Added references.
This commit is contained in:
@@ -198,6 +198,8 @@
|
||||
<vulnerability>
|
||||
<title>Crayon Syntax Highlighter - Remote File Inclusion Vulnerability</title>
|
||||
<references>
|
||||
<osvdb>86255</osvdb>
|
||||
<osvdb>86256</osvdb>
|
||||
<secunia>50804</secunia>
|
||||
<url>http://ceriksen.com/2012/10/15/wordpress-crayon-syntax-highlighter-remote-file-inclusion-vulnerability/</url>
|
||||
</references>
|
||||
@@ -671,6 +673,9 @@
|
||||
<vulnerability>
|
||||
<title>Uploader 1.0.4 - Shell Upload</title>
|
||||
<references>
|
||||
<osvdb>70648</osvdb>
|
||||
<secunia>43075</secunia>
|
||||
<secunia>52465</secunia>
|
||||
<url>http://packetstormsecurity.com/files/119219/</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
@@ -1890,6 +1895,8 @@
|
||||
<vulnerability>
|
||||
<title>Lim4wp 1.1.1 - Arbitrary File Upload Vulnerability</title>
|
||||
<references>
|
||||
<osvdb>83016</osvdb>
|
||||
<secunia>49609</secunia>
|
||||
<url>http://packetstormsecurity.com/files/113846/</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
@@ -1976,6 +1983,7 @@
|
||||
<vulnerability>
|
||||
<title>User Meta Version 1.1.1 - Arbitrary File Upload Vulnerability</title>
|
||||
<references>
|
||||
<osvdb>82902</osvdb>
|
||||
<exploitdb>19052</exploitdb>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
@@ -2135,6 +2143,8 @@
|
||||
<title>Omni Secure Files 0.1.13 - Arbitrary File Upload</title>
|
||||
<references>
|
||||
<exploitdb>19009</exploitdb>
|
||||
<osvdb>82790</osvdb>
|
||||
<secunia>49441</secunia>
|
||||
<url>http://www.securityfocus.com/bid/53872</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
@@ -9630,6 +9640,8 @@
|
||||
<vulnerability>
|
||||
<title>Email Newsletter 8.0 - 'option' Parameter Information Disclosure Vulnerability</title>
|
||||
<references>
|
||||
<osvdb>83541</osvdb>
|
||||
<secunia>49758</secunia>
|
||||
<url>http://www.securityfocus.com/bid/53850</url>
|
||||
</references>
|
||||
<type>FPD</type>
|
||||
@@ -10190,6 +10202,7 @@
|
||||
<vulnerability>
|
||||
<title>Blue Wrench Video Widget 1.0.2 - admin.php bw-videos Page Multiple Action CSRF</title>
|
||||
<references>
|
||||
<cve>2013-6797</cve>
|
||||
<osvdb>98922</osvdb>
|
||||
<secunia>55456</secunia>
|
||||
<url>http://securityundefined.com/wordpress-plugin-blue-wrench-video-widget-csrf-persistent-xss-0day-disclosure/</url>
|
||||
@@ -10199,6 +10212,7 @@
|
||||
<vulnerability>
|
||||
<title>Blue-Wrench-Video-Widget 1.0.2 - admin.php bw-videos Page Multiple Parameter Stored XSS</title>
|
||||
<references>
|
||||
<cve>2013-6797</cve>
|
||||
<osvdb>98923</osvdb>
|
||||
<secunia>55456</secunia>
|
||||
<url>http://securityundefined.com/wordpress-plugin-blue-wrench-video-widget-csrf-persistent-xss-0day-disclosure/</url>
|
||||
@@ -10532,6 +10546,7 @@
|
||||
<osvdb>74464</osvdb>
|
||||
<secunia>45553</secunia>
|
||||
<url>http://seclists.org/bugtraq/2011/Aug/52</url>
|
||||
<url>http://www.htbridge.ch/advisory/multiple_xss_in_eshop_for_wordpress.html</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
<fixed_in>6.2.9</fixed_in>
|
||||
@@ -10582,6 +10597,9 @@
|
||||
<vulnerability>
|
||||
<title>Uploadify Integration 0.9.6 - Multiple Cross Site Scripting Vulnerabilities</title>
|
||||
<references>
|
||||
<osvdb>81093</osvdb>
|
||||
<osvdb>81094</osvdb>
|
||||
<osvdb>81095</osvdb>
|
||||
<url>http://www.securityfocus.com/bid/52944</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
|
||||
Reference in New Issue
Block a user