Update vuln db
This commit is contained in:
@@ -10811,6 +10811,33 @@
|
|||||||
<type>AUTHBYPASS</type>
|
<type>AUTHBYPASS</type>
|
||||||
<fixed_in>1.3.2</fixed_in>
|
<fixed_in>1.3.2</fixed_in>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>Delightful Downloads 1.3.1.1 - includes/functions.php User-Agent HTTP Header Stored XSS</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>102928</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
<fixed_in>1.3.2</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
</plugin>
|
||||||
|
|
||||||
|
<plugin name="mobiloud-mobile-app-plugin">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Mobiloud 1.9.0 - comments/disqus_count.php shortname Parameter Reflected XSS</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>102898</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
<fixed_in>1.9.1</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>Mobiloud 1.9.0 - comments/disqus.php shortname Parameter Reflected XSS</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>102899</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
<fixed_in>1.9.1</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
</vulnerabilities>
|
</vulnerabilities>
|
||||||
|
|||||||
@@ -1987,6 +1987,7 @@
|
|||||||
<title>Persuasion <= 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
<title>Persuasion <= 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101331</osvdb>
|
<osvdb>101331</osvdb>
|
||||||
|
<secunia>56359</secunia>
|
||||||
<exploitdb>30443</exploitdb>
|
<exploitdb>30443</exploitdb>
|
||||||
<url>http://packetstormsecurity.com/files/124547/</url>
|
<url>http://packetstormsecurity.com/files/124547/</url>
|
||||||
<url>http://www.securityfocus.com/bid/64501</url>
|
<url>http://www.securityfocus.com/bid/64501</url>
|
||||||
@@ -2435,6 +2436,7 @@
|
|||||||
<title>Highlight Powerful Premium - upload-handler.php File Upload CSRF</title>
|
<title>Highlight Powerful Premium - upload-handler.php File Upload CSRF</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>99703</osvdb>
|
<osvdb>99703</osvdb>
|
||||||
|
<secunia>55671</secunia>
|
||||||
<exploitdb>29525</exploitdb>
|
<exploitdb>29525</exploitdb>
|
||||||
<url>http://packetstormsecurity.com/files/123974/</url>
|
<url>http://packetstormsecurity.com/files/123974/</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -2707,6 +2709,7 @@
|
|||||||
<title>DejaVu 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
<title>DejaVu 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101331</osvdb>
|
<osvdb>101331</osvdb>
|
||||||
|
<secunia>56359</secunia>
|
||||||
<exploitdb>30443</exploitdb>
|
<exploitdb>30443</exploitdb>
|
||||||
<url>http://www.securityfocus.com/bid/64501</url>
|
<url>http://www.securityfocus.com/bid/64501</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -2730,6 +2733,7 @@
|
|||||||
<title>Elegance 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
<title>Elegance 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101331</osvdb>
|
<osvdb>101331</osvdb>
|
||||||
|
<secunia>56359</secunia>
|
||||||
<exploitdb>30443</exploitdb>
|
<exploitdb>30443</exploitdb>
|
||||||
<url>http://www.securityfocus.com/bid/64501</url>
|
<url>http://www.securityfocus.com/bid/64501</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -2753,6 +2757,7 @@
|
|||||||
<title>Echelon 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
<title>Echelon 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101331</osvdb>
|
<osvdb>101331</osvdb>
|
||||||
|
<secunia>56359</secunia>
|
||||||
<exploitdb>30443</exploitdb>
|
<exploitdb>30443</exploitdb>
|
||||||
<url>http://www.securityfocus.com/bid/64501</url>
|
<url>http://www.securityfocus.com/bid/64501</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -2776,6 +2781,7 @@
|
|||||||
<title>Modular 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
<title>Modular 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101331</osvdb>
|
<osvdb>101331</osvdb>
|
||||||
|
<secunia>56359</secunia>
|
||||||
<exploitdb>30443</exploitdb>
|
<exploitdb>30443</exploitdb>
|
||||||
<url>http://www.securityfocus.com/bid/64501</url>
|
<url>http://www.securityfocus.com/bid/64501</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -2799,6 +2805,7 @@
|
|||||||
<title>Fusion 2.1 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
<title>Fusion 2.1 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101331</osvdb>
|
<osvdb>101331</osvdb>
|
||||||
|
<secunia>56359</secunia>
|
||||||
<exploitdb>30443</exploitdb>
|
<exploitdb>30443</exploitdb>
|
||||||
<url>http://www.securityfocus.com/bid/64501</url>
|
<url>http://www.securityfocus.com/bid/64501</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -2822,6 +2829,7 @@
|
|||||||
<title>Method 2.1 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
<title>Method 2.1 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101331</osvdb>
|
<osvdb>101331</osvdb>
|
||||||
|
<secunia>56359</secunia>
|
||||||
<exploitdb>30443</exploitdb>
|
<exploitdb>30443</exploitdb>
|
||||||
<url>http://www.securityfocus.com/bid/64501</url>
|
<url>http://www.securityfocus.com/bid/64501</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -2845,6 +2853,7 @@
|
|||||||
<title>Myriad 2.0 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
<title>Myriad 2.0 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101331</osvdb>
|
<osvdb>101331</osvdb>
|
||||||
|
<secunia>56359</secunia>
|
||||||
<exploitdb>30443</exploitdb>
|
<exploitdb>30443</exploitdb>
|
||||||
<url>http://www.securityfocus.com/bid/64501</url>
|
<url>http://www.securityfocus.com/bid/64501</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -2868,6 +2877,7 @@
|
|||||||
<title>Construct 1.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
<title>Construct 1.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101331</osvdb>
|
<osvdb>101331</osvdb>
|
||||||
|
<secunia>56359</secunia>
|
||||||
<exploitdb>30443</exploitdb>
|
<exploitdb>30443</exploitdb>
|
||||||
<url>http://www.securityfocus.com/bid/64501</url>
|
<url>http://www.securityfocus.com/bid/64501</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -2891,6 +2901,7 @@
|
|||||||
<title>Awake 3.3 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
<title>Awake 3.3 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101331</osvdb>
|
<osvdb>101331</osvdb>
|
||||||
|
<secunia>56359</secunia>
|
||||||
<exploitdb>30443</exploitdb>
|
<exploitdb>30443</exploitdb>
|
||||||
<url>http://www.securityfocus.com/bid/64501</url>
|
<url>http://www.securityfocus.com/bid/64501</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -2922,6 +2933,7 @@
|
|||||||
<title>InFocus 3.3 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
<title>InFocus 3.3 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101331</osvdb>
|
<osvdb>101331</osvdb>
|
||||||
|
<secunia>56359</secunia>
|
||||||
<exploitdb>30443</exploitdb>
|
<exploitdb>30443</exploitdb>
|
||||||
<url>http://www.securityfocus.com/bid/64501</url>
|
<url>http://www.securityfocus.com/bid/64501</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -2987,4 +2999,14 @@
|
|||||||
</vulnerability>
|
</vulnerability>
|
||||||
</theme>
|
</theme>
|
||||||
|
|
||||||
|
<theme name="kiddo">
|
||||||
|
<vulnerability>
|
||||||
|
<title> Kiddo - remote shell upload vulnerability</title>
|
||||||
|
<references>
|
||||||
|
<url>http://packetstormsecurity.com/files/125138/</url>
|
||||||
|
</references>
|
||||||
|
<type>RCE</type>
|
||||||
|
</vulnerability>
|
||||||
|
</theme>
|
||||||
|
|
||||||
</vulnerabilities>
|
</vulnerabilities>
|
||||||
|
|||||||
Reference in New Issue
Block a user