@@ -869,6 +869,16 @@
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="wp-image-resizer">
|
||||
<vulnerability>
|
||||
<title>Image Resizer - Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/123651/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="wp-levoslideshow">
|
||||
<vulnerability>
|
||||
<title>wp-levoslideshow - Arbitrary File Upload Vulnerability</title>
|
||||
@@ -4774,13 +4784,20 @@
|
||||
|
||||
<plugin name="woocommerce">
|
||||
<vulnerability>
|
||||
<title>WooCommerce - index.php calc_shipping_state Parameter XSS</title>
|
||||
<title>WooCommerce 2.0.12 - index.php calc_shipping_state Parameter XSS</title>
|
||||
<references>
|
||||
<osvdb>95480</osvdb>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
<fixed_in>2.0.13</fixed_in>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WooCommerce 2.0.17 - Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/123684/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="wp-e-commerce-predictive-search">
|
||||
@@ -7003,8 +7020,9 @@
|
||||
|
||||
<plugin name="nospampti">
|
||||
<vulnerability>
|
||||
<title>NOSpamPTI 2.1 - Blind SQL Injection</title>
|
||||
<title>NOSpamPTI 2.1 - wp-comments-post.php comment_post_ID Parameter SQL Injection</title>
|
||||
<references>
|
||||
<osvdb>97528</osvdb>
|
||||
<exploitdb>28485</exploitdb>
|
||||
<cve>2013-5917</cve>
|
||||
<url>http://packetstormsecurity.com/files/123331/</url>
|
||||
@@ -7114,6 +7132,18 @@
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="quick-paypal-payments">
|
||||
<vulnerability>
|
||||
<title>Quick Paypal Payments 3.0 - Payment Sending Multiple Parameter XSS</title>
|
||||
<references>
|
||||
<osvdb>98715</osvdb>
|
||||
<secunia>55292</secunia>
|
||||
<url>http://packetstormsecurity.com/files/123662/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="email-newsletter">
|
||||
<vulnerability>
|
||||
<title>Email Newsletter 8.0 - 'option' Parameter Information Disclosure Vulnerability</title>
|
||||
@@ -7369,8 +7399,9 @@
|
||||
|
||||
<plugin name="finalist">
|
||||
<vulnerability>
|
||||
<title>Finalist - Cross Site Scripting</title>
|
||||
<title>Finalist - /wp-content/plugins/finalist/vote.php id Parameter Reflected XSS</title>
|
||||
<references>
|
||||
<osvdb>98665</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/123597/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
@@ -7379,10 +7410,12 @@
|
||||
|
||||
<plugin name="dexs-pm-system">
|
||||
<vulnerability>
|
||||
<title>Dexs PM System Cross Site Scripting</title>
|
||||
<title>Dexs PM System 1.0.1 - Private Message subject Parameter Stored XSS</title>
|
||||
<references>
|
||||
<osvdb>98668</osvdb>
|
||||
<secunia>55296</secunia>
|
||||
<exploitdb>28970</exploitdb>
|
||||
<url>http://packetstormsecurity.com/files/123634/</url>
|
||||
<url>http://www.securityfocus.com/bid/63021</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
@@ -7423,4 +7456,16 @@
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="social-sharing-toolkit">
|
||||
<vulnerability>
|
||||
<title>Social Sharing Toolkit 2.2.1 - Setting Manipulation CSRF</title>
|
||||
<references>
|
||||
<osvdb>98717</osvdb>
|
||||
<cve>2013-2701</cve>
|
||||
<secunia>52951</secunia>
|
||||
</references>
|
||||
<type>CSRF</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
</vulnerabilities>
|
||||
|
||||
Reference in New Issue
Block a user