Update plugin_vulns.xml

This commit is contained in:
Peter van der Laan
2013-10-08 20:35:38 +02:00
parent 9c53273d1c
commit 0ba35e41b5

View File

@@ -2887,12 +2887,18 @@
<plugin name="nextgen-smooth-gallery">
<vulnerability>
<title>NextGEN Smooth Gallery Blind SQL Injection Vulnerability</title>
<title>NextGEN Smooth Gallery - Blind SQL Injection Vulnerability</title>
<references>
<exploitdb>14541</exploitdb>
</references>
<type>SQLI</type>
</vulnerability>
<vulnerability>
<title>NextGen Smooth Gallery - XSS</title>
<references>
<url>http://packetstormsecurity.com/files/123074/</url>
</references>
<type>XSS</type>
</plugin>
<plugin name="mylinksdump">
@@ -3279,7 +3285,7 @@
<plugin name="fgallery">
<vulnerability>
<title>plugin fGallery 2.4.1 fimrss.php SQL Injection Vulnerability</title>
<title>fGallery 2.4.1 - fimrss.php SQL Injection Vulnerability</title>
<references>
<exploitdb>4993</exploitdb>
</references>
@@ -6577,38 +6583,46 @@
<plugin name="design-approval-system">
<vulnerability>
<title>/admin/walkthrough/walkthrough.php step Parameter Reflected XSS</title>
<title>Design Approval System 3.6 - XSS Vulnerability</title>
<references>
<url>http://seclists.org/bugtraq/2013/Sep/54</url>
<url>http://packetstormsecurity.com/files/123227/</url>
<cve>2013-5711</cve>
<osvdb>97279</osvdb>
</references>
<fixed_in>3.7</fixed_in>
</vulnerability>
<type>XSS</type>
<vulnerability>
</plugin>
<plugin name="event-easy-calendar">
<vulnerability>
<title>Multiple Administrator Action CSRF</title>
<title>Event Easy Calendar 1.0.0 - Multiple Administrator Action CSRF</title>
<references>
<osvdb>97042</osvdb>
<url>http://packetstormsecurity.com/files/123132/</url>
</references>
<type>CSRF</type>
</vulnerability>
<vulnerability>
<title>Multiple Unspecified XSS</title>
<title>Event Easy Calendar 1.0.0 - Multiple Unspecified XSS</title>
<references>
<osvdb>97041</osvdb>
<url>http://packetstormsecurity.com/files/123132/</url>
</references>
<type>XSS</type>
</vulnerability>
</plugin>
<plugin name="bradesco-gateway">
<vulnerability>
<title>falha.php URI Reflected XSS</title>
<title>Bradesco - falha.php URI Reflected XSS</title>
<references>
<osvdb>97624</osvdb>
<cve>2013-5916</cve>
<url>http://packetstormsecurity.com/files/123356/</url>
</references>
<type>XSS</type>
</vulnerability>
</plugin>
@@ -6742,4 +6756,54 @@
</vulnerability>
</plugin>
<plugin name="woopra">
<vulnerability>
<title>Woopra - Remote Code Execution</title>
<references>
<url>http://packetstormsecurity.com/files/123525/</url>
</references>
<type>RCE</type>
</vulnerability>
</plugin>
<plugin name="fgallery_plus">
<vulnerability>
<title>fGallery_Plus - XSS</title>
<references>
<url>http://packetstormsecurity.com/files/123347/</url>
</references>
<type>XSS</type>
</vulnerability>
</plugin>
<plugin name="nospampti">
<vulnerability>
<title>NOSpamPTI 2.1 - Blind SQL Injection</title>
<references>
<url>http://packetstormsecurity.com/files/123331/</url>
</references>
<type>SQLI</type>
</vulnerability>
</plugin>
<plugin name="comment-attachment">
<vulnerability>
<title>Comment Attachment 1.0 - XSS Vulnerability</title>
<references>
<url>http://packetstormsecurity.com/files/123327/</url>
</references>
<type>XSS</type>
</vulnerability>
</plugin>
<plugin name="mukioplayer-for-wordpress">
<vulnerability>
<title>Mukioplayer 1.6 - SQL Injection</title>
<references>
<url>http://packetstormsecurity.com/files/123231/</url>
</references>
<type>SQLI</type>
</vulnerability>
</plugin>
</vulnerabilities>