Some vulns added
This commit is contained in:
@@ -2794,6 +2794,15 @@
|
||||
</references>
|
||||
<type>SQLI</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>Privilege Escalation CSRF</title>
|
||||
<references>
|
||||
<osvdb>96905</osvdb>
|
||||
<cve>2013-0736</cve>
|
||||
<secunia>47687</secunia>
|
||||
</references>
|
||||
<type>CSRF</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="accept-signups">
|
||||
@@ -6494,4 +6503,43 @@
|
||||
<fixed_in>1.3.8</fixed_in>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="design-approval-system">
|
||||
<vulnerability>
|
||||
<title>/admin/walkthrough/walkthrough.php step Parameter Reflected XSS</title>
|
||||
<references>
|
||||
<url>http://seclists.org/bugtraq/2013/Sep/54</url>
|
||||
<cve>2013-5711</cve>
|
||||
<osvdb>97279</osvdn>
|
||||
</references>
|
||||
<fixed_in>3.7</fixed_in>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="event-easy-calendar">
|
||||
<vulnerability>
|
||||
<title>Multiple Administrator Action CSRF</title>
|
||||
<references>
|
||||
<osvdb>97042</osvdb>
|
||||
</references>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>Multiple Unspecified XSS</title>
|
||||
<references>
|
||||
<osvdb>97041</osvdb>
|
||||
</references>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
<plugin name="">
|
||||
<vulnerability>
|
||||
<title></title>
|
||||
<references>
|
||||
<url></url>
|
||||
<cve></cve>
|
||||
<osvdb></osvdb>
|
||||
</references>
|
||||
<fixed_in></fixed_in>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
</vulnerabilities>
|
||||
|
||||
@@ -10,10 +10,51 @@
|
||||
<url>http://vagosec.org/2013/09/wordpress-php-object-injection/</url>
|
||||
<url>http://www.openwall.com/lists/oss-security/2013/09/12/1</url>
|
||||
<url>http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4340</url>
|
||||
<cve>2013-4340</cve>
|
||||
<url>http://core.trac.wordpress.org/changeset/25325</url>
|
||||
<secunia>54803</secunia>
|
||||
<cve>2013-4338</cve>
|
||||
<osvdb>97211</osvdb>
|
||||
</references>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>wp-includes/functions.php get_allowed_mime_types Function SWF / EXE File Upload XSS Weakness</title>
|
||||
<references>
|
||||
<osvdb>97210</osvdb>
|
||||
<cve>2013-5739</cve>
|
||||
<url>http://core.trac.wordpress.org/changeset/25322</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>Crafted String URL Redirect Restriction Bypass</title>
|
||||
<references>
|
||||
<osvdb>97212</osvdb>
|
||||
<cve>2013-4339</cve>
|
||||
<secunia>54803</secunia>
|
||||
<url>http://core.trac.wordpress.org/changeset/25323</url>
|
||||
</references>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>wp-admin/includes/post.php user_ID Parameter Manipulation Post Authorship Spoofing</title>
|
||||
<references>
|
||||
<osvdb>97213</osvdb>
|
||||
<cve>2013-4340</cve>
|
||||
<secunia>54803</secunia>
|
||||
<url>http://core.trac.wordpress.org/changeset/25321</url>
|
||||
</references>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>wp-includes/functions.php get_allowed_mime_types Function HTML File Upload XSS Weakness</title>
|
||||
<references>
|
||||
<osvdb>97214</osvdb>
|
||||
<cve>2013-5738</cve>
|
||||
<url>http://core.trac.wordpress.org/changeset/25322</url>
|
||||
</references>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="3.5.2">
|
||||
|
||||
Reference in New Issue
Block a user