Update vuln db
This commit is contained in:
@@ -3169,6 +3169,22 @@
|
|||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
<plugin name="link-library">
|
<plugin name="link-library">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Link Library 5.8.0.9 - Multiple Unspecified Issues</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>102842</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>MULTI</type>
|
||||||
|
<fixed_in>5.8.1</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>Link Library 5.1.6 - link-library-ajax.php Multiple Parameter SQL Injection</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>102804</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>SQLI</type>
|
||||||
|
<fixed_in>5.1.7</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Link Library 5.0.8 - wp-content/plugins/link-library/tracker.php id Parameter XSS</title>
|
<title>Link Library 5.0.8 - wp-content/plugins/link-library/tracker.php id Parameter XSS</title>
|
||||||
<references>
|
<references>
|
||||||
@@ -3176,6 +3192,7 @@
|
|||||||
<secunia>45588</secunia>
|
<secunia>45588</secunia>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
|
<fixed_in>5.0.9</fixed_in>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Link Library 5.0.8 - wp-content/plugins/link-library/tracker.php id Parameter SQL Injection</title>
|
<title>Link Library 5.0.8 - wp-content/plugins/link-library/tracker.php id Parameter SQL Injection</title>
|
||||||
@@ -3184,13 +3201,16 @@
|
|||||||
<secunia>45588</secunia>
|
<secunia>45588</secunia>
|
||||||
</references>
|
</references>
|
||||||
<type>SQLI</type>
|
<type>SQLI</type>
|
||||||
|
<fixed_in>5.0.9</fixed_in>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Link Library <= 5.2.1 - SQL Injection</title>
|
<title>Link Library <= 5.2.1 - SQL Injection</title>
|
||||||
<references>
|
<references>
|
||||||
|
<osvdb>84579</osvdb>
|
||||||
<exploitdb>17887</exploitdb>
|
<exploitdb>17887</exploitdb>
|
||||||
</references>
|
</references>
|
||||||
<type>SQLI</type>
|
<type>SQLI</type>
|
||||||
|
<fixed_in>5.7.9.7</fixed_in>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
@@ -9753,6 +9773,7 @@
|
|||||||
<title>Contact Form 7 3.5.2 - Crafted File Extension Upload Remote Code Execution</title>
|
<title>Contact Form 7 3.5.2 - Crafted File Extension Upload Remote Code Execution</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>102776</osvdb>
|
<osvdb>102776</osvdb>
|
||||||
|
<url>http://packetstormsecurity.com/files/125018/</url>
|
||||||
<url>http://seclists.org/fulldisclosure/2014/Feb/0</url>
|
<url>http://seclists.org/fulldisclosure/2014/Feb/0</url>
|
||||||
</references>
|
</references>
|
||||||
<type>RCE</type>
|
<type>RCE</type>
|
||||||
@@ -10462,6 +10483,7 @@
|
|||||||
<title>Global Flash Galleries - swfupload.php Unauthenticated Image Upload Weakness</title>
|
<title>Global Flash Galleries - swfupload.php Unauthenticated Image Upload Weakness</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>102423</osvdb>
|
<osvdb>102423</osvdb>
|
||||||
|
<url>http://packetstormsecurity.com/files/124850/</url>
|
||||||
<url>http://www.securityfocus.com/bid/65060</url>
|
<url>http://www.securityfocus.com/bid/65060</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
@@ -10590,6 +10612,7 @@
|
|||||||
<title>Seo Link Rotator - pusher.php title Parameter Reflected XSS</title>
|
<title>Seo Link Rotator - pusher.php title Parameter Reflected XSS</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>102594</osvdb>
|
<osvdb>102594</osvdb>
|
||||||
|
<secunia>56710</secunia>
|
||||||
<url>http://packetstormsecurity.com/files/124959/</url>
|
<url>http://packetstormsecurity.com/files/124959/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
@@ -10602,6 +10625,7 @@
|
|||||||
<references>
|
<references>
|
||||||
<osvdb>102669</osvdb>
|
<osvdb>102669</osvdb>
|
||||||
<cve>2014-1750</cve>
|
<cve>2014-1750</cve>
|
||||||
|
<secunia>56604</secunia>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
<fixed_in>1.6.7</fixed_in>
|
<fixed_in>1.6.7</fixed_in>
|
||||||
@@ -10684,4 +10708,28 @@
|
|||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
|
<plugin name="very-simple-contact-form">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Very Simple Contact Form 1.1 - Unspecified Issue</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>102798</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>UNKNOWN</type>
|
||||||
|
<fixed_in>1.2</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
</plugin>
|
||||||
|
|
||||||
|
<plugin name="stop-user-enumeration">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Stop User Enumeration 1.2.4 - POST Request Protection Bypass</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>102799</osvdb>
|
||||||
|
<secunia>56643</secunia>
|
||||||
|
<url>http://packetstormsecurity.com/files/125035/</url>
|
||||||
|
<url>http://seclists.org/fulldisclosure/2014/Feb/3</url>
|
||||||
|
</references>
|
||||||
|
<type>UNKNOWN</type>
|
||||||
|
</vulnerability>
|
||||||
|
</plugin>
|
||||||
|
|
||||||
</vulnerabilities>
|
</vulnerabilities>
|
||||||
|
|||||||
Reference in New Issue
Block a user