Merge pull request #447 from droope/arb-fileupload-add
add more templates which are vulnerable to 1337day.com/exploit/22090
This commit is contained in:
@@ -3114,4 +3114,388 @@
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="flatshop">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="magazine">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="parallax">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="bold">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="metro">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="pinshop">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="agency">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="slide">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="postline">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="fullscreen">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="shopo">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="minshop">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="notes">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="shopdock">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="phototouch">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="basic">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="responz">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="simfo">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="grido">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="tisa">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="funki">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="minblr">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="newsy">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="wumblr">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="rezo">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="photobox">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="edmin">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="koi">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="bizco">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="thememin">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="wigi">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="sidepane">
|
||||
<vulnerability>
|
||||
<title>themify-ajax.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100271</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124097/</url>
|
||||
<url>http://1337day.com/exploit/22090</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
</vulnerabilities>
|
||||
|
||||
Reference in New Issue
Block a user