Merge pull request #347 from pvdl/vulns

Update WordPress Vulnerabilities
This commit is contained in:
erwanlr
2013-10-31 04:26:16 -07:00
3 changed files with 22 additions and 10 deletions

View File

@@ -1353,9 +1353,7 @@
<plugin name="auctionplugin"> <plugin name="auctionplugin">
<vulnerability> <vulnerability>
<title>Auctions 2.0.1.3 - Arbitrary <title>Auctions 2.0.1.3 - Arbitrary File Upload Vulnerability</title>
File Upload Vulnerability
</title>
<references> <references>
<url>http://packetstormsecurity.com/files/113568/</url> <url>http://packetstormsecurity.com/files/113568/</url>
</references> </references>
@@ -5193,8 +5191,7 @@
<plugin name="xve-various-embed"> <plugin name="xve-various-embed">
<vulnerability> <vulnerability>
<title>XVE Various Embed - JW Player Multiple Cross-Site Scripting Vulnerabilities <title>XVE Various Embed - JW Player Multiple Cross-Site Scripting Vulnerabilities</title>
</title>
<references> <references>
<secunia>50173</secunia> <secunia>50173</secunia>
</references> </references>
@@ -6695,8 +6692,7 @@
<plugin name="buddypress-extended-friendship-request"> <plugin name="buddypress-extended-friendship-request">
<vulnerability> <vulnerability>
<title>BuddyPress Extended Friendship Request - wp-admin/admin-ajax.php friendship_request_message Parameter XSS <title>BuddyPress Extended Friendship Request - wp-admin/admin-ajax.php friendship_request_message Parameter XSS</title>
</title>
<references> <references>
<osvdb>94807</osvdb> <osvdb>94807</osvdb>
</references> </references>
@@ -7390,7 +7386,7 @@
<plugin name="landing-pages"> <plugin name="landing-pages">
<vulnerability> <vulnerability>
<title>Landing Pages - Unspecified SQL Injection </title> <title>Landing Pages - Unspecified SQL Injection</title>
<references> <references>
<osvdb>98334</osvdb> <osvdb>98334</osvdb>
<secunia>55192</secunia> <secunia>55192</secunia>
@@ -7784,4 +7780,16 @@
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="rockhoist-ratings">
<vulnerability>
<title>Rockhoist Ratings 1.2.2 - wp-admin/admin-ajax.php postID Parameter SQL Injection</title>
<references>
<osvdb>99195</osvdb>
<secunia>55445</secunia>
<url>http://www.securityfocus.com/bid/63441</url>
</references>
<type>SQLI</type>
</vulnerability>
</plugin>
</vulnerabilities> </vulnerabilities>

View File

@@ -26,6 +26,7 @@
<url>http://core.trac.wordpress.org/changeset/25322</url> <url>http://core.trac.wordpress.org/changeset/25322</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
<fixed_in>3.6.1</fixed_in>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>Crafted String URL Redirect Restriction Bypass</title> <title>Crafted String URL Redirect Restriction Bypass</title>
@@ -57,6 +58,7 @@
<url>http://core.trac.wordpress.org/changeset/25322</url> <url>http://core.trac.wordpress.org/changeset/25322</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
<fixed_in>3.6.1</fixed_in>
</vulnerability> </vulnerability>
</wordpress> </wordpress>

View File

@@ -14,7 +14,9 @@ class Vulnerability
puts ' | ' + red("* Reference: #{url}") if url puts ' | ' + red("* Reference: #{url}") if url
end end
end end
end if !fixed_in.empty?
puts " | * Fixed in: #{fixed_in}"
end
end
end end
end end