Added fixed_in tag.

This commit is contained in:
ethicalhack3r
2014-01-09 17:33:18 +01:00
parent 43b0f1bea9
commit 8cc83a8df9

View File

@@ -2109,6 +2109,7 @@
<osvdb>38577</osvdb>
</references>
<type>XSS</type>
<fixed_in>2.0.2</fixed_in>
</vulnerability>
<vulnerability>
<title>WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability</title>
@@ -2140,6 +2141,7 @@
<osvdb>38577</osvdb>
</references>
<type>XSS</type>
<fixed_in>2.0.2</fixed_in>
</vulnerability>
<vulnerability>
<title>WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability</title>
@@ -2171,6 +2173,7 @@
<osvdb>38577</osvdb>
</references>
<type>XSS</type>
<fixed_in>2.0.2</fixed_in>
</vulnerability>
<vulnerability>
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
@@ -2195,6 +2198,7 @@
<osvdb>38577</osvdb>
</references>
<type>XSS</type>
<fixed_in>2.0.2</fixed_in>
</vulnerability>
<vulnerability>
<title>Wordpress &lt;= 1.5.1.3 Remote Code Execution eXploit (metasploit)</title>
@@ -2226,6 +2230,7 @@
<osvdb>38577</osvdb>
</references>
<type>XSS</type>
<fixed_in>2.0.2</fixed_in>
</vulnerability>
<vulnerability>
<title>Wordpress &lt;= 1.5.1.2 xmlrpc Interface SQL Injection Exploit</title>
@@ -2267,6 +2272,7 @@
<osvdb>38577</osvdb>
</references>
<type>XSS</type>
<fixed_in>2.0.2</fixed_in>
</vulnerability>
<vulnerability>
<title>WordPress &lt;= 1.5.1.1 &quot;add new admin&quot; SQL Injection Exploit</title>
@@ -2305,6 +2311,7 @@
<osvdb>38577</osvdb>
</references>
<type>XSS</type>
<fixed_in>2.0.2</fixed_in>
</vulnerability>
<vulnerability>
<title>XMLRPC Pingback API Internal/External Port Scanning</title>