Added some vulns, references, CVEs (Ref #184)

This commit is contained in:
erwanlr
2013-06-16 12:20:45 +02:00
parent 385b250c01
commit 102585e4c7
2 changed files with 143 additions and 18 deletions

View File

@@ -3,6 +3,50 @@
<vulnerabilities xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" <vulnerabilities xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:noNamespaceSchemaLocation="vuln.xsd"> xsi:noNamespaceSchemaLocation="vuln.xsd">
<plugin name="content-slide">
<vulnerability>
<title>Content Slide Plugin Cross-Site Requst Forgery Vulnerability</title>
<reference>http://secunia.com/advisories/52949/</reference>
<reference>http://osvdb.org/show/osvdb/93871</reference>
<type>CSRF</type>
</vulnerability>
</plugin>
<plugin name="wordpress-simple-paypal-shopping-cart">
<vulnerability>
<title>Simple Paypal Shopping Cart Plugin Cross-Site Request Forgery Vulnerability</title>
<reference>http://secunia.com/advisories/52963/</reference>
<reference>http://osvdb.org/show/osvdb/93953</reference>
<type>CSRF</type>
<fixed_in>3.6</fixed_in>
</vulnerability>
</plugin>
<plugin name="wp-sendsms">
<vulnerability>
<title>WP-SendSMS Plugin for WordPress Setting Manipulation CSRF</title>
<reference>http://secunia.com/advisories/53796/</reference>
<reference>http://osvdb.org/show/osvdb/94209</reference>
<reference>http://www.exploit-db.com/exploits/26124</reference>
<type>CSRF</type>
</vulnerability>
<vulnerability>
<title>WP-SendSMS Plugin for WordPress wp-admin/admin.php Multiple Parameter XSS</title>
<reference>http://osvdb.org/show/osvdb/94210</reference>
<type>XSS</type>
</vulnerability>
</plugin>
<plugin name="mail-subscribe-list">
<vulnerability>
<title>Mail Subscribe List Plugin Script Insertion Vulnerability</title>
<reference>http://secunia.com/advisories/53732/</reference>
<reference>http://osvdb.org/show/osvdb/94197</reference>
<type>XSS</type>
<fixed_in>2.1</fixed_in>
</vulnerability>
</plugin>
<plugin name="s3-video"> <plugin name="s3-video">
<vulnerability> <vulnerability>
<title>VideoJS Cross-Site Scripting Vulnerability</title> <title>VideoJS Cross-Site Scripting Vulnerability</title>
@@ -12,7 +56,7 @@
<fixed_in>0.98</fixed_in> <fixed_in>0.98</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="video-embed-thumbnail-generator"> <plugin name="video-embed-thumbnail-generator">
<vulnerability> <vulnerability>
<title>VideoJS Cross-Site Scripting Vulnerability</title> <title>VideoJS Cross-Site Scripting Vulnerability</title>
@@ -22,7 +66,7 @@
<fixed_in>4.1</fixed_in> <fixed_in>4.1</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="1player"> <plugin name="1player">
<vulnerability> <vulnerability>
<title>VideoJS Cross-Site Scripting Vulnerability</title> <title>VideoJS Cross-Site Scripting Vulnerability</title>
@@ -32,7 +76,7 @@
<fixed_in>1.4</fixed_in> <fixed_in>1.4</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="external-video-for-everybody"> <plugin name="external-video-for-everybody">
<vulnerability> <vulnerability>
<title>VideoJS Cross-Site Scripting Vulnerability</title> <title>VideoJS Cross-Site Scripting Vulnerability</title>
@@ -42,7 +86,7 @@
<fixed_in>2.1</fixed_in> <fixed_in>2.1</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="EasySqueezePage"> <plugin name="EasySqueezePage">
<vulnerability> <vulnerability>
<title>VideoJS Cross-Site Scripting Vulnerability</title> <title>VideoJS Cross-Site Scripting Vulnerability</title>
@@ -50,7 +94,7 @@
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="crayon-syntax-highlighter"> <plugin name="crayon-syntax-highlighter">
<vulnerability> <vulnerability>
<title>Crayon Syntax Highlighter Remote File Inclusion</title> <title>Crayon Syntax Highlighter Remote File Inclusion</title>
@@ -2006,6 +2050,13 @@
<type>SQLI</type> <type>SQLI</type>
<fixed_in>2.56</fixed_in> <fixed_in>2.56</fixed_in>
</vulnerability> </vulnerability>
<vulnerability>
<title>GRAND FlAGallery Plugin "s" Cross-Site Scripting Vulnerability</title>
<reference>http://secunia.com/advisories/53111/</reference>
<reference>http://osvdb.org/show/osvdb/93714</reference>
<type>XSS</type>
<fixed_in>2.72</fixed_in>
</vulnerability>
</plugin> </plugin>
<plugin name="php_speedy_wp"> <plugin name="php_speedy_wp">
@@ -3424,6 +3475,8 @@
<vulnerability> <vulnerability>
<title>WordPress Events Manager Multiple Cross Site Scripting Vulnerabilities</title> <title>WordPress Events Manager Multiple Cross Site Scripting Vulnerabilities</title>
<reference>http://www.securityfocus.com/bid/60078</reference> <reference>http://www.securityfocus.com/bid/60078</reference>
<reference>http://secunia.com/advisories/53478/</reference>
<reference>http://osvdb.org/show/osvdb/93558</reference>
<type>XSS</type> <type>XSS</type>
<fixed_in>5.3.9</fixed_in> <fixed_in>5.3.9</fixed_in>
</vulnerability> </vulnerability>
@@ -4529,7 +4582,7 @@
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>WordPress plugin uk-cookie CSRF</title> <title>CVE-2013-2180: uk-cookie CSRF</title>
<reference>http://www.openwall.com/lists/oss-security/2013/06/06/10</reference> <reference>http://www.openwall.com/lists/oss-security/2013/06/06/10</reference>
<type>CSRF</type> <type>CSRF</type>
</vulnerability> </vulnerability>
@@ -4537,10 +4590,14 @@
<plugin name="wp-cleanfix"> <plugin name="wp-cleanfix">
<vulnerability> <vulnerability>
<title>CVE-2013-2108|CVE-2013-2109: wp-cleanfix Remote Command Execution and CSRF</title> <title>CVE-2013-2108|CVE-2013-2109: wp-cleanfix Remote Command Execution, CSRF and XSS</title>
<reference>https://github.com/wpscanteam/wpscan/issues/186</reference> <reference>https://github.com/wpscanteam/wpscan/issues/186</reference>
<reference>http://wordpress.org/support/topic/plugin-wp-cleanfix-remote-code-execution-warning</reference> <reference>http://wordpress.org/support/topic/plugin-wp-cleanfix-remote-code-execution-warning</reference>
<type>RCE</type> <reference>http://osvdb.org/show/osvdb/93450</reference>
<reference>http://secunia.com/advisories/53395/</reference>
<reference>http://osvdb.org/show/osvdb/93468</reference>
<type>MULTI</type>
<fixed_in>3.0.2</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -4552,7 +4609,7 @@
<type>CSRF</type> <type>CSRF</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="advanced-xml-reader"> <plugin name="advanced-xml-reader">
<vulnerability> <vulnerability>
<title>Advanced XML Reader Plugin for WordPress XML External Entity (XXE) Data Parsing Arbitrary File Disclosure</title> <title>Advanced XML Reader Plugin for WordPress XML External Entity (XXE) Data Parsing Arbitrary File Disclosure</title>
@@ -4569,7 +4626,7 @@
<fixed_in>1.3.2</fixed_in> <fixed_in>1.3.2</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="wordpress-23-related-posts-plugin"> <plugin name="wordpress-23-related-posts-plugin">
<vulnerability> <vulnerability>
<title>WordPress WordPress Related Posts Plugin Cross-Site Request Forgery Vulnerability</title> <title>WordPress WordPress Related Posts Plugin Cross-Site Request Forgery Vulnerability</title>
@@ -4578,7 +4635,7 @@
<fixed_in>2.6.2</fixed_in> <fixed_in>2.6.2</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="related-posts"> <plugin name="related-posts">
<vulnerability> <vulnerability>
<title>WordPress Related Posts Plugin Cross-Site Request Forgery Vulnerability</title> <title>WordPress Related Posts Plugin Cross-Site Request Forgery Vulnerability</title>
@@ -4587,7 +4644,7 @@
<fixed_in>2.7.2</fixed_in> <fixed_in>2.7.2</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="wp-print-friendly"> <plugin name="wp-print-friendly">
<vulnerability> <vulnerability>
<title>WordPress WP Print Friendly Plugin Security Bypass Vulnerability</title> <title>WordPress WP Print Friendly Plugin Security Bypass Vulnerability</title>
@@ -4596,7 +4653,7 @@
<fixed_in>0.5.3</fixed_in> <fixed_in>0.5.3</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="contextual-related-posts"> <plugin name="contextual-related-posts">
<vulnerability> <vulnerability>
<title>WordPress Contextual Related Posts Plugin Cross-Site Request Forgery Vulnerability</title> <title>WordPress Contextual Related Posts Plugin Cross-Site Request Forgery Vulnerability</title>
@@ -4605,7 +4662,7 @@
<fixed_in>1.8.7</fixed_in> <fixed_in>1.8.7</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="calendar"> <plugin name="calendar">
<vulnerability> <vulnerability>
<title>WordPress Calendar Plugin Cross-Site Request Forgery Vulnerability</title> <title>WordPress Calendar Plugin Cross-Site Request Forgery Vulnerability</title>
@@ -4614,7 +4671,7 @@
<fixed_in>1.3.3</fixed_in> <fixed_in>1.3.3</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="feedweb"> <plugin name="feedweb">
<vulnerability> <vulnerability>
<title>WordPress Feedweb Plugin 'wp_post_id' Parameter XSS</title> <title>WordPress Feedweb Plugin 'wp_post_id' Parameter XSS</title>
@@ -4654,6 +4711,8 @@
<vulnerability> <vulnerability>
<title>Digg Digg CSRF</title> <title>Digg Digg CSRF</title>
<reference>http://wordpress.org/plugins/digg-digg/changelog/</reference> <reference>http://wordpress.org/plugins/digg-digg/changelog/</reference>
<reference>http://secunia.com/advisories/53120/</reference>
<reference>http://osvdb.org/show/osvdb/93544</reference>
<type>CSRF</type> <type>CSRF</type>
<fixed_in>5.3.5</fixed_in> <fixed_in>5.3.5</fixed_in>
</vulnerability> </vulnerability>
@@ -4661,8 +4720,10 @@
<plugin name="ssquiz"> <plugin name="ssquiz">
<vulnerability> <vulnerability>
<title>Vulneratbility in SS Quiz</title> <title>SS Quiz Plugin Multiple Unspecified Vulnerabilities</title>
<reference>http://wordpress.org/plugins/ssquiz/changelog/</reference> <reference>http://wordpress.org/plugins/ssquiz/changelog/</reference>
<reference>http://secunia.com/advisories/53378/</reference>
<reference>http://osvdb.org/show/osvdb/93531</reference>
<type>UNKNOWN</type> <type>UNKNOWN</type>
<fixed_in>2.0</fixed_in> <fixed_in>2.0</fixed_in>
</vulnerability> </vulnerability>
@@ -4694,11 +4755,13 @@
<fixed_in>1.4.5</fixed_in> <fixed_in>1.4.5</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="underconstruction"> <plugin name="underconstruction">
<vulnerability> <vulnerability>
<title>CSRF in WordPress underConstruction plugin (CVE-2013-2699)</title> <title>CSRF in WordPress underConstruction plugin (CVE-2013-2699)</title>
<reference>http://wordpress.org/plugins/underconstruction/changelog/</reference> <reference>http://wordpress.org/plugins/underconstruction/changelog/</reference>
<reference>http://secunia.com/advisories/52881/</reference>
<reference>http://osvdb.org/show/osvdb/93857</reference>
<type>CSRF</type> <type>CSRF</type>
<fixed_in>1.09</fixed_in> <fixed_in>1.09</fixed_in>
</vulnerability> </vulnerability>
@@ -4707,7 +4770,9 @@
<plugin name="adif-log-search-widget"> <plugin name="adif-log-search-widget">
<vulnerability> <vulnerability>
<title>ADIF Log Search Widget XSS Arbitrary Vulnerability</title> <title>ADIF Log Search Widget XSS Arbitrary Vulnerability</title>
<reference>http://packetstorm.interhost.co.il/1305-exploits/adif-xss.txt</reference> <reference>http://packetstormsecurity.com/files/121777/ADIF-Log-Search-Widget-1.0e-Cross-Site-Scripting.html</reference>
<reference>http://secunia.com/advisories/53599/</reference>
<reference>http://osvdb.org/show/osvdb/93721</reference>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -4746,4 +4811,62 @@
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="image-slider-with-description">
<vulnerability>
<title>Image slider with description Plugin Unspecified Vulnerability</title>
<reference>http://secunia.com/advisories/53588/</reference>
<reference>http://osvdb.org/show/osvdb/93691</reference>
<type>UNKNOWN</type>
<fixed_in>7.0</fixed_in>
</vulnerability>
</plugin>
<plugin name="user-role-editor">
<vulnerability>
<title>User Role Editor Plugin Cross-Site Request Forgery Vulnerability</title>
<reference>http://secunia.com/advisories/53593/</reference>
<reference>http://osvdb.org/show/osvdb/93699</reference>
<reference>http://www.exploit-db.com/exploits/25721</reference>
<type>CSRF</type>
<fixed_in>3.14</fixed_in>
</vulnerability>
</plugin>
<plugin name="eelv-newsletter">
<vulnerability>
<title>EELV Newsletter Plugin Cross-Site Scripting Vulnerability</title>
<reference>http://secunia.com/advisories/53546/</reference>
<reference>http://osvdb.org/show/osvdb/93685</reference>
<type>XSS</type>
<fixed_in>3.3.1</fixed_in>
</vulnerability>
</plugin>
<plugin name="frontier-post">
<vulnerability>
<title>Frontier Post Plugin Publishing Posts Security Bypass</title>
<reference>http://secunia.com/advisories/53474/</reference>
<reference>http://osvdb.org/show/osvdb/93639</reference>
<type>UNKNOWN</type>
</vulnerability>
</plugin>
<plugin name="spider-catalog">
<vulnerability>
<title>Spider Catalog Plugin Cross-Site Scripting and SQL Injection Vulnerabilities</title>
<reference>http://secunia.com/advisories/53491/</reference>
<reference>http://osvdb.org/show/osvdb/93591</reference>
<type>MULTI</type>
</vulnerability>
</plugin>
<plugin name="spider-event-calendar">
<vulnerability>
<title>Spider Event Calendar Plugin Security Bypass, Cross-Site Scripting and SQLi Vulnerabilities</title>
<reference>http://secunia.com/advisories/53481/</reference>
<reference>http://osvdb.org/show/osvdb/93584</reference>
<type>MULTI</type>
</vulnerability>
</plugin>
</vulnerabilities> </vulnerabilities>

View File

@@ -7,6 +7,8 @@
<vulnerability> <vulnerability>
<title>CVE-2013-2173: WordPress 3.5.1 DoS in class-phpass.php</title> <title>CVE-2013-2173: WordPress 3.5.1 DoS in class-phpass.php</title>
<reference>http://seclists.org/fulldisclosure/2013/Jun/65</reference> <reference>http://seclists.org/fulldisclosure/2013/Jun/65</reference>
<reference>http://secunia.com/advisories/53676/</reference>
<reference>http://osvdb.org/show/osvdb/94235</reference>
<type>UNKNOWN</type> <type>UNKNOWN</type>
</vulnerability> </vulnerability>
</wordpress> </wordpress>