@@ -4461,7 +4461,7 @@
|
|||||||
|
|
||||||
<plugin name="portable-phpmyadmin">
|
<plugin name="portable-phpmyadmin">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>portable-phpMyAdmin - Authentication Bypass</title>
|
<title>Portable-phpMyAdmin - Authentication Bypass</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>98766</osvdb>
|
<osvdb>98766</osvdb>
|
||||||
<cve>2013-4454</cve>
|
<cve>2013-4454</cve>
|
||||||
@@ -4480,6 +4480,23 @@
|
|||||||
<type>AUTHBYPASS</type>
|
<type>AUTHBYPASS</type>
|
||||||
<fixed_in>1.3.1</fixed_in>
|
<fixed_in>1.3.1</fixed_in>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>Portable phpMyAdmin - /pma/phpinfo.php Direct Request System Information Disclosure</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>98766</osvdb>
|
||||||
|
<url>http://seclists.org/oss-sec/2013/q4/138</url>
|
||||||
|
</references>
|
||||||
|
</vulnerability>
|
||||||
|
<vulnerability>
|
||||||
|
<title>Portable phpMyAdmin 1.4.1 - Multiple Script Direct Request Authentication Bypass</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>98767</osvdb>
|
||||||
|
<cve>2013-4454</cve>
|
||||||
|
<secunia>55270</secunia>
|
||||||
|
<url>http://seclists.org/oss-sec/2013/q4/138</url>
|
||||||
|
</references>
|
||||||
|
<type>AUTHBYPASS</type>
|
||||||
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
<plugin name="super-refer-a-friend">
|
<plugin name="super-refer-a-friend">
|
||||||
@@ -4801,8 +4818,9 @@
|
|||||||
<fixed_in>2.0.13</fixed_in>
|
<fixed_in>2.0.13</fixed_in>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>WooCommerce 2.0.17 - Cross Site Scripting</title>
|
<title>WooCommerce 2.0.17 - hide-wc-extensions-message Parameter Reflected XSS</title>
|
||||||
<references>
|
<references>
|
||||||
|
<osvdb>98754</osvdb>
|
||||||
<url>http://packetstormsecurity.com/files/123684/</url>
|
<url>http://packetstormsecurity.com/files/123684/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>XSS</type>
|
<type>XSS</type>
|
||||||
@@ -7477,4 +7495,16 @@
|
|||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
|
<plugin name="videowall">
|
||||||
|
<vulnerability>
|
||||||
|
<title>Videowall - index.php page_id Parameter Reflected XSS</title>
|
||||||
|
<references>
|
||||||
|
<osvdb>98765</osvdb>
|
||||||
|
<url>http://packetstormsecurity.com/files/123693/</url>
|
||||||
|
<url>http://seclists.org/bugtraq/2013/Oct/98</url>
|
||||||
|
</references>
|
||||||
|
<type>XSS</type>
|
||||||
|
</vulnerability>
|
||||||
|
</plugin>
|
||||||
|
|
||||||
</vulnerabilities>
|
</vulnerabilities>
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ class WpVersion < WpItem
|
|||||||
|
|
||||||
unless vulnerabilities.empty?
|
unless vulnerabilities.empty?
|
||||||
puts
|
puts
|
||||||
puts red('[!]') + " We have identified #{vulnerabilities.size} vulnerabilities from the version number :"
|
puts red('[!]') + " We have identified #{vulnerabilities.size} vulnerabilities from the version number:"
|
||||||
|
|
||||||
vulnerabilities.output
|
vulnerabilities.output
|
||||||
end
|
end
|
||||||
|
|||||||
Reference in New Issue
Block a user