This commit is contained in:
ethicalhack3r
2014-07-15 13:21:55 +02:00
2 changed files with 17 additions and 10 deletions

View File

@@ -7399,6 +7399,8 @@
<title>Audio Player - player.swf playerID Parameter XSS</title>
<references>
<osvdb>89963</osvdb>
<cve>2013-1464</cve>
<url>http://packetstormsecurity.com/files/120129/</url>
<url>http://seclists.org/bugtraq/2013/Feb/35</url>
<secunia>52083</secunia>
</references>
@@ -7461,9 +7463,10 @@
<vulnerability>
<title>smart-flv - jwplayer.swf XSS</title>
<references>
<osvdb>90606</osvdb>
<cve>2013-1765</cve>
<url>http://www.openwall.com/lists/oss-security/2013/02/24/7</url>
<url>http://packetstormsecurity.com/files/115100/</url>
<osvdb>90606</osvdb>
</references>
<type>XSS</type>
</vulnerability>
@@ -7845,11 +7848,13 @@
<plugin name="terillion-reviews">
<vulnerability>
<title>Terillion Reviews - Profile Id Field XSS</title>
<title>Terillion Reviews &lt; 1.2 - Profile Id Field XSS</title>
<references>
<osvdb>91123</osvdb>
<cve>2013-1201</cve>
<cve>2013-2501</cve>
<url>http://packetstormsecurity.com/files/120730/</url>
<url>http://www.securityfocus.com/bid/58415</url>
<url>http://xforce.iss.net/xforce/xfdb/82727</url>
</references>
<type>XSS</type>
</vulnerability>
@@ -9102,6 +9107,7 @@
<title>platinum_seo_pack.php - s Parameter Reflected XSS</title>
<references>
<osvdb>97263</osvdb>
<cve>2013-5918</cve>
</references>
<fixed_in>1.3.8</fixed_in>
<type>XSS</type>
@@ -10152,6 +10158,7 @@
<references>
<osvdb>91274</osvdb>
<cve>2013-0731</cve>
<cve>2013-2640</cve>
<secunia>51917</secunia>
</references>
<type>XSS</type>

View File

@@ -5,7 +5,7 @@
<theme name="crius">
<vulnerability>
<title>VideoJS Cross-Site Scripting Vulnerability</title>
<title>Crius - VideoJS Cross-Site Scripting Vulnerability</title>
<references>
<secunia>53427</secunia>
<url>http://seclists.org/fulldisclosure/2013/May/77</url>
@@ -16,7 +16,7 @@
<theme name="source">
<vulnerability>
<title>VideoJS Cross-Site Scripting Vulnerability</title>
<title>Source - VideoJS Cross-Site Scripting Vulnerability</title>
<references>
<secunia>53457</secunia>
<url>http://seclists.org/fulldisclosure/2013/May/77</url>
@@ -27,7 +27,7 @@
<theme name="i-love-it">
<vulnerability>
<title>VideoJS Cross-Site Scripting Vulnerability</title>
<title>I Love It - VideoJS Cross-Site Scripting Vulnerability</title>
<references>
<secunia>53548</secunia>
<url>http://seclists.org/fulldisclosure/2013/May/77</url>
@@ -38,7 +38,7 @@
<theme name="smartstart">
<vulnerability>
<title>VideoJS Cross-Site Scripting Vulnerability</title>
<title>Smart Start - VideoJS Cross-Site Scripting Vulnerability</title>
<references>
<secunia>53460</secunia>
<url>http://seclists.org/fulldisclosure/2013/May/77</url>
@@ -49,7 +49,7 @@
<theme name="covertvideopress">
<vulnerability>
<title>VideoJS Cross-Site Scripting Vulnerability</title>
<title>Covert Videopress - VideoJS Cross-Site Scripting Vulnerability</title>
<references>
<secunia>53494</secunia>
<url>http://seclists.org/fulldisclosure/2013/May/77</url>
@@ -60,7 +60,7 @@
<theme name="photolio">
<vulnerability>
<title>VideoJS Cross-Site Scripting Vulnerability</title>
<title>Photolio - VideoJS Cross-Site Scripting Vulnerability</title>
<references>
<url>http://seclists.org/fulldisclosure/2013/May/77</url>
</references>
@@ -70,7 +70,7 @@
<theme name="onepagewebsite">
<vulnerability>
<title>onepagewebsite Full Path Disclosure vulnerability</title>
<title>onepagewebsite - Full Path Disclosure vulnerability</title>
<references>
<url>http://1337day.com/exploit/20027</url>
</references>