Home
Database of Security Vulnerabilities The database currently holds links to vulnerabilites for 1533 known applications, is updated every 6 hours, and soon cross-referenced by threat family, risk factor, solution type, and links to external sources (like Tutorials, CVE tickets, Securityfocus archive, Secunia product charts, k-OtiK bulletins, Bugtraq Archive, and OSVDB Database).
By Application Name  
  Search :    
 
[ Back ]

App name    
ACal 2.x    6
  1. ACal "path" Parameter Handling Remote File Inclusion Vulnerability (796hits)
  2. ACal "path" File Inclusion Vulnerability (886hits)
  3. ACal edit.php Template Modification Arbitrary PHP Code Execution (721hits)
  4. ACal login.php ACalAuthenticate Cookie Manipulation Authentication Bypass (764hits)
  5. ACal "ACalAuthenticate" Authentication Bypass Vulnerability (779hits)
  6. ACal Project Code Execution and Authentication Bypass Vulnerabilities (763hits)

[ Back ]










French English