OSVDB refrences homogenisation
This commit is contained in:
@@ -7,7 +7,7 @@
|
||||
<vulnerability>
|
||||
<title>Content Slide Plugin Cross-Site Requst Forgery Vulnerability</title>
|
||||
<reference>http://secunia.com/advisories/52949/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93871</reference>
|
||||
<reference>http://osvdb.org/93871</reference>
|
||||
<type>CSRF</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
@@ -16,7 +16,7 @@
|
||||
<vulnerability>
|
||||
<title>Simple Paypal Shopping Cart Plugin Cross-Site Request Forgery Vulnerability</title>
|
||||
<reference>http://secunia.com/advisories/52963/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93953</reference>
|
||||
<reference>http://osvdb.org/93953</reference>
|
||||
<type>CSRF</type>
|
||||
<fixed_in>3.6</fixed_in>
|
||||
</vulnerability>
|
||||
@@ -26,13 +26,13 @@
|
||||
<vulnerability>
|
||||
<title>WP-SendSMS Plugin for WordPress Setting Manipulation CSRF</title>
|
||||
<reference>http://secunia.com/advisories/53796/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/94209</reference>
|
||||
<reference>http://osvdb.org/94209</reference>
|
||||
<reference>http://www.exploit-db.com/exploits/26124</reference>
|
||||
<type>CSRF</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WP-SendSMS Plugin for WordPress wp-admin/admin.php Multiple Parameter XSS</title>
|
||||
<reference>http://osvdb.org/show/osvdb/94210</reference>
|
||||
<reference>http://osvdb.org/94210</reference>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
@@ -41,7 +41,7 @@
|
||||
<vulnerability>
|
||||
<title>Mail Subscribe List Plugin Script Insertion Vulnerability</title>
|
||||
<reference>http://secunia.com/advisories/53732/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/94197</reference>
|
||||
<reference>http://osvdb.org/94197</reference>
|
||||
<type>XSS</type>
|
||||
<fixed_in>2.1</fixed_in>
|
||||
</vulnerability>
|
||||
@@ -2053,7 +2053,7 @@
|
||||
<vulnerability>
|
||||
<title>GRAND FlAGallery Plugin "s" Cross-Site Scripting Vulnerability</title>
|
||||
<reference>http://secunia.com/advisories/53111/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93714</reference>
|
||||
<reference>http://osvdb.org/93714</reference>
|
||||
<type>XSS</type>
|
||||
<fixed_in>2.72</fixed_in>
|
||||
</vulnerability>
|
||||
@@ -2187,7 +2187,7 @@
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>Mingle Forum 1.0.33.3 Multiple Parameter SQL Injection</title>
|
||||
<reference>http://osvdb.org/show/osvdb/90434</reference>
|
||||
<reference>http://osvdb.org/90434</reference>
|
||||
<type>SQLI</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
@@ -3291,7 +3291,7 @@
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>plugin BackWPup 1.5.2, 1.6.1, 1.7.1 Remote and Local Code Execution Vulnerability</title>
|
||||
<reference>http://osvdb.org/show/osvdb/71481</reference>
|
||||
<reference>http://osvdb.org/71481</reference>
|
||||
<type>RCE</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
@@ -3476,7 +3476,7 @@
|
||||
<title>WordPress Events Manager Multiple Cross Site Scripting Vulnerabilities</title>
|
||||
<reference>http://www.securityfocus.com/bid/60078</reference>
|
||||
<reference>http://secunia.com/advisories/53478/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93558</reference>
|
||||
<reference>http://osvdb.org/93558</reference>
|
||||
<type>XSS</type>
|
||||
<fixed_in>5.3.9</fixed_in>
|
||||
</vulnerability>
|
||||
@@ -4019,7 +4019,7 @@
|
||||
<plugin name="password-protected">
|
||||
<vulnerability>
|
||||
<title>Password Protected 1.4 Login Process redirect_to Parameter Arbitrary Site Redirect</title>
|
||||
<reference>http://osvdb.org/show/osvdb/90559</reference>
|
||||
<reference>http://osvdb.org/90559</reference>
|
||||
<type>REDIRECT</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
@@ -4027,7 +4027,7 @@
|
||||
<plugin name="contact-form-plugin">
|
||||
<vulnerability>
|
||||
<title>Contact Form Plugin XSS</title>
|
||||
<reference>http://osvdb.org/show/osvdb/90503</reference>
|
||||
<reference>http://osvdb.org/90503</reference>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
@@ -4593,9 +4593,9 @@
|
||||
<title>CVE-2013-2108|CVE-2013-2109: wp-cleanfix Remote Command Execution, CSRF and XSS</title>
|
||||
<reference>https://github.com/wpscanteam/wpscan/issues/186</reference>
|
||||
<reference>http://wordpress.org/support/topic/plugin-wp-cleanfix-remote-code-execution-warning</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93450</reference>
|
||||
<reference>http://osvdb.org/93450</reference>
|
||||
<reference>http://secunia.com/advisories/53395/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93468</reference>
|
||||
<reference>http://osvdb.org/93468</reference>
|
||||
<type>MULTI</type>
|
||||
<fixed_in>3.0.2</fixed_in>
|
||||
</vulnerability>
|
||||
@@ -4713,7 +4713,7 @@
|
||||
<title>Digg Digg CSRF</title>
|
||||
<reference>http://wordpress.org/plugins/digg-digg/changelog/</reference>
|
||||
<reference>http://secunia.com/advisories/53120/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93544</reference>
|
||||
<reference>http://osvdb.org/93544</reference>
|
||||
<type>CSRF</type>
|
||||
<fixed_in>5.3.5</fixed_in>
|
||||
</vulnerability>
|
||||
@@ -4724,7 +4724,7 @@
|
||||
<title>SS Quiz Plugin Multiple Unspecified Vulnerabilities</title>
|
||||
<reference>http://wordpress.org/plugins/ssquiz/changelog/</reference>
|
||||
<reference>http://secunia.com/advisories/53378/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93531</reference>
|
||||
<reference>http://osvdb.org/93531</reference>
|
||||
<type>UNKNOWN</type>
|
||||
<fixed_in>2.0</fixed_in>
|
||||
</vulnerability>
|
||||
@@ -4762,7 +4762,7 @@
|
||||
<title>CSRF in WordPress underConstruction plugin (CVE-2013-2699)</title>
|
||||
<reference>http://wordpress.org/plugins/underconstruction/changelog/</reference>
|
||||
<reference>http://secunia.com/advisories/52881/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93857</reference>
|
||||
<reference>http://osvdb.org/93857</reference>
|
||||
<type>CSRF</type>
|
||||
<fixed_in>1.09</fixed_in>
|
||||
</vulnerability>
|
||||
@@ -4773,7 +4773,7 @@
|
||||
<title>ADIF Log Search Widget XSS Arbitrary Vulnerability</title>
|
||||
<reference>http://packetstormsecurity.com/files/121777/ADIF-Log-Search-Widget-1.0e-Cross-Site-Scripting.html</reference>
|
||||
<reference>http://secunia.com/advisories/53599/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93721</reference>
|
||||
<reference>http://osvdb.org/93721</reference>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
@@ -4816,7 +4816,7 @@
|
||||
<vulnerability>
|
||||
<title>Image slider with description Plugin Unspecified Vulnerability</title>
|
||||
<reference>http://secunia.com/advisories/53588/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93691</reference>
|
||||
<reference>http://osvdb.org/93691</reference>
|
||||
<type>UNKNOWN</type>
|
||||
<fixed_in>7.0</fixed_in>
|
||||
</vulnerability>
|
||||
@@ -4826,7 +4826,7 @@
|
||||
<vulnerability>
|
||||
<title>User Role Editor Plugin Cross-Site Request Forgery Vulnerability</title>
|
||||
<reference>http://secunia.com/advisories/53593/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93699</reference>
|
||||
<reference>http://osvdb.org/93699</reference>
|
||||
<reference>http://www.exploit-db.com/exploits/25721</reference>
|
||||
<type>CSRF</type>
|
||||
<fixed_in>3.14</fixed_in>
|
||||
@@ -4837,7 +4837,7 @@
|
||||
<vulnerability>
|
||||
<title>EELV Newsletter Plugin Cross-Site Scripting Vulnerability</title>
|
||||
<reference>http://secunia.com/advisories/53546/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93685</reference>
|
||||
<reference>http://osvdb.org/93685</reference>
|
||||
<type>XSS</type>
|
||||
<fixed_in>3.3.1</fixed_in>
|
||||
</vulnerability>
|
||||
@@ -4847,7 +4847,7 @@
|
||||
<vulnerability>
|
||||
<title>Frontier Post Plugin Publishing Posts Security Bypass</title>
|
||||
<reference>http://secunia.com/advisories/53474/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93639</reference>
|
||||
<reference>http://osvdb.org/93639</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
@@ -4856,7 +4856,7 @@
|
||||
<vulnerability>
|
||||
<title>Spider Catalog Plugin Cross-Site Scripting and SQL Injection Vulnerabilities</title>
|
||||
<reference>http://secunia.com/advisories/53491/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93591</reference>
|
||||
<reference>http://osvdb.org/93591</reference>
|
||||
<type>MULTI</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
@@ -4865,7 +4865,7 @@
|
||||
<vulnerability>
|
||||
<title>Spider Event Calendar Plugin Security Bypass, Cross-Site Scripting and SQLi Vulnerabilities</title>
|
||||
<reference>http://secunia.com/advisories/53481/</reference>
|
||||
<reference>http://osvdb.org/show/osvdb/93584</reference>
|
||||
<reference>http://osvdb.org/93584</reference>
|
||||
<type>MULTI</type>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
Reference in New Issue
Block a user