Update vuln db

This commit is contained in:
Peter
2014-04-15 22:53:24 +02:00
parent aa617b5106
commit 09de2eb194
2 changed files with 40 additions and 4 deletions

View File

@@ -3120,6 +3120,7 @@
<references> <references>
<osvdb>103308</osvdb> <osvdb>103308</osvdb>
<cve>2014-1889</cve> <cve>2014-1889</cve>
<secunia>56950</secunia>
<exploitdb>31571</exploitdb> <exploitdb>31571</exploitdb>
<url>http://packetstormsecurity.com/files/125213/</url> <url>http://packetstormsecurity.com/files/125213/</url>
</references> </references>
@@ -3131,6 +3132,7 @@
<references> <references>
<osvdb>103307</osvdb> <osvdb>103307</osvdb>
<cve>2014-1888</cve> <cve>2014-1888</cve>
<secunia>56950</secunia>
<url>http://packetstormsecurity.com/files/125212/</url> <url>http://packetstormsecurity.com/files/125212/</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
@@ -11503,6 +11505,7 @@
<title>all_in_one_carousel 1.2.20 - /tpl/add_carousel.php id Parameter Reflected XSS</title> <title>all_in_one_carousel 1.2.20 - /tpl/add_carousel.php id Parameter Reflected XSS</title>
<references> <references>
<osvdb>103351</osvdb> <osvdb>103351</osvdb>
<secunia>56962</secunia>
<url>http://seclists.org/bugtraq/2014/Feb/38</url> <url>http://seclists.org/bugtraq/2014/Feb/38</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
@@ -11738,6 +11741,7 @@
<references> <references>
<cve>2014-2340</cve> <cve>2014-2340</cve>
<osvdb>104402</osvdb> <osvdb>104402</osvdb>
<secunia>57362</secunia>
<exploitdb>32701</exploitdb> <exploitdb>32701</exploitdb>
<url>http://packetstormsecurity.com/files/125991/</url> <url>http://packetstormsecurity.com/files/125991/</url>
<url>https://www.htbridge.com/advisory/HTB23206</url> <url>https://www.htbridge.com/advisory/HTB23206</url>
@@ -12257,12 +12261,25 @@
<plugin name="twitget"> <plugin name="twitget">
<vulnerability> <vulnerability>
<title>Twitget 3.3.1 - CSRF/XSS vulnerability</title> <title>Twitget 3.3.1 - twitget.php Twitter Setting Manipulation CSRF</title>
<references> <references>
<url>https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1/</url> <osvdb>105705</osvdb>
<cve>2014-2559</cve> <cve>2014-2559</cve>
<exploitdb>32868</exploitdb>
<url>https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1/</url>
</references> </references>
<type>MULTI</type> <type>CSRF</type>
<fixed_in>3.3.3</fixed_in>
</vulnerability>
<vulnerability>
<title>Twitget 3.3.1 - twitget.php twitget_consumer_key Parameter Stored XSS</title>
<references>
<osvdb>105704</osvdb>
<cve>2014-2559</cve>
<exploitdb>32868</exploitdb>
<url>https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1/</url>
</references>
<type>XSS</type>
<fixed_in>3.3.3</fixed_in> <fixed_in>3.3.3</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>

View File

@@ -1845,12 +1845,20 @@
<theme name="archin"> <theme name="archin">
<vulnerability> <vulnerability>
<title>Archin - Cross-Site Scripting and Arbitrary File Upload Vulnerabilities</title> <title>Archin 3.2 - Cross-Site Scripting and Arbitrary File Upload Vulnerabilities</title>
<references> <references>
<secunia>50711</secunia> <secunia>50711</secunia>
</references> </references>
<type>MULTI</type> <type>MULTI</type>
</vulnerability> </vulnerability>
<vulnerability>
<title>Archin 3.2 - hades_framework/option_panel/ajax.php Configuration Option Manipulation</title>
<references>
<osvdb>86991</osvdb>
<exploitdb>21646</exploitdb>
</references>
<type>RCE</type>
</vulnerability>
</theme> </theme>
<theme name="purity"> <theme name="purity">
@@ -3508,4 +3516,15 @@
</vulnerability> </vulnerability>
</theme> </theme>
<theme name="linenity">
<vulnerability>
<title>LineNity 1.20 - download.php imgurl Parameter Remote Path Traversal File Access</title>
<references>
<osvdb>105767</osvdb>
<exploitdb>32861</exploitdb>
</references>
<type>LFI</type>
</vulnerability>
</theme>
</vulnerabilities> </vulnerabilities>