Update theme_vulns.xml

This commit is contained in:
Peter
2013-12-05 13:47:29 +01:00
parent c07f7390ec
commit 8555e0c7e7

View File

@@ -2273,7 +2273,9 @@
<vulnerability>
<title>Rockstar - Remote File Upload Vulnerability</title>
<references>
<exploitdb>29946</exploitdb>
<url>http://packetstormsecurity.com/files/123999/</url>
<url>http://packetstormsecurity.com/files/124232/</url>
<url>http://1337day.com/exploit/21510</url>
</references>
<type>UPLOAD</type>
@@ -2284,7 +2286,9 @@
<vulnerability>
<title>Reganto - Remote File Upload Vulnerability</title>
<references>
<exploitdb>29946</exploitdb>
<url>http://packetstormsecurity.com/files/123999/</url>
<url>http://packetstormsecurity.com/files/124232/</url>
<url>http://1337day.com/exploit/21511</url>
</references>
<type>UPLOAD</type>
@@ -2295,7 +2299,9 @@
<vulnerability>
<title>Ray of Light - Remote File Upload Vulnerability</title>
<references>
<exploitdb>29946</exploitdb>
<url>http://packetstormsecurity.com/files/123999/</url>
<url>http://packetstormsecurity.com/files/124232/</url>
<url>http://1337day.com/exploit/21512</url>
</references>
<type>UPLOAD</type>
@@ -2306,7 +2312,9 @@
<vulnerability>
<title>Radial - Remote File Upload Vulnerability</title>
<references>
<exploitdb>29946</exploitdb>
<url>http://packetstormsecurity.com/files/123999/</url>
<url>http://packetstormsecurity.com/files/124232/</url>
<url>http://1337day.com/exploit/21513</url>
</references>
<type>UPLOAD</type>
@@ -2317,7 +2325,9 @@
<vulnerability>
<title>Oxygen - Remote File Upload Vulnerability</title>
<references>
<exploitdb>29946</exploitdb>
<url>http://packetstormsecurity.com/files/123999/</url>
<url>http://packetstormsecurity.com/files/124232/</url>
<url>http://1337day.com/exploit/21514</url>
</references>
<type>UPLOAD</type>
@@ -2328,7 +2338,9 @@
<vulnerability>
<title>Bulteno - Remote File Upload Vulnerability</title>
<references>
<exploitdb>29946</exploitdb>
<url>http://packetstormsecurity.com/files/123999/</url>
<url>http://packetstormsecurity.com/files/124232/</url>
<url>http://1337day.com/exploit/21515</url>
</references>
<type>UPLOAD</type>
@@ -2339,13 +2351,26 @@
<vulnerability>
<title>Bordeaux - Remote File Upload Vulnerability</title>
<references>
<exploitdb>29946</exploitdb>
<url>http://packetstormsecurity.com/files/123999/</url>
<url>http://packetstormsecurity.com/files/124232/</url>
<url>http://1337day.com/exploit/21516</url>
</references>
<type>UPLOAD</type>
</vulnerability>
</theme>
<theme name="agritourismo-theme">
<vulnerability>
<title>Agritourismo - Remote File Upload Vulnerability</title>
<references>
<exploitdb>29946</exploitdb>
<url>http://packetstormsecurity.com/files/124232/</url>
</references>
<type>UPLOAD</type>
</vulnerability>
</theme>
<theme name="highlight">
<vulnerability>
<title>Highlight Powerful Premium - upload-handler.php File Upload CSRF</title>
@@ -2448,6 +2473,13 @@
</references>
<type>UPLOAD</type>
</vulnerability>
<vulnerability>
<title>Folo - Cross Site Scripting</title>
<references>
<url>http://packetstormsecurity.com/files/124230/</url>
</references>
<type>XSS</type>
</vulnerability>
</theme>
<theme name="Bloggie">
@@ -2474,8 +2506,10 @@
<theme name="OptimizePress">
<vulnerability>
<title>File Upload Vulnerability</title>
<title>OptimizePress - File Upload Vulnerability</title>
<references>
<osvdb>100509</osvdb>
<url>http://packetstormsecurity.com/files/124246/</url>
<url>http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/</url>
<metasploit>exploit/unix/webapp/php_wordpress_optimizepress</metasploit>
</references>
@@ -2483,4 +2517,14 @@
</vulnerability>
</theme>
<theme name="Blooog-v1.1">
<vulnerability>
<title>Blooog 1.1 - jplayer.swf Cross Site Scripting</title>
<references>
<url>http://packetstormsecurity.com/files/124240/</url>
</references>
<type>XSS</type>
</vulnerability>
</theme>
</vulnerabilities>