securityvulns/securityvulns:doc:30826
vulners.com/securityvulns/securityvulns:doc:30827
vulners.com/securityvulns/securityvulns:doc:30828
vulners.com/securityvulns/securityvulns:doc:30829
vulners.com/securityvulns/securityvulns:doc:30830
vulners.com/securityvulns/securityvulns:doc:30831
vulners.com/securityvulns/securityvulns:doc:30832
vulners.com/securityvulns/securityvulns:doc:30833
vulners.com/securityvulns/securityvulns:doc:30834
vulners.com/securityvulns/securityvulns:doc:30835
vulners.com/securityvulns/securityvulns:doc:30836
vulners.com/securityvulns/securityvulns:doc:30837
vulners.com/securityvulns/securityvulns:doc:30838
vulners.com/securityvulns/securityvulns:doc:30839
vulners.com/securityvulns/securityvulns:doc:30840
vulners.com/securityvulns/securityvulns:doc:30842
vulners.com/securityvulns/securityvulns:doc:30843
vulners.com/securityvulns/securityvulns:doc:30844
vulners.com/securityvulns/securityvulns:doc:30845
vulners.com/securityvulns/securityvulns:doc:30846
vulners.com/securityvulns/securityvulns:doc:30847
vulners.com/securityvulns/securityvulns:doc:30848
vulners.com/securityvulns/securityvulns:doc:30849
vulners.com/securityvulns/securityvulns:doc:30850
vulners.com/securityvulns/securityvulns:doc:30851
vulners.com/securityvulns/securityvulns:doc:30852
vulners.com/securityvulns/securityvulns:doc:30853
vulners.com/securityvulns/securityvulns:doc:30854
vulners.com/securityvulns/securityvulns:doc:30855
vulners.com/securityvulns/securityvulns:doc:30856
vulners.com/securityvulns/securityvulns:doc:30857
vulners.com/securityvulns/securityvulns:doc:30858
vulners.com/securityvulns/securityvulns:doc:30859
vulners.com/securityvulns/securityvulns:doc:30860
vulners.com/securityvulns/securityvulns:doc:30861
vulners.com/securityvulns/securityvulns:doc:30862
vulners.com/securityvulns/securityvulns:doc:30863
vulners.com/securityvulns/securityvulns:doc:30864
vulners.com/securityvulns/securityvulns:doc:30865
vulners.com/securityvulns/securityvulns:doc:30866
vulners.com/securityvulns/securityvulns:doc:30868
vulners.com/securityvulns/securityvulns:doc:30869
vulners.com/securityvulns/securityvulns:doc:30870
vulners.com/securityvulns/securityvulns:doc:30871
vulners.com/securityvulns/securityvulns:doc:30872