From 95557ce095c46f5ef4a1af215688ad97922328ac Mon Sep 17 00:00:00 2001 From: erwanlr Date: Tue, 17 Sep 2013 14:34:33 +0100 Subject: [PATCH] Some vulns added --- data/plugin_vulns.xml | 48 +++++++++++++++++++++++++++++++++++++++++++ data/wp_vulns.xml | 43 +++++++++++++++++++++++++++++++++++++- 2 files changed, 90 insertions(+), 1 deletion(-) diff --git a/data/plugin_vulns.xml b/data/plugin_vulns.xml index 8ae79715..79b2a8d1 100644 --- a/data/plugin_vulns.xml +++ b/data/plugin_vulns.xml @@ -2794,6 +2794,15 @@ SQLI + + Privilege Escalation CSRF + + 96905 + 2013-0736 + 47687 + + CSRF + @@ -6494,4 +6503,43 @@ 1.3.8 + + + + /admin/walkthrough/walkthrough.php step Parameter Reflected XSS + + http://seclists.org/bugtraq/2013/Sep/54 + 2013-5711 + 97279 + + 3.7 + + + + + + Multiple Administrator Action CSRF + + 97042 + + + + Multiple Unspecified XSS + + 97041 + + + + + + + + + + + + + + + diff --git a/data/wp_vulns.xml b/data/wp_vulns.xml index f9154631..659d12f5 100644 --- a/data/wp_vulns.xml +++ b/data/wp_vulns.xml @@ -10,10 +10,51 @@ http://vagosec.org/2013/09/wordpress-php-object-injection/ http://www.openwall.com/lists/oss-security/2013/09/12/1 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4340 - 2013-4340 + http://core.trac.wordpress.org/changeset/25325 + 54803 + 2013-4338 + 97211 UNKNOWN + + wp-includes/functions.php get_allowed_mime_types Function SWF / EXE File Upload XSS Weakness + + 97210 + 2013-5739 + http://core.trac.wordpress.org/changeset/25322 + + XSS + + + Crafted String URL Redirect Restriction Bypass + + 97212 + 2013-4339 + 54803 + http://core.trac.wordpress.org/changeset/25323 + + UNKNOWN + + + wp-admin/includes/post.php user_ID Parameter Manipulation Post Authorship Spoofing + + 97213 + 2013-4340 + 54803 + http://core.trac.wordpress.org/changeset/25321 + + UNKNOWN + + + wp-includes/functions.php get_allowed_mime_types Function HTML File Upload XSS Weakness + + 97214 + 2013-5738 + http://core.trac.wordpress.org/changeset/25322 + + XSS +