From 58a3805788b9b749ab78fc2e0c7ea46f4f678bb5 Mon Sep 17 00:00:00 2001 From: Peter Date: Thu, 12 Dec 2013 22:44:51 +0100 Subject: [PATCH] Update plugin_vulns.xml --- data/plugin_vulns.xml | 85 ++++++++++++++++++++++++++++++++++++++----- 1 file changed, 76 insertions(+), 9 deletions(-) diff --git a/data/plugin_vulns.xml b/data/plugin_vulns.xml index e20defa9..c7262ffc 100644 --- a/data/plugin_vulns.xml +++ b/data/plugin_vulns.xml @@ -259,9 +259,23 @@ - Floating Social Media Links <= 1.4.2 - Remote File Inclusion + Floating Social Media Links <= 1.4.2 - fsml-admin.js.php wpp Parameter Remote File Inclusion + 88383 51346 + http://www.securityfocus.com/bid/56913 + http://xforce.iss.net/xforce/xfdb/80641 + http://ceriksen.com/2013/01/12/wordpress-floating-social-media-link-plugins-remote-file-inclusion/ + + RFI + 1.4.3 + + + Floating Social Media Links <= 1.4.2 - fsml-hideshow.js.php wpp Parameter Remote File Inclusion + + 88385 + 51346 + http://www.securityfocus.com/bid/56913 http://ceriksen.com/2013/01/12/wordpress-floating-social-media-link-plugins-remote-file-inclusion/ RFI @@ -1571,6 +1585,16 @@ UNKNOWN + + Wp-ImageZoom - zoom.php id Parameter SQL Injection + + 87870 + http://packetstormsecurity.com/files/118371/ + http://www.securityfocus.com/bid/56691 + http://xforce.iss.net/xforce/xfdb/80285 + + SQLI + @@ -2571,6 +2595,23 @@ + + Zingiri Web Shop 2.5.0 - ajaxfilemanager.php path Parameter File Upload Arbitrary Code Execution + + 87833 + http://packetstormsecurity.com/files/118318/ + http://www.securityfocus.com/bid/56659 + http://xforce.iss.net/xforce/xfdb/80257 + + RCE + + + Zingiri Web Shop 2.4.3 - Shell Upload + + http://packetstormsecurity.com/files/113668/ + + UPLOAD + Zingiri Web Shop - Cookie SQL Injection Vulnerability @@ -2612,13 +2653,6 @@ XSS - - Zingiri Web Shop 2.4.3 - Shell Upload - - http://packetstormsecurity.com/files/113668/ - - UPLOAD - @@ -3998,12 +4032,20 @@ - plugin myflash <= 1.00 - (wppath) RFI Vulnerability + Myflash <= 1.00 - (wppath) RFI Vulnerability 3828 RFI + + Myflash - myextractXML.php path Parameter Arbitrary File Access + + 88260 + http://packetstormsecurity.com/files/118400/ + + LFI + @@ -5648,6 +5690,7 @@ HD Webplayer - Two SQL Injection Vulnerabilities + 87832 50466 SQLI @@ -8954,4 +8997,28 @@ + + + Zarzadzanie Kontem - ajaxfilemanager.php File Upload Arbitrary Code Execution + + 87834 + http://packetstormsecurity.com/files/118322/ + + UPLOAD + + + + + + Ads Box - iframe_ampl.php count Parameter SQL Injection + + 88257 + http://packetstormsecurity.com/files/118342/ + http://www.securityfocus.com/bid/56681 + http://xforce.iss.net/xforce/xfdb/80256 + + SQLI + + +