Same URL syntax for all Packet Storm Security URL's
Packet Storm Security URL's don't need the 'friendly part' of the URL. So it can be neglected.
This commit is contained in:
@@ -322,8 +322,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>OpenInviter Information Disclosure</title>
|
<title>OpenInviter Information Disclosure</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/119265/WordPress-OpenInviter-Information-Disclosure.html
|
<url>http://packetstormsecurity.com/files/119265/</url>
|
||||||
</url>
|
|
||||||
</references>
|
</references>
|
||||||
<type>UNKNOWN</type>
|
<type>UNKNOWN</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -439,7 +438,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Shopping Cart Shell Upload / SQL Injection</title>
|
<title>Shopping Cart Shell Upload / SQL Injection</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/119217/wplevelfour-sqlshell.txt</url>
|
<url>http://packetstormsecurity.com/files/119217/</url>
|
||||||
<secunia>51690</secunia>
|
<secunia>51690</secunia>
|
||||||
</references>
|
</references>
|
||||||
<type>MULTI</type>
|
<type>MULTI</type>
|
||||||
@@ -451,7 +450,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>ReFlex Gallery Shell Upload</title>
|
<title>ReFlex Gallery Shell Upload</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/119218/wpreflexgallery-shell.txt</url>
|
<url>http://packetstormsecurity.com/files/119218/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -461,7 +460,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Uploader 1.0.4 Shell Upload</title>
|
<title>Uploader 1.0.4 Shell Upload</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/119219/wpuploader104-shell.txt</url>
|
<url>http://packetstormsecurity.com/files/119219/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -471,7 +470,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Xerte Online 0.32 Shell Upload</title>
|
<title>Xerte Online 0.32 Shell Upload</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/119220/wpxerteonline-shell.txt</url>
|
<url>http://packetstormsecurity.com/files/119220/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -481,7 +480,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Advanced Custom Fields <= 3.5.1 Remote File Inclusion</title>
|
<title>Advanced Custom Fields <= 3.5.1 Remote File Inclusion</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/119221/wp_advanced_custom_fields_exec.rb.txt</url>
|
<url>http://packetstormsecurity.com/files/119221/</url>
|
||||||
<secunia>51037</secunia>
|
<secunia>51037</secunia>
|
||||||
<metasploit>exploit/unix/webapp/wp_advanced_custom_fields_exec</metasploit>
|
<metasploit>exploit/unix/webapp/wp_advanced_custom_fields_exec</metasploit>
|
||||||
</references>
|
</references>
|
||||||
@@ -960,7 +959,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Catalog HTML Code Injection and Cross-site scripting</title>
|
<title>Catalog HTML Code Injection and Cross-site scripting</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/117820/wpcatalog-xss.txt</url>
|
<url>http://packetstormsecurity.org/files/117820/</url>
|
||||||
<secunia>51143</secunia>
|
<secunia>51143</secunia>
|
||||||
</references>
|
</references>
|
||||||
<type>MULTI</type>
|
<type>MULTI</type>
|
||||||
@@ -1028,7 +1027,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>BBPress SQL Injection / Path Disclosure</title>
|
<title>BBPress SQL Injection / Path Disclosure</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/116123</url>
|
<url>http://packetstormsecurity.org/files/116123/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>MULTI</type>
|
<type>MULTI</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -1038,7 +1037,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>NextGen Cu3er Gallery Information Disclosure</title>
|
<title>NextGen Cu3er Gallery Information Disclosure</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/116150</url>
|
<url>http://packetstormsecurity.org/files/116150/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UNKNOWN</type>
|
<type>UNKNOWN</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -1048,7 +1047,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Rich Widget File Upload</title>
|
<title>Rich Widget File Upload</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/115787/wprichwidget-shell.txt</url>
|
<url>http://packetstormsecurity.org/files/115787/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -1058,7 +1057,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Monsters Editor Shell Upload</title>
|
<title>Monsters Editor Shell Upload</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/115788/wpmonsters-shell.txt</url>
|
<url>http://packetstormsecurity.org/files/115788/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -1132,7 +1131,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Resume Submissions Job Posting v2.5.1 Unrestricted File Upload</title>
|
<title>Resume Submissions Job Posting v2.5.1 Unrestricted File Upload</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://www.packetstormsecurity.org/files/114716</url>
|
<url>http://packetstormsecurity.org/files/114716/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -1652,7 +1651,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>FoxyPress 0.4.2.5 XSS / CSRF / SQL Injection</title>
|
<title>FoxyPress 0.4.2.5 XSS / CSRF / SQL Injection</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/117768</url>
|
<url>http://packetstormsecurity.org/files/117768/</url>
|
||||||
<secunia>51109</secunia>
|
<secunia>51109</secunia>
|
||||||
</references>
|
</references>
|
||||||
<type>MULTI</type>
|
<type>MULTI</type>
|
||||||
@@ -1801,7 +1800,7 @@
|
|||||||
<title>WordPress pretty-link plugin XSS in SWF</title>
|
<title>WordPress pretty-link plugin XSS in SWF</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://seclists.org/bugtraq/2013/Feb/100</url>
|
<url>http://seclists.org/bugtraq/2013/Feb/100</url>
|
||||||
<url>http://packetstormsecurity.com/files/120433/wpprettylink163-xss.txt</url>
|
<url>http://packetstormsecurity.com/files/120433/</url>
|
||||||
<cve>2013-1636</cve>
|
<cve>2013-1636</cve>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
@@ -2116,8 +2115,8 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Organizer 1.2.1 Cross Site Scripting / Path Disclosure</title>
|
<title>Organizer 1.2.1 Cross Site Scripting / Path Disclosure</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/112086</url>
|
<url>http://packetstormsecurity.org/files/112086/</url>
|
||||||
<url>http://packetstormsecurity.org/files/113800</url>
|
<url>http://packetstormsecurity.org/files/113800/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>MULTI</type>
|
<type>MULTI</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -2127,7 +2126,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Zingiri Tickets plugin File Disclosure</title>
|
<title>Zingiri Tickets plugin File Disclosure</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/111904</url>
|
<url>http://packetstormsecurity.org/files/111904/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UNKNOWN</type>
|
<type>UNKNOWN</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -2167,7 +2166,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Register Plus Redux <= 3.8.3 Cross Site Scripting</title>
|
<title>Register Plus Redux <= 3.8.3 Cross Site Scripting</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/111367</url>
|
<url>http://packetstormsecurity.org/files/111367/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -2177,7 +2176,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Magn WP Drag and Drop <= 1.1.4 Upload Shell Upload Vulnerability</title>
|
<title>Magn WP Drag and Drop <= 1.1.4 Upload Shell Upload Vulnerability</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/110103</url>
|
<url>http://packetstormsecurity.org/files/110103/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -2244,7 +2243,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>myEASYbackup 1.0.8.1 Directory Traversal</title>
|
<title>myEASYbackup 1.0.8.1 Directory Traversal</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/108711</url>
|
<url>http://packetstormsecurity.org/files/108711/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UNKNOWN</type>
|
<type>UNKNOWN</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -2261,14 +2260,14 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Count Per Day 3.2.3 Cross Site Scripting</title>
|
<title>Count Per Day 3.2.3 Cross Site Scripting</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/115904</url>
|
<url>http://packetstormsecurity.org/files/115904/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Count Per Day 3.1.1 Cross Site Scripting</title>
|
<title>Count Per Day 3.1.1 Cross Site Scripting</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/114787/SSCHADV2012-015.txt</url>
|
<url>http://packetstormsecurity.org/files/114787/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -2312,7 +2311,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Yousaytoo Auto Publishing <= 1.0 Cross Site Scripting</title>
|
<title>Yousaytoo Auto Publishing <= 1.0 Cross Site Scripting</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/108470</url>
|
<url>http://packetstormsecurity.org/files/108470/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -2332,7 +2331,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Whois Search <= 1.4.2 Cross Site Scripting</title>
|
<title>Whois Search <= 1.4.2 Cross Site Scripting</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/108271</url>
|
<url>http://packetstormsecurity.org/files/108271/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -2663,7 +2662,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>GRAND Flash Album Gallery <= 1.71 XSS Vulnerability</title>
|
<title>GRAND Flash Album Gallery <= 1.71 XSS Vulnerability</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.org/files/112704</url>
|
<url>http://packetstormsecurity.org/files/112704/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -2744,7 +2743,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>WP Forum Server plugin <= 1.7.3 SQL Injection / XSS Vulnerabilities</title>
|
<title>WP Forum Server plugin <= 1.7.3 SQL Injection / XSS Vulnerabilities</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://www.packetstormsecurity.org/files/112703</url>
|
<url>http://packetstormsecurity.org/files/112703/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>MULTI</type>
|
<type>MULTI</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -2774,7 +2773,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>WordPress Comment Rating 2.9.32 SQL Injection / Bypass</title>
|
<title>WordPress Comment Rating 2.9.32 SQL Injection / Bypass</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/120569/wpcomment2932-sqlbypass.txt</url>
|
<url>http://packetstormsecurity.com/files/120569/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>MULTI</type>
|
<type>MULTI</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -4203,7 +4202,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>GD Star Rating plugin <= 1.9.16 Cross Site Scripting</title>
|
<title>GD Star Rating plugin <= 1.9.16 Cross Site Scripting</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://www.packetstormsecurity.org/files/112702</url>
|
<url>http://packetstormsecurity.org/files/112702/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -4396,7 +4395,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>floating-tweets persistent XSS</title>
|
<title>floating-tweets persistent XSS</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/119499/floatingtweets-xsstraversal.txt</url>
|
<url>http://packetstormsecurity.com/files/119499/</url>
|
||||||
<url>http://websecurity.com.ua/6023/</url>
|
<url>http://websecurity.com.ua/6023/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
@@ -4404,7 +4403,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>floating-tweets directory traversal</title>
|
<title>floating-tweets directory traversal</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/119499/floatingtweets-xsstraversal.txt</url>
|
<url>http://packetstormsecurity.com/files/119499/</url>
|
||||||
<url>http://websecurity.com.ua/6023/</url>
|
<url>http://websecurity.com.ua/6023/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UNKNOWN</type>
|
<type>UNKNOWN</type>
|
||||||
@@ -4457,7 +4456,7 @@
|
|||||||
<title>WP-SlimStat-Ex - Open Flash Chart Arbitrary File Creation Vulnerability</title>
|
<title>WP-SlimStat-Ex - Open Flash Chart Arbitrary File Creation Vulnerability</title>
|
||||||
<references>
|
<references>
|
||||||
<secunia>55160</secunia>
|
<secunia>55160</secunia>
|
||||||
<url>http://packetstormsecurity.com/files/123494/wpslimstatex-exec.txt</url>
|
<url>http://packetstormsecurity.com/files/123494/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -4681,7 +4680,7 @@
|
|||||||
<title>SQL Injection Vulnerability in Wysija Newsletters WordPress Plugin</title>
|
<title>SQL Injection Vulnerability in Wysija Newsletters WordPress Plugin</title>
|
||||||
<references>
|
<references>
|
||||||
<url>https://www.htbridge.com/advisory/HTB23140</url>
|
<url>https://www.htbridge.com/advisory/HTB23140</url>
|
||||||
<url>http://packetstormsecurity.com/files/120089/wpwysijanl-sql.txt</url>
|
<url>http://packetstormsecurity.com/files/120089/</url>
|
||||||
<url>http://seclists.org/bugtraq/2013/Feb/29</url>
|
<url>http://seclists.org/bugtraq/2013/Feb/29</url>
|
||||||
<url>http://cxsecurity.com/issue/WLB-2013020039</url>
|
<url>http://cxsecurity.com/issue/WLB-2013020039</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -5096,7 +5095,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Wordpress wp-table-reloaded plugin cross-site scripting in SWF</title>
|
<title>Wordpress wp-table-reloaded plugin cross-site scripting in SWF</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/119968/wptablereloaded-xss.txt</url>
|
<url>http://packetstormsecurity.com/files/119968/</url>
|
||||||
<secunia>52027</secunia>
|
<secunia>52027</secunia>
|
||||||
<url>http://seclists.org/bugtraq/2013/Feb/28</url>
|
<url>http://seclists.org/bugtraq/2013/Feb/28</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -5149,7 +5148,7 @@
|
|||||||
<title>Cross-Site Scripting (XSS) Vulnerability in CommentLuv WordPress Plugin</title>
|
<title>Cross-Site Scripting (XSS) Vulnerability in CommentLuv WordPress Plugin</title>
|
||||||
<references>
|
<references>
|
||||||
<url>https://www.htbridge.com/advisory/HTB23138</url>
|
<url>https://www.htbridge.com/advisory/HTB23138</url>
|
||||||
<url>http://packetstormsecurity.com/files/120090/wpcommentluv-xss.txt</url>
|
<url>http://packetstormsecurity.com/files/120090/</url>
|
||||||
<url>http://seclists.org/bugtraq/2013/Feb/30</url>
|
<url>http://seclists.org/bugtraq/2013/Feb/30</url>
|
||||||
<url>http://cxsecurity.com/issue/WLB-2013020040</url>
|
<url>http://cxsecurity.com/issue/WLB-2013020040</url>
|
||||||
<secunia>52092</secunia>
|
<secunia>52092</secunia>
|
||||||
@@ -5251,7 +5250,7 @@
|
|||||||
<title>smart-flv jwplayer.swf XSS</title>
|
<title>smart-flv jwplayer.swf XSS</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://www.openwall.com/lists/oss-security/2013/02/24/7</url>
|
<url>http://www.openwall.com/lists/oss-security/2013/02/24/7</url>
|
||||||
<url>http://packetstormsecurity.com/files/115100/jwplayer-xss.txt</url>
|
<url>http://packetstormsecurity.com/files/115100/</url>
|
||||||
<osvdb>90606</osvdb>
|
<osvdb>90606</osvdb>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
@@ -5284,7 +5283,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Marekkis Watermark Cross Site Scripting</title>
|
<title>Marekkis Watermark Cross Site Scripting</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/120378/wpmarekkiswatermark-xss.txt</url>
|
<url>http://packetstormsecurity.com/files/120378/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -5294,7 +5293,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Responsive Logo Slideshow Cross Site Scripting</title>
|
<title>Responsive Logo Slideshow Cross Site Scripting</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/120379/wpresponsivelogo-xss.txt</url>
|
<url>http://packetstormsecurity.com/files/120379/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -5605,7 +5604,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Terillion Reviews Cross Site Scripting</title>
|
<title>Terillion Reviews Cross Site Scripting</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/120730/wpterillionreviews-xss.txt</url>
|
<url>http://packetstormsecurity.com/files/120730/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -5761,8 +5760,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>podPress 8.8.10.13 Cross Site Scripting</title>
|
<title>podPress 8.8.10.13 Cross Site Scripting</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/121011/WordPress-podPress-8.8.10.13-Cross-Site-Scripting.html
|
<url>http://packetstormsecurity.com/files/121011/</url>
|
||||||
</url>
|
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -6191,8 +6189,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>ADIF Log Search Widget XSS Arbitrary Vulnerability</title>
|
<title>ADIF Log Search Widget XSS Arbitrary Vulnerability</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/121777/ADIF-Log-Search-Widget-1.0e-Cross-Site-Scripting.html
|
<url>http://packetstormsecurity.com/files/121777/</url>
|
||||||
</url>
|
|
||||||
<secunia>53599</secunia>
|
<secunia>53599</secunia>
|
||||||
<osvdb>93721</osvdb>
|
<osvdb>93721</osvdb>
|
||||||
</references>
|
</references>
|
||||||
@@ -6639,7 +6636,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Lazy SEO 1.1.9 - lazyseo.php File Upload Arbitrary Code Execution</title>
|
<title>Lazy SEO 1.1.9 - lazyseo.php File Upload Arbitrary Code Execution</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/123349/wplazyseo-shell.txt</url>
|
<url>http://packetstormsecurity.com/files/123349/</url>
|
||||||
<url>http://xforce.iss.net/xforce/xfdb/87384</url>
|
<url>http://xforce.iss.net/xforce/xfdb/87384</url>
|
||||||
<osvdb>97662</osvdb>
|
<osvdb>97662</osvdb>
|
||||||
<cve>2013-5961</cve>
|
<cve>2013-5961</cve>
|
||||||
@@ -6653,7 +6650,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>SEO Watcher - Open Flash Chart Arbitrary File Creation Vulnerability</title>
|
<title>SEO Watcher - Open Flash Chart Arbitrary File Creation Vulnerability</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/123493/wpseowatcher-exec.txt</url>
|
<url>http://packetstormsecurity.com/files/123493/</url>
|
||||||
<secunia>55162</secunia>
|
<secunia>55162</secunia>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
@@ -6676,7 +6673,7 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Simple Dropbox Upload - Arbitrary File Upload Vulnerability</title>
|
<title>Simple Dropbox Upload - Arbitrary File Upload Vulnerability</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/123235/wpsdu-shell.txt</url>
|
<url>http://packetstormsecurity.com/files/123235/</url>
|
||||||
<url>http://xforce.iss.net/xforce/xfdb/87166</url>
|
<url>http://xforce.iss.net/xforce/xfdb/87166</url>
|
||||||
<secunia>54856</secunia>
|
<secunia>54856</secunia>
|
||||||
<cve>2013-5963</cve>
|
<cve>2013-5963</cve>
|
||||||
@@ -6701,7 +6698,7 @@
|
|||||||
<title>miniAudioPlayer - Two XSS Vulnerabilities</title>
|
<title>miniAudioPlayer - Two XSS Vulnerabilities</title>
|
||||||
<references>
|
<references>
|
||||||
<secunia>54979</secunia>
|
<secunia>54979</secunia>
|
||||||
<url>http://packetstormsecurity.com/files/123372/wpminiaudioplayer-xss.txt</url>
|
<url>http://packetstormsecurity.com/files/123372/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -6725,7 +6722,7 @@
|
|||||||
<secunia>54894</secunia>
|
<secunia>54894</secunia>
|
||||||
<cve>2013-5962</cve>
|
<cve>2013-5962</cve>
|
||||||
<exploitdb>28377</exploitdb>
|
<exploitdb>28377</exploitdb>
|
||||||
<url>http://packetstormsecurity.com/files/123303</url>
|
<url>http://packetstormsecurity.com/files/123303/</url>
|
||||||
<url>http://xforce.iss.net/xforce/xfdb/87172</url>
|
<url>http://xforce.iss.net/xforce/xfdb/87172</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
|
|||||||
Reference in New Issue
Block a user