Update plugin_vulns.xml
This commit is contained in:
@@ -2887,12 +2887,18 @@
|
||||
|
||||
<plugin name="nextgen-smooth-gallery">
|
||||
<vulnerability>
|
||||
<title>NextGEN Smooth Gallery Blind SQL Injection Vulnerability</title>
|
||||
<title>NextGEN Smooth Gallery - Blind SQL Injection Vulnerability</title>
|
||||
<references>
|
||||
<exploitdb>14541</exploitdb>
|
||||
</references>
|
||||
<type>SQLI</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>NextGen Smooth Gallery - XSS</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/123074/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</plugin>
|
||||
|
||||
<plugin name="mylinksdump">
|
||||
@@ -3279,7 +3285,7 @@
|
||||
|
||||
<plugin name="fgallery">
|
||||
<vulnerability>
|
||||
<title>plugin fGallery 2.4.1 fimrss.php SQL Injection Vulnerability</title>
|
||||
<title>fGallery 2.4.1 - fimrss.php SQL Injection Vulnerability</title>
|
||||
<references>
|
||||
<exploitdb>4993</exploitdb>
|
||||
</references>
|
||||
@@ -6577,38 +6583,46 @@
|
||||
|
||||
<plugin name="design-approval-system">
|
||||
<vulnerability>
|
||||
<title>/admin/walkthrough/walkthrough.php step Parameter Reflected XSS</title>
|
||||
<title>Design Approval System 3.6 - XSS Vulnerability</title>
|
||||
<references>
|
||||
<url>http://seclists.org/bugtraq/2013/Sep/54</url>
|
||||
<url>http://packetstormsecurity.com/files/123227/</url>
|
||||
<cve>2013-5711</cve>
|
||||
<osvdb>97279</osvdb>
|
||||
</references>
|
||||
<fixed_in>3.7</fixed_in>
|
||||
</vulnerability>
|
||||
<type>XSS</type>
|
||||
<vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="event-easy-calendar">
|
||||
<vulnerability>
|
||||
<title>Multiple Administrator Action CSRF</title>
|
||||
<title>Event Easy Calendar 1.0.0 - Multiple Administrator Action CSRF</title>
|
||||
<references>
|
||||
<osvdb>97042</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/123132/</url>
|
||||
</references>
|
||||
<type>CSRF</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>Multiple Unspecified XSS</title>
|
||||
<title>Event Easy Calendar 1.0.0 - Multiple Unspecified XSS</title>
|
||||
<references>
|
||||
<osvdb>97041</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/123132/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="bradesco-gateway">
|
||||
<vulnerability>
|
||||
<title>falha.php URI Reflected XSS</title>
|
||||
<title>Bradesco - falha.php URI Reflected XSS</title>
|
||||
<references>
|
||||
<osvdb>97624</osvdb>
|
||||
<cve>2013-5916</cve>
|
||||
<url>http://packetstormsecurity.com/files/123356/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
@@ -6742,4 +6756,54 @@
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="woopra">
|
||||
<vulnerability>
|
||||
<title>Woopra - Remote Code Execution</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/123525/</url>
|
||||
</references>
|
||||
<type>RCE</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="fgallery_plus">
|
||||
<vulnerability>
|
||||
<title>fGallery_Plus - XSS</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/123347/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="nospampti">
|
||||
<vulnerability>
|
||||
<title>NOSpamPTI 2.1 - Blind SQL Injection</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/123331/</url>
|
||||
</references>
|
||||
<type>SQLI</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="comment-attachment">
|
||||
<vulnerability>
|
||||
<title>Comment Attachment 1.0 - XSS Vulnerability</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/123327/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="mukioplayer-for-wordpress">
|
||||
<vulnerability>
|
||||
<title>Mukioplayer 1.6 - SQL Injection</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/123231/</url>
|
||||
</references>
|
||||
<type>SQLI</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
</vulnerabilities>
|
||||
|
||||
Reference in New Issue
Block a user