Merge pull request #333 from pvdl/master

Update plugin_vulns.xml
This commit is contained in:
erwanlr
2013-10-23 04:55:58 -07:00
2 changed files with 33 additions and 3 deletions

View File

@@ -4461,7 +4461,7 @@
<plugin name="portable-phpmyadmin">
<vulnerability>
<title>portable-phpMyAdmin - Authentication Bypass</title>
<title>Portable-phpMyAdmin - Authentication Bypass</title>
<references>
<osvdb>98766</osvdb>
<cve>2013-4454</cve>
@@ -4480,6 +4480,23 @@
<type>AUTHBYPASS</type>
<fixed_in>1.3.1</fixed_in>
</vulnerability>
<vulnerability>
<title>Portable phpMyAdmin - /pma/phpinfo.php Direct Request System Information Disclosure</title>
<references>
<osvdb>98766</osvdb>
<url>http://seclists.org/oss-sec/2013/q4/138</url>
</references>
</vulnerability>
<vulnerability>
<title>Portable phpMyAdmin 1.4.1 - Multiple Script Direct Request Authentication Bypass</title>
<references>
<osvdb>98767</osvdb>
<cve>2013-4454</cve>
<secunia>55270</secunia>
<url>http://seclists.org/oss-sec/2013/q4/138</url>
</references>
<type>AUTHBYPASS</type>
</vulnerability>
</plugin>
<plugin name="super-refer-a-friend">
@@ -4801,8 +4818,9 @@
<fixed_in>2.0.13</fixed_in>
</vulnerability>
<vulnerability>
<title>WooCommerce 2.0.17 - Cross Site Scripting</title>
<title>WooCommerce 2.0.17 - hide-wc-extensions-message Parameter Reflected XSS</title>
<references>
<osvdb>98754</osvdb>
<url>http://packetstormsecurity.com/files/123684/</url>
</references>
<type>XSS</type>
@@ -7477,4 +7495,16 @@
</vulnerability>
</plugin>
<plugin name="videowall">
<vulnerability>
<title>Videowall - index.php page_id Parameter Reflected XSS</title>
<references>
<osvdb>98765</osvdb>
<url>http://packetstormsecurity.com/files/123693/</url>
<url>http://seclists.org/bugtraq/2013/Oct/98</url>
</references>
<type>XSS</type>
</vulnerability>
</plugin>
</vulnerabilities>

View File

@@ -10,7 +10,7 @@ class WpVersion < WpItem
unless vulnerabilities.empty?
puts
puts red('[!]') + " We have identified #{vulnerabilities.size} vulnerabilities from the version number :"
puts red('[!]') + " We have identified #{vulnerabilities.size} vulnerabilities from the version number:"
vulnerabilities.output
end