Update vuln db

This commit is contained in:
Peter
2014-01-30 11:01:40 +01:00
parent cff35ea845
commit 80667bc38f
2 changed files with 45 additions and 1 deletions

View File

@@ -10167,6 +10167,7 @@
<title>WP-Members 2.8.9 - profile.php Multiple Parameter Stored XSS</title>
<references>
<osvdb>101946</osvdb>
<secunia>56271</secunia>
<url>http://packetstormsecurity.com/files/124720/</url>
<url>http://www.securityfocus.com/bid/64713</url>
</references>
@@ -10177,6 +10178,7 @@
<title>WP-Members 2.8.9 - wp-login.php register Action Multiple Parameter Reflected XSS</title>
<references>
<osvdb>101947</osvdb>
<secunia>56271</secunia>
<url>http://packetstormsecurity.com/files/124720/</url>
<url>http://www.securityfocus.com/bid/64713</url>
</references>
@@ -10348,6 +10350,7 @@
<references>
<osvdb>102538</osvdb>
<secunia>56532</secunia>
<url>http://packetstormsecurity.com/files/124958/</url>
</references>
<type>XSS</type>
<fixed_in>1.5</fixed_in>
@@ -10456,6 +10459,7 @@
<title>WebEngage 2.0.0 - callback.php Multiple Parameter Reflected XSS</title>
<references>
<osvdb>102560</osvdb>
<secunia>56700</secunia>
</references>
<type>XSS</type>
<fixed_in>2.0.1</fixed_in>
@@ -10464,6 +10468,7 @@
<title>WebEngage 2.0.0 - renderer.php Multiple Parameter Reflected XSS</title>
<references>
<osvdb>102561</osvdb>
<secunia>56700</secunia>
</references>
<type>XSS</type>
<fixed_in>2.0.1</fixed_in>
@@ -10472,6 +10477,7 @@
<title>WebEngage 2.0.0 - resize.php height Parameter XSS</title>
<references>
<osvdb>102562</osvdb>
<secunia>56700</secunia>
</references>
<type>XSS</type>
<fixed_in>2.0.1</fixed_in>
@@ -10488,4 +10494,26 @@
</vulnerability>
</plugin>
<plugin name="seolinkrotator">
<vulnerability>
<title>Seo Link Rotator - pusher.php title Parameter Reflected XSS</title>
<references>
<osvdb>102594</osvdb>
<url>http://packetstormsecurity.com/files/124959/</url>
</references>
<type>XSS</type>
</vulnerability>
</plugin>
<plugin name="nokia-mapsplaces">
<vulnerability>
<title>Nokia Maps and Places 1.6.6 - place.html href Parameter Reflected XSS</title>
<references>
<osvdb>102669</osvdb>
</references>
<type>XSS</type>
<fixed_in>1.6.7</fixed_in>
</vulnerability>
</plugin>
</vulnerabilities>

View File

@@ -1761,6 +1761,14 @@
</theme>
<theme name="dt-chocolate">
<vulnerability>
<title>dt-chocolate - jPlayer XSS</title>
<references>
<secunia>56379</secunia>
<url>http://packetstormsecurity.com/files/124756/</url>
</references>
<type>XSS</type>
</vulnerability>
<vulnerability>
<title>dt-chocolate - Image Open redirect</title>
<references>
@@ -2034,6 +2042,13 @@
</theme>
<theme name="photocrati-theme">
<vulnerability>
<title>Photocrati - XSS</title>
<references>
<url>http://packetstormsecurity.com/files/124986/</url>
</references>
<type>XSS</type>
</vulnerability>
<vulnerability>
<title>Photocrati - Multiple Script Direct Request Path Disclosure</title>
<references>
@@ -2541,8 +2556,9 @@
<vulnerability>
<title>OptimizePress - File Upload Vulnerability</title>
<references>
<cve>2013-7102</cve>
<osvdb>100509</osvdb>
<cve>2013-7102</cve>
<secunia>56379</secunia>
<url>http://packetstormsecurity.com/files/124246/</url>
<url>http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/</url>
<metasploit>exploit/unix/webapp/php_wordpress_optimizepress</metasploit>