Update theme_vulns.xml
This commit is contained in:
@@ -2273,7 +2273,9 @@
|
||||
<vulnerability>
|
||||
<title>Rockstar - Remote File Upload Vulnerability</title>
|
||||
<references>
|
||||
<exploitdb>29946</exploitdb>
|
||||
<url>http://packetstormsecurity.com/files/123999/</url>
|
||||
<url>http://packetstormsecurity.com/files/124232/</url>
|
||||
<url>http://1337day.com/exploit/21510</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
@@ -2284,7 +2286,9 @@
|
||||
<vulnerability>
|
||||
<title>Reganto - Remote File Upload Vulnerability</title>
|
||||
<references>
|
||||
<exploitdb>29946</exploitdb>
|
||||
<url>http://packetstormsecurity.com/files/123999/</url>
|
||||
<url>http://packetstormsecurity.com/files/124232/</url>
|
||||
<url>http://1337day.com/exploit/21511</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
@@ -2295,7 +2299,9 @@
|
||||
<vulnerability>
|
||||
<title>Ray of Light - Remote File Upload Vulnerability</title>
|
||||
<references>
|
||||
<exploitdb>29946</exploitdb>
|
||||
<url>http://packetstormsecurity.com/files/123999/</url>
|
||||
<url>http://packetstormsecurity.com/files/124232/</url>
|
||||
<url>http://1337day.com/exploit/21512</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
@@ -2306,7 +2312,9 @@
|
||||
<vulnerability>
|
||||
<title>Radial - Remote File Upload Vulnerability</title>
|
||||
<references>
|
||||
<exploitdb>29946</exploitdb>
|
||||
<url>http://packetstormsecurity.com/files/123999/</url>
|
||||
<url>http://packetstormsecurity.com/files/124232/</url>
|
||||
<url>http://1337day.com/exploit/21513</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
@@ -2317,7 +2325,9 @@
|
||||
<vulnerability>
|
||||
<title>Oxygen - Remote File Upload Vulnerability</title>
|
||||
<references>
|
||||
<exploitdb>29946</exploitdb>
|
||||
<url>http://packetstormsecurity.com/files/123999/</url>
|
||||
<url>http://packetstormsecurity.com/files/124232/</url>
|
||||
<url>http://1337day.com/exploit/21514</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
@@ -2328,7 +2338,9 @@
|
||||
<vulnerability>
|
||||
<title>Bulteno - Remote File Upload Vulnerability</title>
|
||||
<references>
|
||||
<exploitdb>29946</exploitdb>
|
||||
<url>http://packetstormsecurity.com/files/123999/</url>
|
||||
<url>http://packetstormsecurity.com/files/124232/</url>
|
||||
<url>http://1337day.com/exploit/21515</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
@@ -2339,13 +2351,26 @@
|
||||
<vulnerability>
|
||||
<title>Bordeaux - Remote File Upload Vulnerability</title>
|
||||
<references>
|
||||
<exploitdb>29946</exploitdb>
|
||||
<url>http://packetstormsecurity.com/files/123999/</url>
|
||||
<url>http://packetstormsecurity.com/files/124232/</url>
|
||||
<url>http://1337day.com/exploit/21516</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="agritourismo-theme">
|
||||
<vulnerability>
|
||||
<title>Agritourismo - Remote File Upload Vulnerability</title>
|
||||
<references>
|
||||
<exploitdb>29946</exploitdb>
|
||||
<url>http://packetstormsecurity.com/files/124232/</url>
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="highlight">
|
||||
<vulnerability>
|
||||
<title>Highlight Powerful Premium - upload-handler.php File Upload CSRF</title>
|
||||
@@ -2448,6 +2473,13 @@
|
||||
</references>
|
||||
<type>UPLOAD</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>Folo - Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/124230/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="Bloggie">
|
||||
@@ -2474,8 +2506,10 @@
|
||||
|
||||
<theme name="OptimizePress">
|
||||
<vulnerability>
|
||||
<title>File Upload Vulnerability</title>
|
||||
<title>OptimizePress - File Upload Vulnerability</title>
|
||||
<references>
|
||||
<osvdb>100509</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124246/</url>
|
||||
<url>http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/</url>
|
||||
<metasploit>exploit/unix/webapp/php_wordpress_optimizepress</metasploit>
|
||||
</references>
|
||||
@@ -2483,4 +2517,14 @@
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
<theme name="Blooog-v1.1">
|
||||
<vulnerability>
|
||||
<title>Blooog 1.1 - jplayer.swf Cross Site Scripting</title>
|
||||
<references>
|
||||
<url>http://packetstormsecurity.com/files/124240/</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</theme>
|
||||
|
||||
</vulnerabilities>
|
||||
|
||||
Reference in New Issue
Block a user