Database of Security Vulnerabilities The database currently holds links to vulnerabilites for 1533 known applications, is updated every 6 hours, and soon cross-referenced by threat family, risk factor, solution type, and links to external sources (like Tutorials, CVE tickets, Securityfocus archive, Secunia product charts, k-OtiK bulletins, Bugtraq Archive, and OSVDB Database).
By Application Name  
  Search :    
[ Back ]

App name    
GeSHi 1.x    3
  1. GeSHi Input Validation Hole Lets Remote Users Include Local Files (504hits)
  2. GeSHi "example.php" Remote Information Disclosure Vulnerability (430hits)
  3. GeSHi "example.php" Disclosure of Sensitive Information (704hits)

[ Back ]

French English