Update plugin_vulns.xml

This commit is contained in:
Peter van der Laan
2013-11-06 12:37:15 +01:00
parent 47f2545a50
commit 39724afc81

View File

@@ -5,7 +5,7 @@
<plugin name="content-slide"> <plugin name="content-slide">
<vulnerability> <vulnerability>
<title>Content Slide &lt;=1.4.2 - Cross Site Requst Forgery Vulnerability</title> <title>Content Slide &lt;= 1.4.2 - Cross Site Requst Forgery Vulnerability</title>
<references> <references>
<osvdb>93871</osvdb> <osvdb>93871</osvdb>
<cve>2013-2708</cve> <cve>2013-2708</cve>
@@ -151,7 +151,7 @@
<plugin name="thanks-you-counter-button"> <plugin name="thanks-you-counter-button">
<vulnerability> <vulnerability>
<title>Thank You Counter Button &lt;=1.8.2 - XSS</title> <title>Thank You Counter Button &lt;= 1.8.2 - XSS</title>
<references> <references>
<secunia>50977</secunia> <secunia>50977</secunia>
</references> </references>
@@ -162,7 +162,7 @@
<plugin name="bookings"> <plugin name="bookings">
<vulnerability> <vulnerability>
<title>Bookings &lt;=1.8.2 - XSS</title> <title>Bookings &lt;= 1.8.2 - XSS</title>
<references> <references>
<secunia>50975</secunia> <secunia>50975</secunia>
</references> </references>
@@ -173,7 +173,7 @@
<plugin name="cimy-user-manager"> <plugin name="cimy-user-manager">
<vulnerability> <vulnerability>
<title>Cimy User Manager &lt;=1.4.2 - Arbitrary File Disclosure</title> <title>Cimy User Manager &lt;= 1.4.2 - Arbitrary File Disclosure</title>
<references> <references>
<secunia>50834</secunia> <secunia>50834</secunia>
<url>http://ceriksen.com/2012/10/24/wordpress-cimy-user-manager-arbitrary-file-disclosure/</url> <url>http://ceriksen.com/2012/10/24/wordpress-cimy-user-manager-arbitrary-file-disclosure/</url>
@@ -205,7 +205,7 @@
<plugin name="wp125"> <plugin name="wp125">
<vulnerability> <vulnerability>
<title>WP125 &lt;=1.4.4 - Multiple XSS</title> <title>WP125 &lt;= 1.4.4 - Multiple XSS</title>
<references> <references>
<secunia>50976</secunia> <secunia>50976</secunia>
</references> </references>
@@ -213,7 +213,7 @@
<fixed_in>1.4.5</fixed_in> <fixed_in>1.4.5</fixed_in>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>WP125 &lt;=1.4.9 - CSRF</title> <title>WP125 &lt;= 1.4.9 - CSRF</title>
<references> <references>
<osvdb>92113</osvdb> <osvdb>92113</osvdb>
<cve>2013-2700</cve> <cve>2013-2700</cve>
@@ -1687,7 +1687,7 @@
<plugin name="wp-property"> <plugin name="wp-property">
<vulnerability> <vulnerability>
<title>WP Property &lt;=1.35.0 - Arbitrary File Upload</title> <title>WP Property &lt;= 1.35.0 - Arbitrary File Upload</title>
<references> <references>
<exploitdb>18987</exploitdb> <exploitdb>18987</exploitdb>
<exploitdb>23651</exploitdb> <exploitdb>23651</exploitdb>
@@ -2731,7 +2731,7 @@
<plugin name="is-human"> <plugin name="is-human">
<vulnerability> <vulnerability>
<title>Is-human &lt;=1.4.2 - Remote Command Execution Vulnerability</title> <title>Is-human &lt;= 1.4.2 - Remote Command Execution Vulnerability</title>
<references> <references>
<exploitdb>17299</exploitdb> <exploitdb>17299</exploitdb>
</references> </references>
@@ -6333,7 +6333,7 @@
<plugin name="wp-print-friendly"> <plugin name="wp-print-friendly">
<vulnerability> <vulnerability>
<title>WP Print Friendly &lt;=0.5.2 - Security Bypass Vulnerability</title> <title>WP Print Friendly &lt;= 0.5.2 - Security Bypass Vulnerability</title>
<references> <references>
<osvdb>93243</osvdb> <osvdb>93243</osvdb>
<secunia>53371</secunia> <secunia>53371</secunia>