Update plugin_vulns.xml

This commit is contained in:
Peter van der Laan
2013-11-05 11:31:42 +01:00
parent 99181a3bd9
commit 17fec7a161

View File

@@ -593,11 +593,12 @@
<plugin name="comment-extra-field">
<vulnerability>
<title>SWF Vulnerable to XSS Bundled in Many WordPress Plugins</title>
<title>Comment Extra Field 1.7 - CSRF / XSS</title>
<references>
<url>http://packetstormsecurity.com/files/122625/</url>
<url>http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html</url>
</references>
<type>XSS</type>
<type>MULTI</type>
</vulnerability>
</plugin>
@@ -5883,8 +5884,10 @@
<plugin name="terillion-reviews">
<vulnerability>
<title>Terillion Reviews - Cross Site Scripting</title>
<title>Terillion Reviews - Profile Id Field XSS</title>
<references>
<osvdb>91123</osvdb>
<cve>2013-1201</cve>
<url>http://packetstormsecurity.com/files/120730/</url>
</references>
<type>XSS</type>
@@ -6702,6 +6705,7 @@
<vulnerability>
<title>Xorbin Digital Flash Clock 1.0 - Flash-based XSS</title>
<references>
<url>http://packetstormsecurity.com/files/122223/</url>
<url>http://advisory.prakharprasad.com/xorbin_dfc_wp.txt</url>
<cve>2013-4693</cve>
</references>
@@ -6779,6 +6783,7 @@
<references>
<osvdb>95557</osvdb>
<exploitdb>26804</exploitdb>
<url>http://packetstormsecurity.com/files/122396/</url>
</references>
<type>RFI</type>
</vulnerability>
@@ -7253,8 +7258,10 @@
<vulnerability>
<title>Booking Calendar 4.1.4 - CSRF Vulnerability</title>
<references>
<exploitdb>27399</exploitdb>
<osvdb>96088</osvdb>
<exploitdb>27399</exploitdb>
<secunia>54461</secunia>
<url>http://packetstormsecurity.com/files/122691/</url>
<url>http://wpbookingcalendar.com/</url>
</references>
<type>CSRF</type>
@@ -7280,10 +7287,12 @@
<references>
<osvdb>98279</osvdb>
<exploitdb>28808</exploitdb>
<secunia>55172</secunia>
<url>http://packetstormsecurity.com/files/123549/</url>
<url>http://quick-plugins.com/quick-contact-form/</url>
</references>
<type>XSS</type>
<fixed_in>6.1</fixed_in>
</vulnerability>
</plugin>
@@ -7616,6 +7625,7 @@
<title>Feed - news_dt.php nid Parameter SQL Injection</title>
<references>
<osvdb>94804</osvdb>
<url>http://packetstormsecurity.com/files/122260/</url>
</references>
<type>SQLI</type>
</vulnerability>
@@ -7772,6 +7782,7 @@
<osvdb>98831</osvdb>
<cve>2013-6281</cve>
<secunia>55396</secunia>
<url>http://packetstormsecurity.com/files/123699/</url>
<url>http://www.securityfocus.com/bid/63256</url>
</references>
<type>XSS</type>