Update vuln db
This commit is contained in:
@@ -10167,6 +10167,7 @@
|
|||||||
<title>WP-Members 2.8.9 - profile.php Multiple Parameter Stored XSS</title>
|
<title>WP-Members 2.8.9 - profile.php Multiple Parameter Stored XSS</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101946</osvdb>
|
<osvdb>101946</osvdb>
|
||||||
|
<secunia>56271</secunia>
|
||||||
<url>http://packetstormsecurity.com/files/124720/</url>
|
<url>http://packetstormsecurity.com/files/124720/</url>
|
||||||
<url>http://www.securityfocus.com/bid/64713</url>
|
<url>http://www.securityfocus.com/bid/64713</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -10177,6 +10178,7 @@
|
|||||||
<title>WP-Members 2.8.9 - wp-login.php register Action Multiple Parameter Reflected XSS</title>
|
<title>WP-Members 2.8.9 - wp-login.php register Action Multiple Parameter Reflected XSS</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>101947</osvdb>
|
<osvdb>101947</osvdb>
|
||||||
|
<secunia>56271</secunia>
|
||||||
<url>http://packetstormsecurity.com/files/124720/</url>
|
<url>http://packetstormsecurity.com/files/124720/</url>
|
||||||
<url>http://www.securityfocus.com/bid/64713</url>
|
<url>http://www.securityfocus.com/bid/64713</url>
|
||||||
</references>
|
</references>
|
||||||
@@ -10348,6 +10350,7 @@
|
|||||||
<references>
|
<references>
|
||||||
<osvdb>102538</osvdb>
|
<osvdb>102538</osvdb>
|
||||||
<secunia>56532</secunia>
|
<secunia>56532</secunia>
|
||||||
|
<url>http://packetstormsecurity.com/files/124958/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
<fixed_in>1.5</fixed_in>
|
<fixed_in>1.5</fixed_in>
|
||||||
@@ -10456,6 +10459,7 @@
|
|||||||
<title>WebEngage 2.0.0 - callback.php Multiple Parameter Reflected XSS</title>
|
<title>WebEngage 2.0.0 - callback.php Multiple Parameter Reflected XSS</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>102560</osvdb>
|
<osvdb>102560</osvdb>
|
||||||
|
<secunia>56700</secunia>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
<fixed_in>2.0.1</fixed_in>
|
<fixed_in>2.0.1</fixed_in>
|
||||||
@@ -10464,6 +10468,7 @@
|
|||||||
<title>WebEngage 2.0.0 - renderer.php Multiple Parameter Reflected XSS</title>
|
<title>WebEngage 2.0.0 - renderer.php Multiple Parameter Reflected XSS</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>102561</osvdb>
|
<osvdb>102561</osvdb>
|
||||||
|
<secunia>56700</secunia>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
<fixed_in>2.0.1</fixed_in>
|
<fixed_in>2.0.1</fixed_in>
|
||||||
@@ -10472,6 +10477,7 @@
|
|||||||
<title>WebEngage 2.0.0 - resize.php height Parameter XSS</title>
|
<title>WebEngage 2.0.0 - resize.php height Parameter XSS</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>102562</osvdb>
|
<osvdb>102562</osvdb>
|
||||||
|
<secunia>56700</secunia>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
<fixed_in>2.0.1</fixed_in>
|
<fixed_in>2.0.1</fixed_in>
|
||||||
@@ -10488,4 +10494,26 @@
|
|||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
|
<plugin name="seolinkrotator">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Seo Link Rotator - pusher.php title Parameter Reflected XSS</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>102594</osvdb>
|
||||||
|
<url>http://packetstormsecurity.com/files/124959/</url>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
</vulnerability>
|
||||||
|
</plugin>
|
||||||
|
|
||||||
|
<plugin name="nokia-mapsplaces">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Nokia Maps and Places 1.6.6 - place.html href Parameter Reflected XSS</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>102669</osvdb>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
<fixed_in>1.6.7</fixed_in>
|
||||||
|
</vulnerability>
|
||||||
|
</plugin>
|
||||||
|
|
||||||
</vulnerabilities>
|
</vulnerabilities>
|
||||||
|
|||||||
@@ -1761,6 +1761,14 @@
|
|||||||
</theme>
|
</theme>
|
||||||
|
|
||||||
<theme name="dt-chocolate">
|
<theme name="dt-chocolate">
|
||||||
|
<vulnerability>
|
||||||
|
<title>dt-chocolate - jPlayer XSS</title>
|
||||||
|
<references>
|
||||||
|
<secunia>56379</secunia>
|
||||||
|
<url>http://packetstormsecurity.com/files/124756/</url>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
</vulnerability>
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>dt-chocolate - Image Open redirect</title>
|
<title>dt-chocolate - Image Open redirect</title>
|
||||||
<references>
|
<references>
|
||||||
@@ -2034,6 +2042,13 @@
|
|||||||
</theme>
|
</theme>
|
||||||
|
|
||||||
<theme name="photocrati-theme">
|
<theme name="photocrati-theme">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Photocrati - XSS</title>
|
||||||
|
<references>
|
||||||
|
<url>http://packetstormsecurity.com/files/124986/</url>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
</vulnerability>
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Photocrati - Multiple Script Direct Request Path Disclosure</title>
|
<title>Photocrati - Multiple Script Direct Request Path Disclosure</title>
|
||||||
<references>
|
<references>
|
||||||
@@ -2541,8 +2556,9 @@
|
|||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>OptimizePress - File Upload Vulnerability</title>
|
<title>OptimizePress - File Upload Vulnerability</title>
|
||||||
<references>
|
<references>
|
||||||
<cve>2013-7102</cve>
|
|
||||||
<osvdb>100509</osvdb>
|
<osvdb>100509</osvdb>
|
||||||
|
<cve>2013-7102</cve>
|
||||||
|
<secunia>56379</secunia>
|
||||||
<url>http://packetstormsecurity.com/files/124246/</url>
|
<url>http://packetstormsecurity.com/files/124246/</url>
|
||||||
<url>http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/</url>
|
<url>http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/</url>
|
||||||
<metasploit>exploit/unix/webapp/php_wordpress_optimizepress</metasploit>
|
<metasploit>exploit/unix/webapp/php_wordpress_optimizepress</metasploit>
|
||||||
|
|||||||
Reference in New Issue
Block a user