This commit is contained in:
Peter van der Laan
2013-10-12 21:11:04 +02:00
parent ff9dd1c69d
commit 9d6e50c8e2

View File

@@ -3099,7 +3099,7 @@
<plugin name="ImageManager"> <plugin name="ImageManager">
<vulnerability> <vulnerability>
<title>Image Manager Plugins Shell Upload Vulnerability</title> <title>Image Manager - Shell Upload Vulnerability</title>
<references> <references>
<exploitdb>10325</exploitdb> <exploitdb>10325</exploitdb>
</references> </references>
@@ -3205,7 +3205,7 @@
<plugin name="wp-lytebox"> <plugin name="wp-lytebox">
<vulnerability> <vulnerability>
<title>Lytebox (wp-lytebox) Local File Inclusion Vulnerability</title> <title>Lytebox - Local File Inclusion Vulnerability</title>
<references> <references>
<exploitdb>8791</exploitdb> <exploitdb>8791</exploitdb>
</references> </references>
@@ -3270,7 +3270,7 @@
<plugin name="wp-download"> <plugin name="wp-download">
<vulnerability> <vulnerability>
<title>Download (dl_id) SQL Injection Vulnerability</title> <title>Download - (dl_id) SQL Injection Vulnerability</title>
<references> <references>
<exploitdb>5326</exploitdb> <exploitdb>5326</exploitdb>
</references> </references>
@@ -3290,7 +3290,7 @@
<plugin name="wp-photo-album"> <plugin name="wp-photo-album">
<vulnerability> <vulnerability>
<title>Photo album Remote SQL Injection Vulnerability</title> <title>Photo album - Remote SQL Injection Vulnerability</title>
<references> <references>
<exploitdb>5135</exploitdb> <exploitdb>5135</exploitdb>
</references> </references>
@@ -3317,14 +3317,14 @@
<plugin name="st_newsletter"> <plugin name="st_newsletter">
<vulnerability> <vulnerability>
<title>st_newsletter Remote SQL Injection Vulnerability</title> <title>st_newsletter - Remote SQL Injection Vulnerability</title>
<references> <references>
<exploitdb>5053</exploitdb> <exploitdb>5053</exploitdb>
</references> </references>
<type>SQLI</type> <type>SQLI</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>st_newsletter (stnl_iframe.php) SQL Injection Vuln</title> <title>st_newsletter - (stnl_iframe.php) SQL Injection Vulnerability</title>
<references> <references>
<exploitdb>6777</exploitdb> <exploitdb>6777</exploitdb>
</references> </references>
@@ -3334,7 +3334,7 @@
<plugin name="wordspew"> <plugin name="wordspew">
<vulnerability> <vulnerability>
<title>Wordspew Remote SQL Injection Vulnerability</title> <title>Wordspew - Remote SQL Injection Vulnerability</title>
<references> <references>
<exploitdb>5039</exploitdb> <exploitdb>5039</exploitdb>
</references> </references>
@@ -3441,7 +3441,7 @@
<plugin name="backupwordpress"> <plugin name="backupwordpress">
<vulnerability> <vulnerability>
<title>BackUp &lt;= 0.4.2b RFI Vulnerability</title> <title>BackUp &lt;= 0.4.2b - RFI Vulnerability</title>
<references> <references>
<exploitdb>4593</exploitdb> <exploitdb>4593</exploitdb>
</references> </references>
@@ -3679,7 +3679,7 @@
<plugin name="yolink-search"> <plugin name="yolink-search">
<vulnerability> <vulnerability>
<title>yolink Search "s" Cross-Site Scripting Vulnerability</title> <title>yolink Search - "s" Cross-Site Scripting Vulnerability</title>
<references> <references>
<secunia>52030</secunia> <secunia>52030</secunia>
</references> </references>
@@ -3861,7 +3861,7 @@
<plugin name="eventify"> <plugin name="eventify">
<vulnerability> <vulnerability>
<title>Eventify - Simple Events &lt;= 1.7.f SQL Injection Vulnerability</title> <title>Eventify - Simple Events &lt;= 1.7.f - SQL Injection Vulnerability</title>
<references> <references>
<exploitdb>17794</exploitdb> <exploitdb>17794</exploitdb>
</references> </references>
@@ -3898,7 +3898,7 @@
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>1 Flash Gallery Arbiraty File Upload Exploit (MSF)</title> <title>1 Flash Gallery - Arbiraty File Upload Exploit (MSF)</title>
<references> <references>
<exploitdb>17801</exploitdb> <exploitdb>17801</exploitdb>
</references> </references>
@@ -3915,7 +3915,7 @@
<type>SQLI</type> <type>SQLI</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>WP-Filebase Unspecified Vulnerabilities</title> <title>WP-Filebase - Unspecified Vulnerabilities</title>
<references> <references>
<secunia>51269</secunia> <secunia>51269</secunia>
</references> </references>
@@ -4027,7 +4027,7 @@
<type>RFI</type> <type>RFI</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>Mailing List Arbitrary file download</title> <title>Mailing List - Arbitrary file download</title>
<references> <references>
<exploitdb>18276</exploitdb> <exploitdb>18276</exploitdb>
</references> </references>
@@ -4089,7 +4089,7 @@
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>Category Grid View Gallery CatGridPost.php ID Parameter XSS</title> <title>Category Grid View Gallery - CatGridPost.php ID Parameter XSS</title>
<references> <references>
<osvdb>94805</osvdb> <osvdb>94805</osvdb>
</references> </references>
@@ -4347,7 +4347,7 @@
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>WP Photo Album Plus Full Path Disclosure</title> <title>WP Photo Album Plus - Full Path Disclosure</title>
<references> <references>
<url>http://1337day.com/exploit/20125</url> <url>http://1337day.com/exploit/20125</url>
</references> </references>
@@ -4355,7 +4355,7 @@
<fixed_in>4.9.1</fixed_in> <fixed_in>4.9.1</fixed_in>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>WP Photo Album Plus index.php wppa-tag Parameter XSS</title> <title>WP Photo Album Plus - index.php wppa-tag Parameter XSS</title>
<references> <references>
<osvdb>89165</osvdb> <osvdb>89165</osvdb>
<secunia>51829</secunia> <secunia>51829</secunia>
@@ -4364,7 +4364,7 @@
<fixed_in>4.9.3</fixed_in> <fixed_in>4.9.3</fixed_in>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>WP Photo Album Plus "commentid" Cross-Site Scripting Vulnerability</title> <title>WP Photo Album Plus - "commentid" Cross-Site Scripting Vulnerability</title>
<references> <references>
<osvdb>93033</osvdb> <osvdb>93033</osvdb>
<cve>2013-3254</cve> <cve>2013-3254</cve>
@@ -4374,7 +4374,7 @@
<fixed_in>5.0.3</fixed_in> <fixed_in>5.0.3</fixed_in>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>WP Photo Album Plus wp-admin/admin.php edit_id Parameter XSS</title> <title>WP Photo Album Plus - wp-admin/admin.php edit_id Parameter XSS</title>
<references> <references>
<osvdb>94465</osvdb> <osvdb>94465</osvdb>
<secunia>53915</secunia> <secunia>53915</secunia>
@@ -4507,7 +4507,7 @@
<plugin name="floating-tweets"> <plugin name="floating-tweets">
<vulnerability> <vulnerability>
<title>floating-tweets persistent - XSS</title> <title>floating-tweets - persistent XSS</title>
<references> <references>
<url>http://packetstormsecurity.com/files/119499/</url> <url>http://packetstormsecurity.com/files/119499/</url>
<url>http://websecurity.com.ua/6023/</url> <url>http://websecurity.com.ua/6023/</url>
@@ -4515,7 +4515,7 @@
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>floating-tweets directory traversal</title> <title>floating-tweets - directory traversal</title>
<references> <references>
<url>http://packetstormsecurity.com/files/119499/</url> <url>http://packetstormsecurity.com/files/119499/</url>
<url>http://websecurity.com.ua/6023/</url> <url>http://websecurity.com.ua/6023/</url>
@@ -4545,7 +4545,7 @@
<fixed_in>0.9.4</fixed_in> <fixed_in>0.9.4</fixed_in>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>Simple Login Log SQL Injection</title> <title>Simple Login Log - SQL Injection</title>
<references> <references>
<secunia>51780</secunia> <secunia>51780</secunia>
</references> </references>
@@ -4556,7 +4556,7 @@
<plugin name="wp-slimstat"> <plugin name="wp-slimstat">
<vulnerability> <vulnerability>
<title>wp-slimstat XSS</title> <title>wp-slimstat - XSS</title>
<references> <references>
<secunia>51721</secunia> <secunia>51721</secunia>
</references> </references>
@@ -4578,7 +4578,7 @@
<plugin name="browser-rejector"> <plugin name="browser-rejector">
<vulnerability> <vulnerability>
<title>browser-rejector Remote and Local File Inclusion</title> <title>browser-rejector - Remote and Local File Inclusion</title>
<references> <references>
<secunia>51739</secunia> <secunia>51739</secunia>
</references> </references>
@@ -4589,7 +4589,7 @@
<plugin name="wp-file-uploader"> <plugin name="wp-file-uploader">
<vulnerability> <vulnerability>
<title>File Uploader PHP File Upload Vulnerability</title> <title>File Uploader - PHP File Upload Vulnerability</title>
<references> <references>
<url>http://la.usch.io/2013/01/21/wordpress-file-uploader-plugin-php-file-upload-vulnerability/</url> <url>http://la.usch.io/2013/01/21/wordpress-file-uploader-plugin-php-file-upload-vulnerability/</url>
</references> </references>
@@ -4599,7 +4599,7 @@
<plugin name="cardoza-wordpress-poll"> <plugin name="cardoza-wordpress-poll">
<vulnerability> <vulnerability>
<title>Poll Cross-Site Request Forgery Vulnerability</title> <title>Cardoza Wordpress poll - Cross-Site Request Forgery Vulnerability</title>
<references> <references>
<secunia>51925</secunia> <secunia>51925</secunia>
</references> </references>
@@ -4607,7 +4607,7 @@
<fixed_in>34.06</fixed_in> <fixed_in>34.06</fixed_in>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>Multiple SQL injection vulnerabilities in Cardoza Wordpress poll plugin</title> <title>Cardoza Wordpress poll - Multiple SQL injection vulnerabilities</title>
<references> <references>
<secunia>51942</secunia> <secunia>51942</secunia>
<url>http://www.girlinthemiddle.net/2013/01/multiple-sql-injection-vulnerabilities.html</url> <url>http://www.girlinthemiddle.net/2013/01/multiple-sql-injection-vulnerabilities.html</url>
@@ -4616,7 +4616,7 @@
<type>SQLI</type> <type>SQLI</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>Poll Multiple SQL Injection Vulnerabilities</title> <title>Cardoza Wordpress poll - Multiple SQL Injection Vulnerabilities</title>
<references> <references>
<secunia>50910</secunia> <secunia>50910</secunia>
</references> </references>
@@ -4627,7 +4627,7 @@
<plugin name="devformatter"> <plugin name="devformatter">
<vulnerability> <vulnerability>
<title>Developer Formatter CSRF and XSS Vulnerability</title> <title>Developer Formatter - CSRF and XSS Vulnerability</title>
<references> <references>
<url>http://illsecure.com/code/Wordpress-DevFormatter-CSRF-Vulnerability.txt</url> <url>http://illsecure.com/code/Wordpress-DevFormatter-CSRF-Vulnerability.txt</url>
<url>http://1337day.com/exploits/20210</url> <url>http://1337day.com/exploits/20210</url>
@@ -4639,7 +4639,7 @@
<plugin name="dvs-custom-notification"> <plugin name="dvs-custom-notification">
<vulnerability> <vulnerability>
<title>DVS Custom Notification Cross-Site Request Forgery Vulnerability</title> <title>DVS Custom Notification - Cross-Site Request Forgery Vulnerability</title>
<references> <references>
<secunia>51531</secunia> <secunia>51531</secunia>
</references> </references>
@@ -4694,7 +4694,7 @@
<plugin name="usc-e-shop"> <plugin name="usc-e-shop">
<vulnerability> <vulnerability>
<title>Welcart e-Commerce Cross-Site Scripting and Request Forgery Vulnerabilities</title> <title>Welcart e-Commerce - Cross-Site Scripting and Request Forgery Vulnerabilities</title>
<references> <references>
<secunia>51581</secunia> <secunia>51581</secunia>
</references> </references>
@@ -4704,7 +4704,7 @@
<plugin name="knews"> <plugin name="knews">
<vulnerability> <vulnerability>
<title>Knews Multilingual Newsletters Cross-Site Request Forgery Vulnerability</title> <title>Knews - Multilingual Newsletters Cross-Site Request Forgery Vulnerability</title>
<references> <references>
<secunia>51543</secunia> <secunia>51543</secunia>
</references> </references>
@@ -4714,7 +4714,7 @@
<plugin name="video-lead-form"> <plugin name="video-lead-form">
<vulnerability> <vulnerability>
<title>Video Lead Form "errMsg" Cross-Site Scripting Vulnerability</title> <title>Video Lead Form - "errMsg" Cross-Site Scripting Vulnerability</title>
<references> <references>
<secunia>51419</secunia> <secunia>51419</secunia>
</references> </references>
@@ -4724,7 +4724,7 @@
<plugin name="woocommerce-predictive-search"> <plugin name="woocommerce-predictive-search">
<vulnerability> <vulnerability>
<title>WooCommerce Predictive Search "rs" Cross-Site Scripting Vulnerability</title> <title>WooCommerce Predictive Search - "rs" Cross-Site Scripting Vulnerability</title>
<references> <references>
<secunia>51385</secunia> <secunia>51385</secunia>
</references> </references>
@@ -4734,7 +4734,7 @@
<plugin name="woocommerce"> <plugin name="woocommerce">
<vulnerability> <vulnerability>
<title>WooCommerce index.php calc_shipping_state Parameter XSS</title> <title>WooCommerce - index.php calc_shipping_state Parameter XSS</title>
<references> <references>
<osvdb>95480</osvdb> <osvdb>95480</osvdb>
</references> </references>
@@ -4745,7 +4745,7 @@
<plugin name="wp-e-commerce-predictive-search"> <plugin name="wp-e-commerce-predictive-search">
<vulnerability> <vulnerability>
<title>WP e-Commerce Predictive Search "rs" Cross-Site Scripting Vulnerability</title> <title>WP e-Commerce Predictive Search - "rs" Cross-Site Scripting Vulnerability</title>
<references> <references>
<secunia>51384</secunia> <secunia>51384</secunia>
</references> </references>
@@ -4755,7 +4755,7 @@
<plugin name="wp-tiger"> <plugin name="wp-tiger">
<vulnerability> <vulnerability>
<title>vTiger CRM Lead Capture Unspecified Vulnerability</title> <title>vTiger - CRM Lead Capture Unspecified Vulnerability</title>
<references> <references>
<secunia>51305</secunia> <secunia>51305</secunia>
</references> </references>
@@ -4766,14 +4766,14 @@
<plugin name="wp-postviews"> <plugin name="wp-postviews">
<vulnerability> <vulnerability>
<title>WP-PostViews "search_input" Cross-Site Scripting Vulnerability</title> <title>WP-PostViews - "search_input" Cross-Site Scripting Vulnerability</title>
<references> <references>
<secunia>50982</secunia> <secunia>50982</secunia>
</references> </references>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>WP-PostViews Cross-Site Request Forgery Vulnerability</title> <title>WP-PostViews - Cross-Site Request Forgery Vulnerability</title>
<references> <references>
<secunia>53127</secunia> <secunia>53127</secunia>
</references> </references>
@@ -4784,7 +4784,7 @@
<plugin name="dx-contribute"> <plugin name="dx-contribute">
<vulnerability> <vulnerability>
<title>DX-Contribute Cross-Site Request Forgery Vulnerability</title> <title>DX-Contribute - Cross-Site Request Forgery Vulnerability</title>
<references> <references>
<secunia>51082</secunia> <secunia>51082</secunia>
</references> </references>
@@ -4794,7 +4794,7 @@
<plugin name="wysija-newsletters"> <plugin name="wysija-newsletters">
<vulnerability> <vulnerability>
<title>SQL Injection Vulnerability in Wysija Newsletters WordPress Plugin</title> <title>Wysija Newsletters - SQL Injection Vulnerability</title>
<references> <references>
<url>https://www.htbridge.com/advisory/HTB23140</url> <url>https://www.htbridge.com/advisory/HTB23140</url>
<url>http://packetstormsecurity.com/files/120089/</url> <url>http://packetstormsecurity.com/files/120089/</url>
@@ -4805,7 +4805,7 @@
<fixed_in>2.2.1</fixed_in> <fixed_in>2.2.1</fixed_in>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>Wysija Newsletters swfupload Cross-Site Scripting Vulnerability</title> <title>Wysija Newsletters - swfupload Cross-Site Scripting Vulnerability</title>
<references> <references>
<secunia>51249</secunia> <secunia>51249</secunia>
<url>http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html</url> <url>http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html</url>
@@ -6780,7 +6780,7 @@
<plugin name="simple-flickr-display"> <plugin name="simple-flickr-display">
<vulnerability> <vulnerability>
<title>Simple Flickr Display Username Field Stored XSS</title> <title>Simple Flickr Display - Username Field Stored XSS</title>
<references> <references>
<osvdb>97991</osvdb> <osvdb>97991</osvdb>
</references> </references>
@@ -7036,6 +7036,7 @@
<vulnerability> <vulnerability>
<title>Quick Contact Form 6.0 - Persistent XSS</title> <title>Quick Contact Form 6.0 - Persistent XSS</title>
<references> <references>
<osvdb>98279</osvdb>
<exploitdb>28808</exploitdb> <exploitdb>28808</exploitdb>
<url>http://packetstormsecurity.com/files/123549/</url> <url>http://packetstormsecurity.com/files/123549/</url>
<url>http://quick-plugins.com/quick-contact-form/</url> <url>http://quick-plugins.com/quick-contact-form/</url>
@@ -7167,6 +7168,7 @@
<vulnerability> <vulnerability>
<title>Simple Flash Video 1.7 - Cross Site Scripting</title> <title>Simple Flash Video 1.7 - Cross Site Scripting</title>
<references> <references>
<osvdb>98371</osvdb>
<url>http://packetstormsecurity.com/files/123562/</url> <url>http://packetstormsecurity.com/files/123562/</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
@@ -7186,4 +7188,25 @@
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="cart66-lite">
<vulnerability>
<title>Cart66 1.5.1.14 - admin.php cart66-products Page Product Manipulation CSRF</title>
<references>
<osvdb>98352</osvdb>
<cve>2013-5977</cve>
</references>
<type>CSRF</type>
<fixed_in>1.5.1.15</fixed_in>
</vulnerability>
<vulnerability>
<title>Cart66 - admin.php cart66-products Page Multiple Field Stored XSS</title>
<references>
<osvdb>98353</osvdb>
<cve>2013-5978</cve>
</references>
<type>XSS</type>
<fixed_in>1.5.1.15</fixed_in>
</vulnerability>
</plugin>
</vulnerabilities> </vulnerabilities>