Update vuln db
This commit is contained in:
@@ -3120,6 +3120,7 @@
|
|||||||
<references>
|
<references>
|
||||||
<osvdb>103308</osvdb>
|
<osvdb>103308</osvdb>
|
||||||
<cve>2014-1889</cve>
|
<cve>2014-1889</cve>
|
||||||
|
<secunia>56950</secunia>
|
||||||
<exploitdb>31571</exploitdb>
|
<exploitdb>31571</exploitdb>
|
||||||
<url>http://packetstormsecurity.com/files/125213/</url>
|
<url>http://packetstormsecurity.com/files/125213/</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -3131,6 +3132,7 @@
|
|||||||
<references>
|
<references>
|
||||||
<osvdb>103307</osvdb>
|
<osvdb>103307</osvdb>
|
||||||
<cve>2014-1888</cve>
|
<cve>2014-1888</cve>
|
||||||
|
<secunia>56950</secunia>
|
||||||
<url>http://packetstormsecurity.com/files/125212/</url>
|
<url>http://packetstormsecurity.com/files/125212/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
@@ -11503,6 +11505,7 @@
|
|||||||
<title>all_in_one_carousel 1.2.20 - /tpl/add_carousel.php id Parameter Reflected XSS</title>
|
<title>all_in_one_carousel 1.2.20 - /tpl/add_carousel.php id Parameter Reflected XSS</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>103351</osvdb>
|
<osvdb>103351</osvdb>
|
||||||
|
<secunia>56962</secunia>
|
||||||
<url>http://seclists.org/bugtraq/2014/Feb/38</url>
|
<url>http://seclists.org/bugtraq/2014/Feb/38</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
@@ -11738,6 +11741,7 @@
|
|||||||
<references>
|
<references>
|
||||||
<cve>2014-2340</cve>
|
<cve>2014-2340</cve>
|
||||||
<osvdb>104402</osvdb>
|
<osvdb>104402</osvdb>
|
||||||
|
<secunia>57362</secunia>
|
||||||
<exploitdb>32701</exploitdb>
|
<exploitdb>32701</exploitdb>
|
||||||
<url>http://packetstormsecurity.com/files/125991/</url>
|
<url>http://packetstormsecurity.com/files/125991/</url>
|
||||||
<url>https://www.htbridge.com/advisory/HTB23206</url>
|
<url>https://www.htbridge.com/advisory/HTB23206</url>
|
||||||
@@ -12257,12 +12261,25 @@
|
|||||||
|
|
||||||
<plugin name="twitget">
|
<plugin name="twitget">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Twitget 3.3.1 - CSRF/XSS vulnerability</title>
|
<title>Twitget 3.3.1 - twitget.php Twitter Setting Manipulation CSRF</title>
|
||||||
<references>
|
<references>
|
||||||
<url>https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1/</url>
|
<osvdb>105705</osvdb>
|
||||||
<cve>2014-2559</cve>
|
<cve>2014-2559</cve>
|
||||||
|
<exploitdb>32868</exploitdb>
|
||||||
|
<url>https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>MULTI</type>
|
<type>CSRF</type>
|
||||||
|
<fixed_in>3.3.3</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>Twitget 3.3.1 - twitget.php twitget_consumer_key Parameter Stored XSS</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>105704</osvdb>
|
||||||
|
<cve>2014-2559</cve>
|
||||||
|
<exploitdb>32868</exploitdb>
|
||||||
|
<url>https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1/</url>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
<fixed_in>3.3.3</fixed_in>
|
<fixed_in>3.3.3</fixed_in>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|||||||
@@ -1845,12 +1845,20 @@
|
|||||||
|
|
||||||
<theme name="archin">
|
<theme name="archin">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Archin - Cross-Site Scripting and Arbitrary File Upload Vulnerabilities</title>
|
<title>Archin 3.2 - Cross-Site Scripting and Arbitrary File Upload Vulnerabilities</title>
|
||||||
<references>
|
<references>
|
||||||
<secunia>50711</secunia>
|
<secunia>50711</secunia>
|
||||||
</references>
|
</references>
|
||||||
<type>MULTI</type>
|
<type>MULTI</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>Archin 3.2 - hades_framework/option_panel/ajax.php Configuration Option Manipulation</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>86991</osvdb>
|
||||||
|
<exploitdb>21646</exploitdb>
|
||||||
|
</references>
|
||||||
|
<type>RCE</type>
|
||||||
|
</vulnerability>
|
||||||
</theme>
|
</theme>
|
||||||
|
|
||||||
<theme name="purity">
|
<theme name="purity">
|
||||||
@@ -3508,4 +3516,15 @@
|
|||||||
</vulnerability>
|
</vulnerability>
|
||||||
</theme>
|
</theme>
|
||||||
|
|
||||||
|
<theme name="linenity">
|
||||||
|
<vulnerability>
|
||||||
|
<title>LineNity 1.20 - download.php imgurl Parameter Remote Path Traversal File Access</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>105767</osvdb>
|
||||||
|
<exploitdb>32861</exploitdb>
|
||||||
|
</references>
|
||||||
|
<type>LFI</type>
|
||||||
|
</vulnerability>
|
||||||
|
</theme>
|
||||||
|
|
||||||
</vulnerabilities>
|
</vulnerabilities>
|
||||||
|
|||||||
Reference in New Issue
Block a user