WPScan files
This commit is contained in:
211
data/wp_vulns.xml
Normal file
211
data/wp_vulns.xml
Normal file
@@ -0,0 +1,211 @@
|
||||
<?xml version="1.0"?>
|
||||
<!--
|
||||
WPScan - WordPress Security Scanner
|
||||
Copyright (C) 2011 Ryan Dewhurst AKA ethicalhack3r
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
ryandewhurst at gmail
|
||||
|
||||
|
||||
This file contains vulnerabilities associated with WordPress verions.
|
||||
|
||||
-->
|
||||
<vulnerabilities>
|
||||
<wordpress version="3.4-beta4">
|
||||
<vulnerability>
|
||||
<title>Wordpress 3.3.1 Multiple CSRF Vulnerabilities</title>
|
||||
<reference>http://www.exploit-db.com/exploits/18791/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="3.3.2">
|
||||
<vulnerability>
|
||||
<title>Wordpress 3.3.1 Multiple CSRF Vulnerabilities</title>
|
||||
<reference>http://www.exploit-db.com/exploits/18791/</reference>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress 3.3.2 Cross Site Scripting</title>
|
||||
<reference>http://packetstormsecurity.org/files/113254</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="3.3.1">
|
||||
<vulnerability>
|
||||
<title>Multiple vulnerabilities including XSS and Privilege Escalation</title>
|
||||
<reference>http://wordpress.org/news/2012/04/wordpress-3-3-2/</reference>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>Wordpress 3.3.1 Multiple CSRF Vulnerabilities</title>
|
||||
<reference>http://www.exploit-db.com/exploits/18791/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="3.3">
|
||||
<vulnerability>
|
||||
<title>Reflected Cross-Site Scripting in WordPress 3.3</title>
|
||||
<reference>http://oldmanlab.blogspot.com/2012/01/wordpress-33-xss-vulnerability.html</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="3.1.3">
|
||||
<vulnerability>
|
||||
<title>Multiple SQL Injection Vulnerabilities</title>
|
||||
<reference>http://www.exploit-db.com/exploits/17465/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="3.1.2">
|
||||
<vulnerability>
|
||||
<title>Wordpress <= 3.1.2 Clickjacking Vulnerability</title>
|
||||
<reference>http://seclists.org/fulldisclosure/2011/Sep/219</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="3.0.3">
|
||||
<vulnerability>
|
||||
<title>SQL injection vulnerability in do_trackbacks() Wordpress function</title>
|
||||
<reference>http://www.exploit-db.com/exploits/15684/</reference>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>Wordpress 3.0.3 stored XSS IE7,6 NS8.1</title>
|
||||
<reference>http://www.exploit-db.com/exploits/15858/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.9">
|
||||
<vulnerability>
|
||||
<title>WordPress 2.9 Failure to Restrict URL Access</title>
|
||||
<reference>http://www.exploit-db.com/exploits/11441/</reference>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>Wordpress DOS <= 2.9</title>
|
||||
<reference>http://www.exploit-db.com/exploits/11441/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.8.5">
|
||||
<vulnerability>
|
||||
<title>WordPress <= 2.8.5 Unrestricted File Upload Arbitrary PHP Code Execution</title>
|
||||
<reference>http://www.exploit-db.com/exploits/10089/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.8.3">
|
||||
<vulnerability>
|
||||
<title>Wordpress <= 2.8.3 Remote Admin Reset Password Vulnerability</title>
|
||||
<reference>http://www.exploit-db.com/exploits/9410/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.8.1">
|
||||
<vulnerability>
|
||||
<title>Wordpress 2.8.1 (url) Remote Cross Site Scripting Exploit</title>
|
||||
<reference>http://www.exploit-db.com/exploits/9250/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.7.1">
|
||||
<vulnerability>
|
||||
<title>WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability</title>
|
||||
<reference>http://www.exploit-db.com/exploits/10088/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.6.1">
|
||||
<vulnerability>
|
||||
<title>Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit</title>
|
||||
<reference>http://www.exploit-db.com/exploits/6421/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.3.1">
|
||||
<vulnerability>
|
||||
<title>Wordpress <= 2.3.1 Charset Remote SQL Injection Vulnerability</title>
|
||||
<reference>http://www.exploit-db.com/exploits/4721/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.2">
|
||||
<vulnerability>
|
||||
<title>WordPress 2.2 (wp-app.php) Arbitrary File Upload Exploit</title>
|
||||
<reference>http://www.exploit-db.com/exploits/4113/</reference>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>Wordpress 2.2 (xmlrpc.php) Remote SQL Injection Exploit</title>
|
||||
<reference>http://www.exploit-db.com/exploits/4039/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.1.3">
|
||||
<vulnerability>
|
||||
<title>Wordpress 2.1.3 admin-ajax.php SQL Injection Blind Fishing Exploit</title>
|
||||
<reference>http://www.exploit-db.com/exploits/3960/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.1.2">
|
||||
<vulnerability>
|
||||
<title>Wordpress 2.1.2 (xmlrpc) Remote SQL Injection Exploit</title>
|
||||
<reference>http://www.exploit-db.com/exploits/3656/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.6">
|
||||
<vulnerability>
|
||||
<title>Wordpress <= 2.0.6 wp-trackback.php Remote SQL Injection Exploit</title>
|
||||
<reference>http://www.exploit-db.com/exploits/3109/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.5">
|
||||
<vulnerability>
|
||||
<title>Wordpress 2.0.5 Trackback UTF-7 Remote SQL Injection Exploit</title>
|
||||
<reference>http://www.exploit-db.com/exploits/3095/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.2">
|
||||
<vulnerability>
|
||||
<title>WordPress <= 2.0.2 (cache) Remote Shell Injection Exploit</title>
|
||||
<reference>http://www.exploit-db.com/exploits/6/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="1.5.1.3">
|
||||
<vulnerability>
|
||||
<title>Wordpress <= 1.5.1.3 Remote Code Execution eXploit (metasploit)</title>
|
||||
<reference>http://www.exploit-db.com/exploits/1145/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="1.5.1.2">
|
||||
<vulnerability>
|
||||
<title>Wordpress <= 1.5.1.2 xmlrpc Interface SQL Injection Exploit</title>
|
||||
<reference>http://www.exploit-db.com/exploits/1077/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="1.5.1.1">
|
||||
<vulnerability>
|
||||
<title>WordPress <= 1.5.1.1 "add new admin" SQL Injection Exploit</title>
|
||||
<reference>http://www.exploit-db.com/exploits/1059/</reference>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress <= 1.5.1.1 SQL Injection Exploit </title>
|
||||
<reference>http://www.exploit-db.com/exploits/1033/</reference>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
</vulnerabilities>
|
||||
Reference in New Issue
Block a user