Update plugin_vulns.xml

This commit is contained in:
Peter
2014-01-04 21:24:33 +01:00
parent 8c1ee9cf21
commit 62e86a0474

View File

@@ -7659,9 +7659,11 @@
<plugin name="dropdown-menu-widget"> <plugin name="dropdown-menu-widget">
<vulnerability> <vulnerability>
<title>Dropdown Menu Widget - Script Insertion CSRF</title> <title>Dropdown Menu Widget 1.9.1 - Script Insertion CSRF</title>
<references> <references>
<osvdb>94771</osvdb> <osvdb>94771</osvdb>
<cve>2013-2704</cve>
<secunia>52958</secunia>
</references> </references>
<type>CSRF</type> <type>CSRF</type>
</vulnerability> </vulnerability>
@@ -8244,13 +8246,25 @@
<plugin name="thinkit-wp-contact-form"> <plugin name="thinkit-wp-contact-form">
<vulnerability> <vulnerability>
<title>ThinkIT 0.1 - Multiple Vulnerabilities</title> <title>ThinkIT &lt;= 0.3 - wp-admin/admin.php Contact Form Deletion CSRF</title>
<references> <references>
<osvdb>96514</osvdb>
<secunia>54592</secunia>
<exploitdb>27751</exploitdb> <exploitdb>27751</exploitdb>
<osvdb>96515</osvdb>
<url>http://packetstormsecurity.com/files/122898/</url> <url>http://packetstormsecurity.com/files/122898/</url>
</references> </references>
<type>MULTI</type> <type>CSRF</type>
</vulnerability>
<vulnerability>
<title>ThinkIT &lt;= 0.2 - wp-admin/admin.php toitcf_current_id Parameter XSS</title>
<references>
<osvdb>96515</osvdb>
<secunia>54592</secunia>
<exploitdb>27751</exploitdb>
<url>http://packetstormsecurity.com/files/122898/</url>
</references>
<type>XSS</type>
<fixed_in>0.3</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -8648,7 +8662,7 @@
<osvdb>98668</osvdb> <osvdb>98668</osvdb>
<secunia>55296</secunia> <secunia>55296</secunia>
<exploitdb>28970</exploitdb> <exploitdb>28970</exploitdb>
<url>http://packetstormsecurity.com/files/123597/</url> <url>http://packetstormsecurity.com/files/123634/</url>
<url>http://www.securityfocus.com/bid/63021</url> <url>http://www.securityfocus.com/bid/63021</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
@@ -8680,6 +8694,14 @@
</references> </references>
<type>SQLI</type> <type>SQLI</type>
</vulnerability> </vulnerability>
<vulnerability>
<title>WP Realty - index_ext.php listing_id Parameter Reflected XSS</title>
<references>
<osvdb>101583</osvdb>
<url>http://packetstormsecurity.com/files/124418/</url>
</references>
<type>XSS</type>
</vulnerability>
</plugin> </plugin>
<plugin name="feed"> <plugin name="feed">