PhpNewsManager version 1.46 allows for arbitrary file reading due to being susceptible to a directory traversal attack.
340c2bf12eaf6e9a64fbb3a6e669b7646c444d064e1d432c3c336d3153659923
OWLS version 1.0 allows for remote file retrieval via directory traversal attacks.
13843490796feb811f362b4296313ee648e9ac12354d4bc7831e144c1b2970a5
In the Online Store Kit 3.0 Products, problems exist where user-supplied data is not properly sanitized, allowing for a remote attacker to influence SQL queries and gain sensitive information.
91655534097ed426223b3cbc07ebef79a74c042776ee4f6fd5ddc69f2150cfa5
ShopCartCGI version 2.3 has multiple directory traversal vulnerabilities that allow for remote attackers to gain access to files outside of the webroot.
3eeebaf9d2b5e316af46dacc9f5e43e3514a13a208d6dd32174dafe0c219bc6d
BosDates lacks sufficient sanitization of user-supplied data. Inadvertantly, it allows a remote attacker to influence SQL query logic to disclose sensitive information that can be used to gain unauthorized access.
99f16a5fc0fa02d0ef6ab68973a1477d5cc41f825bce692666aeaceb13a1ba27
Multiple SQL Injection vulnerabilities live in ReviewPost PHP Pro due to insufficient sanitization of user-supplied data.
ebc67630c35361eae82fca9970ac250ef2e0cde6a6c9ca3b39f3c9f8e8441843
Photopost PHP Pro versions 4.6 and below suffer from a SQL injection vulnerability due to a lack of variable sanitization with the photo variable.
c068cb7f6a36484ab9999061ed91dd07ccfb77ea867b7a814ae664e44f706fb1