Update theme_vulns.xml
This commit is contained in:
@@ -1789,9 +1789,13 @@
|
|||||||
|
|
||||||
<theme name="clockstone">
|
<theme name="clockstone">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Clockstone - upload.php Arbitrary File Upload Vulnerability</title>
|
<title>Clockstone 1.2 - upload.php Arbitrary File Upload Vulnerability</title>
|
||||||
<references>
|
<references>
|
||||||
|
<osvdb>88622</osvdb>
|
||||||
<secunia>51619</secunia>
|
<secunia>51619</secunia>
|
||||||
|
<url>http://www.exploit-db.com/exploits/23494</url>
|
||||||
|
<url>http://www.securityfocus.com/bid/56988</url>
|
||||||
|
<url>http://xforce.iss.net/xforce/xfdb/80725</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -2527,4 +2531,72 @@
|
|||||||
</vulnerability>
|
</vulnerability>
|
||||||
</theme>
|
</theme>
|
||||||
|
|
||||||
|
<theme name="twentyten">
|
||||||
|
<vulnerability>
|
||||||
|
<title>TwentyTen 1.1-1.5 - loop.php Multiple File Extension Upload Arbitrary Code Execution</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>88822</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>RCE</type>
|
||||||
|
</vulnerability>
|
||||||
|
</theme>
|
||||||
|
|
||||||
|
<theme name="nest">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Nest - gerador_galeria.php codigo Parameter SQL Injection</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>88298</osvdb>
|
||||||
|
<url>http://www.securityfocus.com/bid/56792</url>
|
||||||
|
<url>http://xforce.iss.net/xforce/xfdb/80503</url>
|
||||||
|
</references>
|
||||||
|
<type>SQLI</type>
|
||||||
|
</vulnerability>
|
||||||
|
</theme>
|
||||||
|
|
||||||
|
<theme name="toolbox">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Toolbox 1.4 - flyer.php mls Parameter SQL Injection</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>88293</osvdb>
|
||||||
|
<url>http://www.securityfocus.com/bid/56745</url>
|
||||||
|
</references>
|
||||||
|
<type>SQLI</type>
|
||||||
|
</vulnerability>
|
||||||
|
</theme>
|
||||||
|
|
||||||
|
<theme name="oberliga_theme">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Oberliga - team.php team Parameter SQL Injection</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>88454</osvdb>
|
||||||
|
<url>http://packetstormsecurity.org/files/118368/</url>
|
||||||
|
<url>http://xforce.iss.net/xforce/xfdb/80273</url>
|
||||||
|
</references>
|
||||||
|
<type>SQLI</type>
|
||||||
|
</vulnerability>
|
||||||
|
</theme>
|
||||||
|
|
||||||
|
<theme name="cstardesign">
|
||||||
|
<vulnerability>
|
||||||
|
<title>CStar Design 2.0 - flashmoXML.php id Parameter SQL Injection</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>88291</osvdb>
|
||||||
|
<url>http://www.securityfocus.com/bid/56694</url>
|
||||||
|
</references>
|
||||||
|
<type>SQLI</type>
|
||||||
|
</vulnerability>
|
||||||
|
</theme>
|
||||||
|
|
||||||
|
<theme name="malmonation">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Malmonation - debate.php id Parameter SQL Injection</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>87866</osvdb>
|
||||||
|
<url>http://packetstormsecurity.org/files/118340/</url>
|
||||||
|
<url>http://xforce.iss.net/xforce/xfdb/80252</url>
|
||||||
|
</references>
|
||||||
|
<type>SQLI</type>
|
||||||
|
</vulnerability>
|
||||||
|
</theme>
|
||||||
|
|
||||||
</vulnerabilities>
|
</vulnerabilities>
|
||||||
|
|||||||
Reference in New Issue
Block a user