Update plugin_vulns.xml
This commit is contained in:
@@ -6592,12 +6592,23 @@
|
|||||||
|
|
||||||
<plugin name="simply-poll">
|
<plugin name="simply-poll">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Simply Poll 1.4.1 - Multiple Vulnerabilities</title>
|
<title>Simply Poll 1.4.1 - wp-admin/admin.php question Parameter XSS</title>
|
||||||
<references>
|
<references>
|
||||||
<exploitdb>24850</exploitdb>
|
|
||||||
<osvdb>91446</osvdb>
|
<osvdb>91446</osvdb>
|
||||||
|
<exploitdb>24850</exploitdb>
|
||||||
|
<url>http://packetstormsecurity.com/files/120833/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>MULTI</type>
|
<type>XSS</type>
|
||||||
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>Simply Poll 1.4.1 - wp-admin/admin.php Poll Manipulation CSRF</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>91447</osvdb>
|
||||||
|
<secunia>52681</secunia>
|
||||||
|
<exploitdb>24850</exploitdb>
|
||||||
|
<url>http://packetstormsecurity.com/files/120833/</url>
|
||||||
|
</references>
|
||||||
|
<type>CSRF</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
@@ -6744,8 +6755,11 @@
|
|||||||
|
|
||||||
<plugin name="podpress">
|
<plugin name="podpress">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>podPress 8.8.10.13 - Cross Site Scripting</title>
|
<title>podPress 8.8.10.13 - players/1pixelout/1pixelout_player.swf playerID Parameter XSS</title>
|
||||||
<references>
|
<references>
|
||||||
|
<osvdb>91129</osvdb>
|
||||||
|
<cve>2013-2714</cve>
|
||||||
|
<secunia>52544</secunia>
|
||||||
<url>http://packetstormsecurity.com/files/121011/</url>
|
<url>http://packetstormsecurity.com/files/121011/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
@@ -8076,22 +8090,44 @@
|
|||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
<plugin name="faqs-manager">
|
<plugin name="faqs-manager">
|
||||||
<vulnerability>
|
|
||||||
<title>IndiaNIC FAQs Manager 1.0 - Multiple Vulnerabilities</title>
|
|
||||||
<references>
|
|
||||||
<exploitdb>24867</exploitdb>
|
|
||||||
<osvdb>91625</osvdb>
|
|
||||||
</references>
|
|
||||||
<type>MULTI</type>
|
|
||||||
</vulnerability>
|
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>IndiaNIC FAQs Manager 1.0 - Blind SQL Injection</title>
|
<title>IndiaNIC FAQs Manager 1.0 - Blind SQL Injection</title>
|
||||||
<references>
|
<references>
|
||||||
<exploitdb>24868</exploitdb>
|
|
||||||
<osvdb>91623</osvdb>
|
<osvdb>91623</osvdb>
|
||||||
|
<exploitdb>24868</exploitdb>
|
||||||
|
<url>http://packetstormsecurity.com/files/120911/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>SQLI</type>
|
<type>SQLI</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>IndiaNIC FAQs Manager 1.0 - Ask Question Form question Parameter XSS</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>91624</osvdb>
|
||||||
|
<exploitdb>24867</exploitdb>
|
||||||
|
<secunia>52780</secunia>
|
||||||
|
<url>http://packetstormsecurity.com/files/120910/</url>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>IndiaNIC FAQs Manager 1.0 - CAPTCHA Value Disclosure</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>91625</osvdb>
|
||||||
|
<exploitdb>24867</exploitdb>
|
||||||
|
<url>http://packetstormsecurity.com/files/120910/</url>
|
||||||
|
</references>
|
||||||
|
<type>UNKNOWN</type>
|
||||||
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>IndiaNIC FAQs Manager 1.0 - FAQ Setting Manipulation CSRF</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>91626</osvdb>
|
||||||
|
<secunia>52780</secunia>
|
||||||
|
<exploitdb>24867</exploitdb>
|
||||||
|
<url>http://packetstormsecurity.com/files/120910/</url>
|
||||||
|
</references>
|
||||||
|
<type>CSRF</type>
|
||||||
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
<plugin name="booking-system">
|
<plugin name="booking-system">
|
||||||
|
|||||||
Reference in New Issue
Block a user