Update vuln db
This commit is contained in:
@@ -11516,4 +11516,80 @@
|
|||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
|
<plugin name="duplicate-post">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Duplicate Post 2.5 - duplicate-post-admin.php User Login Cookie Value SQL Injection</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>104669</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>SQLI</type>
|
||||||
|
<fixed_in>2.6</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>Duplicate Post 2.5 - options-general.php post Parameter Reflected XSS</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>104670</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
<fixed_in>2.6</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
</plugin>
|
||||||
|
|
||||||
|
<plugin name="mtouch-quiz">
|
||||||
|
<vulnerability>
|
||||||
|
<title>mTouch Quiz 3.0.6 - question.php quiz Parameter Reflected XSS</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>104667</osvdb>
|
||||||
|
<url>http://www.securityfocus.com/bid/66306</url>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
<fixed_in>3.0.7</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>mTouch Quiz 3.0.6 - question.php quiz Parameter SQL Injection</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>104668</osvdb>
|
||||||
|
<url>http://www.securityfocus.com/bid/66306</url>
|
||||||
|
</references>
|
||||||
|
<type>SQLI</type>
|
||||||
|
<fixed_in>3.0.7</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
</plugin>
|
||||||
|
|
||||||
|
<plugin name="simple-retail-menus">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Simple Retail Menus 4.0.1 - includes/actions.php targetmenu Parameter SQL Injection</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>104680</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>SQLI</type>
|
||||||
|
<fixed_in>4.1</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>Simple Retail Menus 4.0.1 - includes/mode-edit.php targetmenu Parameter SQL Injection</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>104682</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>SQLI</type>
|
||||||
|
<fixed_in>4.1</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
</plugin>
|
||||||
|
|
||||||
|
<plugin name="user-domain-whitelist">
|
||||||
|
<vulnerability>
|
||||||
|
<title>User Domain Whitelist 1.4 - user-domain-whitelist.php domain_whitelist Parameter Stored XSS</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>104681</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>User Domain Whitelist 1.4 - user-domain-whitelist.php Domain Whitelisting Manipulation CSRF</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>104683</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>CSRF</type>
|
||||||
|
<fixed_in>1.5</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
</plugin>
|
||||||
</vulnerabilities>
|
</vulnerabilities>
|
||||||
|
|||||||
Reference in New Issue
Block a user