Update plugin_vulns.xml
This commit is contained in:
@@ -758,7 +758,16 @@
|
|||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
<plugin name="mac-dock-photogallery">
|
<plugin name="mac-dock-gallery">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Mac Photo Gallery 2.7 - upload-file.php File Upload PHP Code Execution</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>82844</osvdb>
|
||||||
|
<secunia>49468</secunia>
|
||||||
|
<exploitdb>19056</exploitdb>
|
||||||
|
</references>
|
||||||
|
<type>UPLOAD</type>
|
||||||
|
</vulnerability>
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>SWF Vulnerable to XSS Bundled in Many WordPress Plugins</title>
|
<title>SWF Vulnerable to XSS Bundled in Many WordPress Plugins</title>
|
||||||
<references>
|
<references>
|
||||||
@@ -1594,10 +1603,12 @@
|
|||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
<plugin name="auctionplugin">
|
<plugin name="auctionPlugin">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Auctions 2.0.1.3 - Arbitrary File Upload Vulnerability</title>
|
<title>Sitemile Auctions 2.0.1.3 - wp-content/plugins/auctionPlugin/upload.php File Upload PHP Code Execution</title>
|
||||||
<references>
|
<references>
|
||||||
|
<osvdb>83075</osvdb>
|
||||||
|
<secunia>49497</secunia>
|
||||||
<url>http://packetstormsecurity.com/files/113568/</url>
|
<url>http://packetstormsecurity.com/files/113568/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
@@ -1704,9 +1715,12 @@
|
|||||||
|
|
||||||
<plugin name="topquark">
|
<plugin name="topquark">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Top Quark Architecture Version 2.10 - Arbitrary File Upload Vulnerability</title>
|
<title>Top Quark Architecture 2.1.0 - lib/js/fancyupload/showcase/batch/script.php File Upload PHP Code Execution</title>
|
||||||
<references>
|
<references>
|
||||||
|
<osvdb>82843</osvdb>
|
||||||
|
<secunia>49465</secunia>
|
||||||
<exploitdb>19053</exploitdb>
|
<exploitdb>19053</exploitdb>
|
||||||
|
<url>http://packetstormsecurity.com/files/113522/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -1791,9 +1805,11 @@
|
|||||||
|
|
||||||
<plugin name="custom-content-type-manager">
|
<plugin name="custom-content-type-manager">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Custom Content Type Manager 0.9.5.13pl - Arbitrary File Upload Vulnerability</title>
|
<title>Custom Content Type Manager 0.9.5.13pl - upload_form.php File Upload PHP Code Execution</title>
|
||||||
<references>
|
<references>
|
||||||
|
<osvdb>82904</osvdb>
|
||||||
<exploitdb>19058</exploitdb>
|
<exploitdb>19058</exploitdb>
|
||||||
|
<url>http://packetstormsecurity.com/files/113520/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -4483,6 +4499,15 @@
|
|||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
<plugin name="evarisk">
|
<plugin name="evarisk">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Evarisk 5.1.5.4 - include/lib/actionsCorrectives/activite/uploadPhotoApres.php File Upload PHP Code Execution</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>82960</osvdb>
|
||||||
|
<secunia>49521</secunia>
|
||||||
|
<url>http://packetstormsecurity.com/files/113638/</url>
|
||||||
|
</references>
|
||||||
|
<type>UPLOAD</type>
|
||||||
|
</vulnerability>
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Evarisk <= 5.1.3.6 - SQL Injection Vulnerability</title>
|
<title>Evarisk <= 5.1.3.6 - SQL Injection Vulnerability</title>
|
||||||
<references>
|
<references>
|
||||||
@@ -4490,13 +4515,6 @@
|
|||||||
</references>
|
</references>
|
||||||
<type>SQLI</type>
|
<type>SQLI</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
<vulnerability>
|
|
||||||
<title>Evarisk 5.1.5.4 - Shell Upload</title>
|
|
||||||
<references>
|
|
||||||
<url>http://packetstormsecurity.com/files/113638/</url>
|
|
||||||
</references>
|
|
||||||
<type>UPLOAD</type>
|
|
||||||
</vulnerability>
|
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
<plugin name="profiles">
|
<plugin name="profiles">
|
||||||
@@ -4925,11 +4943,13 @@
|
|||||||
|
|
||||||
<plugin name="annonces">
|
<plugin name="annonces">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Annonces 1.2.0.0 - Remote File Inclusion</title>
|
<title>Annonces 1.2.0.1 - admin/theme.php File Upload PHP Code Execution</title>
|
||||||
<references>
|
<references>
|
||||||
<exploitdb>17863</exploitdb>
|
<osvdb>82948</osvdb>
|
||||||
|
<secunia>49488</secunia>
|
||||||
|
<url>http://packetstormsecurity.com/files/113637/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>RFI</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
@@ -9928,4 +9948,28 @@
|
|||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
|
<plugin name="nmedia-mailchimp-widget">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Nmedia MailChimp 3.1 - api_mailchimp/postToMailChimp.php abs_path Parameter XSS</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>83083</osvdb>
|
||||||
|
<secunia>49538</secunia>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
<fixed_in>3.2</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
</plugin>
|
||||||
|
|
||||||
|
<plugin name="ns-utilities">
|
||||||
|
<vulnerability>
|
||||||
|
<title>NS Utilities 1.0 - Unspecified Remote Issue</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>82944</osvdb>
|
||||||
|
<secunia>49476</secunia>
|
||||||
|
</references>
|
||||||
|
<type>UNKNOWN</type>
|
||||||
|
<fixed_in>1.1</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
</plugin>
|
||||||
|
|
||||||
</vulnerabilities>
|
</vulnerabilities>
|
||||||
|
|||||||
Reference in New Issue
Block a user