Same URL syntax for all Packet Storm Security URL's
Packet Storm Security URL's don't need the 'friendly part' of the URL. So it can be neglected.
This commit is contained in:
@@ -322,8 +322,7 @@
|
||||
<vulnerability>
|
||||
<title>OpenInviter Information Disclosure</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/119265/WordPress-OpenInviter-Information-Disclosure.html
|
||||
</url>
|
||||
<url>http://packetstormsecurity.com/files/119265/</url>
|
||||
</references>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
@@ -439,7 +438,7 @@
|
||||
<vulnerability>
|
||||
<title>Shopping Cart Shell Upload / SQL Injection</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/119217/wplevelfour-sqlshell.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/119217/</url>
|
||||
<secunia>51690</secunia>
|
||||
</references>
|
||||
<type>MULTI</type>
|
||||
@@ -451,7 +450,7 @@
|
||||
<vulnerability>
|
||||
<title>ReFlex Gallery Shell Upload</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/119218/wpreflexgallery-shell.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/119218/</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
@@ -461,7 +460,7 @@
|
||||
<vulnerability>
|
||||
<title>Uploader 1.0.4 Shell Upload</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/119219/wpuploader104-shell.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/119219/</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
@@ -471,7 +470,7 @@
|
||||
<vulnerability>
|
||||
<title>Xerte Online 0.32 Shell Upload</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/119220/wpxerteonline-shell.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/119220/</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
@@ -481,7 +480,7 @@
|
||||
<vulnerability>
|
||||
<title>Advanced Custom Fields <= 3.5.1 Remote File Inclusion</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/119221/wp_advanced_custom_fields_exec.rb.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/119221/</url>
|
||||
<secunia>51037</secunia>
|
||||
<metasploit>exploit/unix/webapp/wp_advanced_custom_fields_exec</metasploit>
|
||||
</references>
|
||||
@@ -960,7 +959,7 @@
|
||||
<vulnerability>
|
||||
<title>Catalog HTML Code Injection and Cross-site scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/117820/wpcatalog-xss.txt</url>
|
||||
<url>http://packetstormsecurity.org/files/117820/</url>
|
||||
<secunia>51143</secunia>
|
||||
</references>
|
||||
<type>MULTI</type>
|
||||
@@ -1028,7 +1027,7 @@
|
||||
<vulnerability>
|
||||
<title>BBPress SQL Injection / Path Disclosure</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/116123</url>
|
||||
<url>http://packetstormsecurity.org/files/116123/</url>
|
||||
</references>
|
||||
<type>MULTI</type>
|
||||
</vulnerability>
|
||||
@@ -1038,7 +1037,7 @@
|
||||
<vulnerability>
|
||||
<title>NextGen Cu3er Gallery Information Disclosure</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/116150</url>
|
||||
<url>http://packetstormsecurity.org/files/116150/</url>
|
||||
</references>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
@@ -1048,7 +1047,7 @@
|
||||
<vulnerability>
|
||||
<title>Rich Widget File Upload</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/115787/wprichwidget-shell.txt</url>
|
||||
<url>http://packetstormsecurity.org/files/115787/</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
@@ -1058,7 +1057,7 @@
|
||||
<vulnerability>
|
||||
<title>Monsters Editor Shell Upload</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/115788/wpmonsters-shell.txt</url>
|
||||
<url>http://packetstormsecurity.org/files/115788/</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
@@ -1132,7 +1131,7 @@
|
||||
<vulnerability>
|
||||
<title>Resume Submissions Job Posting v2.5.1 Unrestricted File Upload</title>
|
||||
<references>
|
||||
<url>http://www.packetstormsecurity.org/files/114716</url>
|
||||
<url>http://packetstormsecurity.org/files/114716/</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
@@ -1652,7 +1651,7 @@
|
||||
<vulnerability>
|
||||
<title>FoxyPress 0.4.2.5 XSS / CSRF / SQL Injection</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/117768</url>
|
||||
<url>http://packetstormsecurity.org/files/117768/</url>
|
||||
<secunia>51109</secunia>
|
||||
</references>
|
||||
<type>MULTI</type>
|
||||
@@ -1801,7 +1800,7 @@
|
||||
<title>WordPress pretty-link plugin XSS in SWF</title>
|
||||
<references>
|
||||
<url>http://seclists.org/bugtraq/2013/Feb/100</url>
|
||||
<url>http://packetstormsecurity.com/files/120433/wpprettylink163-xss.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/120433/</url>
|
||||
<cve>2013-1636</cve>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
@@ -2116,8 +2115,8 @@
|
||||
<vulnerability>
|
||||
<title>Organizer 1.2.1 Cross Site Scripting / Path Disclosure</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/112086</url>
|
||||
<url>http://packetstormsecurity.org/files/113800</url>
|
||||
<url>http://packetstormsecurity.org/files/112086/</url>
|
||||
<url>http://packetstormsecurity.org/files/113800/</url>
|
||||
</references>
|
||||
<type>MULTI</type>
|
||||
</vulnerability>
|
||||
@@ -2127,7 +2126,7 @@
|
||||
<vulnerability>
|
||||
<title>Zingiri Tickets plugin File Disclosure</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/111904</url>
|
||||
<url>http://packetstormsecurity.org/files/111904/</url>
|
||||
</references>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
@@ -2167,7 +2166,7 @@
|
||||
<vulnerability>
|
||||
<title>Register Plus Redux <= 3.8.3 Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/111367</url>
|
||||
<url>http://packetstormsecurity.org/files/111367/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
@@ -2177,7 +2176,7 @@
|
||||
<vulnerability>
|
||||
<title>Magn WP Drag and Drop <= 1.1.4 Upload Shell Upload Vulnerability</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/110103</url>
|
||||
<url>http://packetstormsecurity.org/files/110103/</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
@@ -2244,7 +2243,7 @@
|
||||
<vulnerability>
|
||||
<title>myEASYbackup 1.0.8.1 Directory Traversal</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/108711</url>
|
||||
<url>http://packetstormsecurity.org/files/108711/</url>
|
||||
</references>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
@@ -2261,14 +2260,14 @@
|
||||
<vulnerability>
|
||||
<title>Count Per Day 3.2.3 Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/115904</url>
|
||||
<url>http://packetstormsecurity.org/files/115904/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>Count Per Day 3.1.1 Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/114787/SSCHADV2012-015.txt</url>
|
||||
<url>http://packetstormsecurity.org/files/114787/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
@@ -2312,7 +2311,7 @@
|
||||
<vulnerability>
|
||||
<title>Yousaytoo Auto Publishing <= 1.0 Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/108470</url>
|
||||
<url>http://packetstormsecurity.org/files/108470/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
@@ -2332,7 +2331,7 @@
|
||||
<vulnerability>
|
||||
<title>Whois Search <= 1.4.2 Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/108271</url>
|
||||
<url>http://packetstormsecurity.org/files/108271/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
@@ -2663,7 +2662,7 @@
|
||||
<vulnerability>
|
||||
<title>GRAND Flash Album Gallery <= 1.71 XSS Vulnerability</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.org/files/112704</url>
|
||||
<url>http://packetstormsecurity.org/files/112704/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
@@ -2744,7 +2743,7 @@
|
||||
<vulnerability>
|
||||
<title>WP Forum Server plugin <= 1.7.3 SQL Injection / XSS Vulnerabilities</title>
|
||||
<references>
|
||||
<url>http://www.packetstormsecurity.org/files/112703</url>
|
||||
<url>http://packetstormsecurity.org/files/112703/</url>
|
||||
</references>
|
||||
<type>MULTI</type>
|
||||
</vulnerability>
|
||||
@@ -2774,7 +2773,7 @@
|
||||
<vulnerability>
|
||||
<title>WordPress Comment Rating 2.9.32 SQL Injection / Bypass</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/120569/wpcomment2932-sqlbypass.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/120569/</url>
|
||||
</references>
|
||||
<type>MULTI</type>
|
||||
</vulnerability>
|
||||
@@ -4203,7 +4202,7 @@
|
||||
<vulnerability>
|
||||
<title>GD Star Rating plugin <= 1.9.16 Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://www.packetstormsecurity.org/files/112702</url>
|
||||
<url>http://packetstormsecurity.org/files/112702/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
@@ -4396,7 +4395,7 @@
|
||||
<vulnerability>
|
||||
<title>floating-tweets persistent XSS</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/119499/floatingtweets-xsstraversal.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/119499/</url>
|
||||
<url>http://websecurity.com.ua/6023/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
@@ -4404,7 +4403,7 @@
|
||||
<vulnerability>
|
||||
<title>floating-tweets directory traversal</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/119499/floatingtweets-xsstraversal.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/119499/</url>
|
||||
<url>http://websecurity.com.ua/6023/</url>
|
||||
</references>
|
||||
<type>UNKNOWN</type>
|
||||
@@ -4457,7 +4456,7 @@
|
||||
<title>WP-SlimStat-Ex - Open Flash Chart Arbitrary File Creation Vulnerability</title>
|
||||
<references>
|
||||
<secunia>55160</secunia>
|
||||
<url>http://packetstormsecurity.com/files/123494/wpslimstatex-exec.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/123494/</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
@@ -4681,7 +4680,7 @@
|
||||
<title>SQL Injection Vulnerability in Wysija Newsletters WordPress Plugin</title>
|
||||
<references>
|
||||
<url>https://www.htbridge.com/advisory/HTB23140</url>
|
||||
<url>http://packetstormsecurity.com/files/120089/wpwysijanl-sql.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/120089/</url>
|
||||
<url>http://seclists.org/bugtraq/2013/Feb/29</url>
|
||||
<url>http://cxsecurity.com/issue/WLB-2013020039</url>
|
||||
</references>
|
||||
@@ -5096,7 +5095,7 @@
|
||||
<vulnerability>
|
||||
<title>Wordpress wp-table-reloaded plugin cross-site scripting in SWF</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/119968/wptablereloaded-xss.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/119968/</url>
|
||||
<secunia>52027</secunia>
|
||||
<url>http://seclists.org/bugtraq/2013/Feb/28</url>
|
||||
</references>
|
||||
@@ -5149,7 +5148,7 @@
|
||||
<title>Cross-Site Scripting (XSS) Vulnerability in CommentLuv WordPress Plugin</title>
|
||||
<references>
|
||||
<url>https://www.htbridge.com/advisory/HTB23138</url>
|
||||
<url>http://packetstormsecurity.com/files/120090/wpcommentluv-xss.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/120090/</url>
|
||||
<url>http://seclists.org/bugtraq/2013/Feb/30</url>
|
||||
<url>http://cxsecurity.com/issue/WLB-2013020040</url>
|
||||
<secunia>52092</secunia>
|
||||
@@ -5251,7 +5250,7 @@
|
||||
<title>smart-flv jwplayer.swf XSS</title>
|
||||
<references>
|
||||
<url>http://www.openwall.com/lists/oss-security/2013/02/24/7</url>
|
||||
<url>http://packetstormsecurity.com/files/115100/jwplayer-xss.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/115100/</url>
|
||||
<osvdb>90606</osvdb>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
@@ -5284,7 +5283,7 @@
|
||||
<vulnerability>
|
||||
<title>Marekkis Watermark Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/120378/wpmarekkiswatermark-xss.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/120378/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
@@ -5294,7 +5293,7 @@
|
||||
<vulnerability>
|
||||
<title>Responsive Logo Slideshow Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/120379/wpresponsivelogo-xss.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/120379/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
@@ -5605,7 +5604,7 @@
|
||||
<vulnerability>
|
||||
<title>Terillion Reviews Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/120730/wpterillionreviews-xss.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/120730/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
@@ -5761,8 +5760,7 @@
|
||||
<vulnerability>
|
||||
<title>podPress 8.8.10.13 Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/121011/WordPress-podPress-8.8.10.13-Cross-Site-Scripting.html
|
||||
</url>
|
||||
<url>http://packetstormsecurity.com/files/121011/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
@@ -6191,8 +6189,7 @@
|
||||
<vulnerability>
|
||||
<title>ADIF Log Search Widget XSS Arbitrary Vulnerability</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/121777/ADIF-Log-Search-Widget-1.0e-Cross-Site-Scripting.html
|
||||
</url>
|
||||
<url>http://packetstormsecurity.com/files/121777/</url>
|
||||
<secunia>53599</secunia>
|
||||
<osvdb>93721</osvdb>
|
||||
</references>
|
||||
@@ -6639,7 +6636,7 @@
|
||||
<vulnerability>
|
||||
<title>Lazy SEO 1.1.9 - lazyseo.php File Upload Arbitrary Code Execution</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/123349/wplazyseo-shell.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/123349/</url>
|
||||
<url>http://xforce.iss.net/xforce/xfdb/87384</url>
|
||||
<osvdb>97662</osvdb>
|
||||
<cve>2013-5961</cve>
|
||||
@@ -6653,7 +6650,7 @@
|
||||
<vulnerability>
|
||||
<title>SEO Watcher - Open Flash Chart Arbitrary File Creation Vulnerability</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/123493/wpseowatcher-exec.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/123493/</url>
|
||||
<secunia>55162</secunia>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
@@ -6676,7 +6673,7 @@
|
||||
<vulnerability>
|
||||
<title>Simple Dropbox Upload - Arbitrary File Upload Vulnerability</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/123235/wpsdu-shell.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/123235/</url>
|
||||
<url>http://xforce.iss.net/xforce/xfdb/87166</url>
|
||||
<secunia>54856</secunia>
|
||||
<cve>2013-5963</cve>
|
||||
@@ -6701,7 +6698,7 @@
|
||||
<title>miniAudioPlayer - Two XSS Vulnerabilities</title>
|
||||
<references>
|
||||
<secunia>54979</secunia>
|
||||
<url>http://packetstormsecurity.com/files/123372/wpminiaudioplayer-xss.txt</url>
|
||||
<url>http://packetstormsecurity.com/files/123372/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
@@ -6725,7 +6722,7 @@
|
||||
<secunia>54894</secunia>
|
||||
<cve>2013-5962</cve>
|
||||
<exploitdb>28377</exploitdb>
|
||||
<url>http://packetstormsecurity.com/files/123303</url>
|
||||
<url>http://packetstormsecurity.com/files/123303/</url>
|
||||
<url>http://xforce.iss.net/xforce/xfdb/87172</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
|
||||
Reference in New Issue
Block a user