Update plugin_vulns.xml
This commit is contained in:
@@ -512,18 +512,26 @@
|
|||||||
|
|
||||||
<plugin name="asset-manager">
|
<plugin name="asset-manager">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Asset Manager 0.2 Arbitrary File Upload</title>
|
<title>Asset Manager 0.2 - Arbitrary File Upload</title>
|
||||||
<references>
|
<references>
|
||||||
|
<osvdb>82653</osvdb>
|
||||||
<exploitdb>18993</exploitdb>
|
<exploitdb>18993</exploitdb>
|
||||||
|
<exploitdb>23652</exploitdb>
|
||||||
|
<secunia>49378</secunia>
|
||||||
|
<url>http://www.securityfocus.com/bid/53809</url>
|
||||||
|
<url>http://packetstormsecurity.com/files/119133/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>plugin Asset manager upload.php Arbitrary Code Execution</title>
|
<title>Asset Manager - upload.php Arbitrary Code Execution</title>
|
||||||
<references>
|
<references>
|
||||||
|
<osvdb>82653</osvdb>
|
||||||
<url>
|
<url>
|
||||||
http://www.ethicalhack3r.co.uk/security/wordpress-plugin-asset-manager-upload-php-arbitrary-code-execution/
|
http://www.ethicalhack3r.co.uk/security/wordpress-plugin-asset-manager-upload-php-arbitrary-code-execution/
|
||||||
</url>
|
</url>
|
||||||
|
<url>http://packetstormsecurity.com/files/113285/</url>
|
||||||
|
<url>http://xforce.iss.net/xforce/xfdb/80823</url>
|
||||||
</references>
|
</references>
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
@@ -1606,7 +1614,7 @@
|
|||||||
|
|
||||||
<plugin name="gallery-plugin">
|
<plugin name="gallery-plugin">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Gallery 3.06 Arbitrary File Upload</title>
|
<title>Gallery 3.06 - Arbitrary File Upload</title>
|
||||||
<references>
|
<references>
|
||||||
<exploitdb>18998</exploitdb>
|
<exploitdb>18998</exploitdb>
|
||||||
</references>
|
</references>
|
||||||
@@ -1682,17 +1690,17 @@
|
|||||||
|
|
||||||
<plugin name="foxypress">
|
<plugin name="foxypress">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Foxypress 0.4.1.1 - 0.4.2.1 Arbitrary File Upload</title>
|
<title>Foxypress 0.4.1.1-0.4.2.1 - Arbitrary File Upload</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/113576/</url>
|
<url>http://packetstormsecurity.com/files/113576/</url>
|
||||||
|
<url>http://www.securityfocus.com/bid/53805</url>
|
||||||
<exploitdb>18991</exploitdb>
|
<exploitdb>18991</exploitdb>
|
||||||
<exploitdb>19100</exploitdb>
|
<exploitdb>19100</exploitdb>
|
||||||
</references>
|
</references>
|
||||||
|
|
||||||
<type>UPLOAD</type>
|
<type>UPLOAD</type>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>FoxyPress 0.4.2.5 XSS / CSRF / SQL Injection</title>
|
<title>FoxyPress 0.4.2.5 - XSS / CSRF / SQL Injection</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/117768/</url>
|
<url>http://packetstormsecurity.com/files/117768/</url>
|
||||||
<secunia>51109</secunia>
|
<secunia>51109</secunia>
|
||||||
@@ -1703,7 +1711,7 @@
|
|||||||
|
|
||||||
<plugin name="track-that-stat">
|
<plugin name="track-that-stat">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Track That Stat <= 1.0.8 Cross Site Scripting</title>
|
<title>Track That Stat <= 1.0.8 - Cross Site Scripting</title>
|
||||||
<references>
|
<references>
|
||||||
<url>http://packetstormsecurity.com/files/112722/</url>
|
<url>http://packetstormsecurity.com/files/112722/</url>
|
||||||
<url>http://www.securityfocus.com/bid/53551</url>
|
<url>http://www.securityfocus.com/bid/53551</url>
|
||||||
|
|||||||
Reference in New Issue
Block a user