10717 | SHOUTcast Server User-Agent / Host Header DoS | medium |
10716 | OmniHTTPd Encoded Space Request Script Source Disclosure | medium |
10715 | BEA WebLogic Hex Encoded Request JSP Source Disclosure | medium |
10712 | Quikstore Shopping Cart quikstore.cgi Multiple Vulnerabilities | medium |
10711 | Sambar Server pagecount CGI Traversal Arbitrary File Overwrite | medium |
10701 | PHP Safe Mode mail Function 5th Parameter Arbitrary Command Execution | medium |
10696 | Tarantella Enterprise ttawebtop.cgi pg Parameter Traversal Arbitrary File Access | high |
10686 | BroadVision One-To-One Enterprise Nonexistent JSP Request Path Disclosure | medium |
10679 | Directory Pro Traversal Arbitrary File Access | medium |
10669 | A1Stats Multiple Script Traversal Arbitrary File Access | medium |
10665 | Tektronix PhaserLink Multiple Admin Page Unauthenticated Configuration Manipulation | medium |
10664 | PerlCal cal_make.pl p0 Parameter Traversal Arbitrary File Read | high |
10655 | PHP-Nuke opendir.php Traversal Arbitrary File Read | medium |
10650 | Trend Micro InterScan VirusWall catinfo CGI Overflow | critical |
10649 | processit CGI Environment Variable Remote Information Disclosure | medium |
10645 | uStorekeeper ustorekeeper.pl file Parameter Traversal Arbitrary File Access | medium |
10644 | Ananconda Partners Clipper anacondaclip.pl Traversal Arbitrary File Access | medium |
10641 | MAILNEWS mailnews.cgi Arbitrary Command Execution | high |
10639 | Thinking Arts ES.One store.cgi StartID Parameter Traversal Arbitrary File Access | high |
10638 | HIS AUktion auktion.cgi Traversal Arbitrary Command Execution | high |
10628 | PHP < 4.0.4 IMAP Module imap_open() Function Overflow | medium |
10627 | ROADS search.pl form Parameter Traversal Arbitrary File Access | medium |
10616 | WebSPIRS webspirs.cgi Traversal Arbitrary File Access | medium |
10614 | W3.org Anaya Web sendtemp.pl 'templ' Parameter Traversal Arbitrary File Access | high |
10612 | Commerce.CGI Shopping Cart commerce.cgi page Parameter Traversal Arbitrary File Access | medium |
10611 | PALS Library System WebPALS pals-cgi Multiple Vulnerabilities | high |
10610 | Way-board way-board.cgi db Parameter Arbitrary File Access | medium |
10609 | Muscat Empower CGI Malformed DB Parameter Path Disclosure | medium |
10604 | Allaire JRun Crafted Request Forced Directory Listing | medium |
10602 | iWeb Hyperseek 2000 hsx.cgi show Parameter Traversal Arbitrary File Read | medium |
10601 | Basilix Webmail .class / .inc Direct Request Remote Information Disclosure | medium |
10597 | wwwwais QUERY_STRING Parameter Remote Overflow | high |
10593 | Phorum common.php ForumLang Parameter Traversal Arbitrary File Access | medium |
10592 | Informix webdriver CGI Unauthenticated Database Access | medium |
10591 | Metertek pagelog.cgi Traversal Arbitrary File Access | medium |
10590 | Samba Web Administration Tool (SWAT) Error Message Username Enumeration | medium |
10586 | News Desk newsdesk.cgi t Parameter Traversal Arbitrary File Access | medium |
10584 | Technote main.cgi filename Parameter Traversal Arbitrary File Access | high |
10583 | DCForum dcboard.cgi Multiple Vulnerabilities | high |
10581 | Cold Fusion Administration Page Overflow DoS | medium |
10570 | Unify eWave ServletExec 3.0C UploadServlet Unprivileged File Upload | high |
10574 | PHPix album Parameter Encoded Traversal Arbitrary File/Directory Access | medium |
10566 | MailMan Webmail mmstdod.cgi Arbitrary Command Execution | critical |
10564 | Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow | critical |
10562 | Master Index search.cgi Traversal Arbitrary File/Directory Access | medium |
10552 | CGIForum cgiforum.pl thesection Parameter Traversal Arbitrary File Access | medium |
10542 | Verity UltraSeek 3.1.x Malformed URL Remote DoS | medium |
10536 | Anaconda Foundation Directory apexec.pl template Parameter Traversal Arbitrary File Retrieval | medium |
10535 | PHP Error Log Format String Command Injection | medium |
10533 | Bytes Interactive Web Shopper shopper.cgi Traversal Arbitrary File Access | medium |