Update plugin_vulns.xml

This commit is contained in:
Peter
2014-01-09 20:33:41 +01:00
parent 8cc83a8df9
commit 5d05ecaee3

View File

@@ -758,7 +758,16 @@
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="mac-dock-photogallery"> <plugin name="mac-dock-gallery">
<vulnerability>
<title>Mac Photo Gallery 2.7 - upload-file.php File Upload PHP Code Execution</title>
<references>
<osvdb>82844</osvdb>
<secunia>49468</secunia>
<exploitdb>19056</exploitdb>
</references>
<type>UPLOAD</type>
</vulnerability>
<vulnerability> <vulnerability>
<title>SWF Vulnerable to XSS Bundled in Many WordPress Plugins</title> <title>SWF Vulnerable to XSS Bundled in Many WordPress Plugins</title>
<references> <references>
@@ -1594,10 +1603,12 @@
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="auctionplugin"> <plugin name="auctionPlugin">
<vulnerability> <vulnerability>
<title>Auctions 2.0.1.3 - Arbitrary File Upload Vulnerability</title> <title>Sitemile Auctions 2.0.1.3 - wp-content/plugins/auctionPlugin/upload.php File Upload PHP Code Execution</title>
<references> <references>
<osvdb>83075</osvdb>
<secunia>49497</secunia>
<url>http://packetstormsecurity.com/files/113568/</url> <url>http://packetstormsecurity.com/files/113568/</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
@@ -1704,9 +1715,12 @@
<plugin name="topquark"> <plugin name="topquark">
<vulnerability> <vulnerability>
<title>Top Quark Architecture Version 2.10 - Arbitrary File Upload Vulnerability</title> <title>Top Quark Architecture 2.1.0 - lib/js/fancyupload/showcase/batch/script.php File Upload PHP Code Execution</title>
<references> <references>
<osvdb>82843</osvdb>
<secunia>49465</secunia>
<exploitdb>19053</exploitdb> <exploitdb>19053</exploitdb>
<url>http://packetstormsecurity.com/files/113522/</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -1791,9 +1805,11 @@
<plugin name="custom-content-type-manager"> <plugin name="custom-content-type-manager">
<vulnerability> <vulnerability>
<title>Custom Content Type Manager 0.9.5.13pl - Arbitrary File Upload Vulnerability</title> <title>Custom Content Type Manager 0.9.5.13pl - upload_form.php File Upload PHP Code Execution</title>
<references> <references>
<osvdb>82904</osvdb>
<exploitdb>19058</exploitdb> <exploitdb>19058</exploitdb>
<url>http://packetstormsecurity.com/files/113520/</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -4483,6 +4499,15 @@
</plugin> </plugin>
<plugin name="evarisk"> <plugin name="evarisk">
<vulnerability>
<title>Evarisk 5.1.5.4 - include/lib/actionsCorrectives/activite/uploadPhotoApres.php File Upload PHP Code Execution</title>
<references>
<osvdb>82960</osvdb>
<secunia>49521</secunia>
<url>http://packetstormsecurity.com/files/113638/</url>
</references>
<type>UPLOAD</type>
</vulnerability>
<vulnerability> <vulnerability>
<title>Evarisk &lt;= 5.1.3.6 - SQL Injection Vulnerability</title> <title>Evarisk &lt;= 5.1.3.6 - SQL Injection Vulnerability</title>
<references> <references>
@@ -4490,13 +4515,6 @@
</references> </references>
<type>SQLI</type> <type>SQLI</type>
</vulnerability> </vulnerability>
<vulnerability>
<title>Evarisk 5.1.5.4 - Shell Upload</title>
<references>
<url>http://packetstormsecurity.com/files/113638/</url>
</references>
<type>UPLOAD</type>
</vulnerability>
</plugin> </plugin>
<plugin name="profiles"> <plugin name="profiles">
@@ -4925,11 +4943,13 @@
<plugin name="annonces"> <plugin name="annonces">
<vulnerability> <vulnerability>
<title>Annonces 1.2.0.0 - Remote File Inclusion</title> <title>Annonces 1.2.0.1 - admin/theme.php File Upload PHP Code Execution</title>
<references> <references>
<exploitdb>17863</exploitdb> <osvdb>82948</osvdb>
<secunia>49488</secunia>
<url>http://packetstormsecurity.com/files/113637/</url>
</references> </references>
<type>RFI</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -9928,4 +9948,28 @@
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="nmedia-mailchimp-widget">
<vulnerability>
<title>Nmedia MailChimp 3.1 - api_mailchimp/postToMailChimp.php abs_path Parameter XSS</title>
<references>
<osvdb>83083</osvdb>
<secunia>49538</secunia>
</references>
<type>XSS</type>
<fixed_in>3.2</fixed_in>
</vulnerability>
</plugin>
<plugin name="ns-utilities">
<vulnerability>
<title>NS Utilities 1.0 - Unspecified Remote Issue</title>
<references>
<osvdb>82944</osvdb>
<secunia>49476</secunia>
</references>
<type>UNKNOWN</type>
<fixed_in>1.1</fixed_in>
</vulnerability>
</plugin>
</vulnerabilities> </vulnerabilities>