diff --git a/data/plugin_vulns.json b/data/plugin_vulns.json
new file mode 100644
index 00000000..9c4d3b0b
--- /dev/null
+++ b/data/plugin_vulns.json
@@ -0,0 +1 @@
+[{"login-rebuilder":{"vulnerabilities":[{"id":88156,"title":"Login Rebuilder \u003c 1.2.0 - Cross Site Request Forgery Vulnerability","osvdb":"108364","cve":"2014-3882","created_at":"2014-07-15T17:16:51.141Z","updated_at":"2014-07-15T17:16:51.141Z","fixed_in":"1.2.0"}]}},{"simple-share-buttons-adder":{"vulnerabilities":[{"id":88157,"title":"Simple Share Buttons Adder 4.4 - options-general.php Multiple Admin Actions CSRF","url":"https://security.dxw.com/advisories/csrf-and-stored-xss-in-simple-share-buttons-adder/,http://packetstormsecurity.com/files/127238/","osvdb":"108444","cve":"2014-4717","exploitdb":"33896","created_at":"2014-07-15T17:16:51.227Z","updated_at":"2014-07-15T17:16:51.227Z","fixed_in":"4.5"},{"id":88158,"title":"Simple Share Buttons Adder 4.4 - options-general.php ssba_share_text Parameter Stored XSS Weakness","url":"https://security.dxw.com/advisories/csrf-and-stored-xss-in-simple-share-buttons-adder/,http://packetstormsecurity.com/files/127238/","osvdb":"108445","exploitdb":"33896","created_at":"2014-07-15T17:16:51.341Z","updated_at":"2014-07-15T17:16:51.341Z","fixed_in":"4.5"}]}},{"content-slide":{"vulnerabilities":[{"id":88159,"title":"Content Slide \u003c= 1.4.2 - Cross Site Request Forgery Vulnerability","osvdb":"93871","cve":"2013-2708","secunia":"52949","created_at":"2014-07-15T17:16:51.418Z","updated_at":"2014-07-15T17:16:51.418Z"}]}},{"wp-cron-dashboard":{"vulnerabilities":[{"id":88160,"title":"WP Cron DashBoard \u003c= 1.1.5 - wp-cron-dashboard.php procname Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124602/,https://www.htbridge.com/advisory/HTB23189","osvdb":"100660","cve":"2013-6991","created_at":"2014-07-15T17:16:51.486Z","updated_at":"2014-07-15T17:16:51.486Z"}]}},{"wordpress-simple-paypal-shopping-cart":{"vulnerabilities":[{"id":88161,"title":"Simple Paypal Shopping Cart 3.5 - Cross-Site Request Forgery Vulnerability","osvdb":"93953","cve":"2013-2705","secunia":"52963","created_at":"2014-07-15T17:16:51.563Z","updated_at":"2014-07-15T17:16:51.563Z","fixed_in":"3.6"}]}},{"wp-sendsms":{"vulnerabilities":[{"id":88162,"title":"WP-SendSMS 1.0 - Setting Manipulation CSRF","osvdb":"94209","secunia":"53796","exploitdb":"26124","created_at":"2014-07-15T17:16:51.637Z","updated_at":"2014-07-15T17:16:51.637Z"},{"id":88163,"title":"WP-SendSMS 1.0 - wp-admin/admin.php Multiple Parameter XSS","osvdb":"94210","exploitdb":"26124","created_at":"2014-07-15T17:16:51.711Z","updated_at":"2014-07-15T17:16:51.711Z"}]}},{"mail-subscribe-list":{"vulnerabilities":[{"id":88164,"title":"Mail Subscribe List - Script Insertion Vulnerability","osvdb":"94197","secunia":"53732","created_at":"2014-07-15T17:16:51.765Z","updated_at":"2014-07-15T17:16:51.765Z","fixed_in":"2.1"}]}},{"s3-video":{"vulnerabilities":[{"id":88165,"title":"S3 Video \u003c= 0.97 - VideoJS Cross Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/66","secunia":"53437","created_at":"2014-07-15T17:16:51.816Z","updated_at":"2014-07-15T17:16:51.816Z","fixed_in":"0.98"},{"id":88166,"title":"S3 Video 0.982 - preview_video.php base Parameter XSS","osvdb":"101388","cve":"2013-7279","secunia":"56167","created_at":"2014-07-15T17:16:51.873Z","updated_at":"2014-07-15T17:16:51.873Z","fixed_in":"0.983"}]}},{"video-embed-thumbnail-generator":{"vulnerabilities":[{"id":88167,"title":"VideoJS Cross - Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/66","secunia":"53426","created_at":"2014-07-15T17:16:51.925Z","updated_at":"2014-07-15T17:16:51.925Z","fixed_in":"4.1"}]}},{"1player":{"vulnerabilities":[{"id":88167,"title":"VideoJS Cross - Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/66","secunia":"53426","created_at":"2014-07-15T17:16:51.925Z","updated_at":"2014-07-15T17:16:51.925Z","fixed_in":"1.4"}]}},{"external-video-for-everybody":{"vulnerabilities":[{"id":88167,"title":"VideoJS Cross - Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/66","secunia":"53426","created_at":"2014-07-15T17:16:51.925Z","updated_at":"2014-07-15T17:16:51.925Z","fixed_in":"2.1"}]}},{"EasySqueezePage":{"vulnerabilities":[{"id":88167,"title":"VideoJS Cross - Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/66","secunia":"53426","created_at":"2014-07-15T17:16:51.925Z","updated_at":"2014-07-15T17:16:51.925Z"}]}},{"crayon-syntax-highlighter":{"vulnerabilities":[{"id":88168,"title":"Crayon Syntax Highlighter - Remote File Inclusion Vulnerability","url":"http://ceriksen.com/2012/10/15/wordpress-crayon-syntax-highlighter-remote-file-inclusion-vulnerability/","secunia":"50804","created_at":"2014-07-15T17:16:52.252Z","updated_at":"2014-07-15T17:16:52.252Z","fixed_in":"1.13"}]}},{"ungallery":{"vulnerabilities":[{"id":88169,"title":"UnGallery \u003c= 1.5.8 - Local File Disclosure Vulnerability","exploitdb":"17704","created_at":"2014-07-15T17:16:52.319Z","updated_at":"2014-07-15T17:16:52.319Z"},{"id":88170,"title":"UnGallery - Arbitrary Command Execution","url":"http://ceriksen.com/2012/10/23/wordpress-ungallery-remote-command-injection-vulnerability/","secunia":"50875","created_at":"2014-07-15T17:16:52.391Z","updated_at":"2014-07-15T17:16:52.391Z","fixed_in":"2.1.6"}]}},{"thanks-you-counter-button":{"vulnerabilities":[{"id":88171,"title":"Thank You Counter Button 1.8.7 - wp-admin/options.php Multiple Parameter Stored XSS","url":"http://packetstormsecurity.com/files/125397/,http://www.securityfocus.com/bid/65805","osvdb":"103778","cve":"2014-2315","created_at":"2014-07-15T17:16:52.466Z","updated_at":"2014-07-15T17:16:52.466Z"},{"id":88172,"title":"Thank You Counter Button \u003c= 1.8.2 - XSS","secunia":"50977","created_at":"2014-07-15T17:16:52.538Z","updated_at":"2014-07-15T17:16:52.538Z","fixed_in":"1.8.3"}]}},{"bookings":{"vulnerabilities":[{"id":88173,"title":"Bookings \u003c= 1.8.2 - controlpanel.php error Parameter XSS","osvdb":"86613","secunia":"50975","created_at":"2014-07-15T17:16:52.612Z","updated_at":"2014-07-15T17:16:52.612Z","fixed_in":"1.8.3"}]}},{"cimy-user-manager":{"vulnerabilities":[{"id":88174,"title":"Cimy User Manager \u003c= 1.4.2 - Arbitrary File Disclosure","url":"http://ceriksen.com/2012/10/24/wordpress-cimy-user-manager-arbitrary-file-disclosure/","secunia":"50834","created_at":"2014-07-15T17:16:52.685Z","updated_at":"2014-07-15T17:16:52.685Z","fixed_in":"1.4.4"}]}},{"fs-real-estate-plugin":{"vulnerabilities":[{"id":88175,"title":"FireStorm Professional Real Estate 2.06.01 - xml/marker_listings.php id Parameter SQL Injection","url":"http://packetstormsecurity.com/files/118232/,http://xforce.iss.net/xforce/xfdb/80261","osvdb":"86686","secunia":"51107","exploitdb":"22071","created_at":"2014-07-15T17:16:52.747Z","updated_at":"2014-07-15T17:16:52.747Z","fixed_in":"2.06.04"},{"id":88176,"title":"FireStorm Professional Real Estate - Multiple SQL Injection","url":"http://ceriksen.com/2012/10/25/wordpress-firestorm-professional-real-estate-plugin-sql-injection-vulnerability/","secunia":"50873","created_at":"2014-07-15T17:16:52.805Z","updated_at":"2014-07-15T17:16:52.805Z","fixed_in":"2.06.03"}]}},{"wp125":{"vulnerabilities":[{"id":88177,"title":"WP125 \u003c= 1.4.4 - Multiple XSS","secunia":"50976","created_at":"2014-07-15T17:16:52.854Z","updated_at":"2014-07-15T17:16:52.854Z","fixed_in":"1.4.5"},{"id":88178,"title":"WP125 \u003c= 1.4.9 - CSRF","url":"http://www.securityfocus.com/bid/58934","osvdb":"92113","cve":"2013-2700","secunia":"52876","created_at":"2014-07-15T17:16:52.902Z","updated_at":"2014-07-15T17:16:52.902Z","fixed_in":"1.5.0"}]}},{"all-video-gallery":{"vulnerabilities":[{"id":88179,"title":"All Video Gallery - Multiple SQL Injection Vulnerabilities","url":"http://ceriksen.com/2012/11/04/wordpress-all-video-gallery-plugin-sql-injection/","secunia":"50874","exploitdb":"22427","created_at":"2014-07-15T17:16:52.950Z","updated_at":"2014-07-15T17:16:52.950Z"},{"id":89602,"title":"this is a test","created_at":"2014-07-15T17:26:16.549Z","updated_at":"2014-07-15T17:26:16.549Z"}]}},{"buddystream":{"vulnerabilities":[{"id":88180,"title":"BuddyStream - XSS","secunia":"50972","created_at":"2014-07-15T17:16:53.001Z","updated_at":"2014-07-15T17:16:53.001Z"}]}},{"post-views":{"vulnerabilities":[{"id":88181,"title":"Post views 2.6.1 - wp-content/plugins/post-views/post-views.php search_input Parameter XSS","url":"http://www.securityfocus.com/bid/56555,http://xforce.iss.net/xforce/xfdb/80076","osvdb":"87349","secunia":"50982","created_at":"2014-07-15T17:16:53.049Z","updated_at":"2014-07-15T17:16:53.049Z"}]}},{"floating-social-media-links":{"vulnerabilities":[{"id":88182,"title":"Floating Social Media Links \u003c= 1.4.2 - fsml-admin.js.php wpp Parameter Remote File Inclusion","url":"http://www.securityfocus.com/bid/56913,http://xforce.iss.net/xforce/xfdb/80641,http://ceriksen.com/2013/01/12/wordpress-floating-social-media-link-plugins-remote-file-inclusion/","osvdb":"88383","secunia":"51346","created_at":"2014-07-15T17:16:53.096Z","updated_at":"2014-07-15T17:16:53.096Z","fixed_in":"1.4.3"},{"id":88183,"title":"Floating Social Media Links \u003c= 1.4.2 - fsml-hideshow.js.php wpp Parameter Remote File Inclusion","url":"http://www.securityfocus.com/bid/56913,http://ceriksen.com/2013/01/12/wordpress-floating-social-media-link-plugins-remote-file-inclusion/","osvdb":"88385","secunia":"51346","created_at":"2014-07-15T17:16:53.144Z","updated_at":"2014-07-15T17:16:53.144Z","fixed_in":"1.4.3"}]}},{"zingiri-forum":{"vulnerabilities":[{"id":88184,"title":"Zingiri Forum 1.4.2 - forum.php zing_forum_output Function url Parameter XSS","url":"http://www.securityfocus.com/bid/57224,http://xforce.iss.net/xforce/xfdb/81156,http://ceriksen.com/2013/01/12/wordpress-zingiri-forums-arbitrary-file-disclosure/","osvdb":"89069","cve":"2012-4920","secunia":"50833","created_at":"2014-07-15T17:16:53.195Z","updated_at":"2014-07-15T17:16:53.195Z","fixed_in":"1.4.4"}]}},{"google-document-embedder":{"vulnerabilities":[{"id":88185,"title":"Google Document Embedder - Arbitrary File Disclosure","url":"http://www.securityfocus.com/bid/57133,http://packetstormsecurity.com/files/119329/,http://ceriksen.com/2013/01/03/wordpress-google-document-embedder-arbitrary-file-disclosure/","cve":"2012-4915","secunia":"50832","exploitdb":"23970","created_at":"2014-07-15T17:16:53.241Z","updated_at":"2014-07-15T17:16:53.241Z","metasploit":"exploit/unix/webapp/wp_google_document_embedder_exec","fixed_in":"2.5.4"}]}},{"extended-user-profile":{"vulnerabilities":[{"id":88186,"title":"extended-user-profile - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20118","created_at":"2014-07-15T17:16:53.287Z","updated_at":"2014-07-15T17:16:53.287Z"}]}},{"superslider-show":{"vulnerabilities":[{"id":88187,"title":"superslider-show - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20117","created_at":"2014-07-15T17:16:53.336Z","updated_at":"2014-07-15T17:16:53.336Z"}]}},{"wordpress-multibox-plugin":{"vulnerabilities":[{"id":88188,"title":"multibox - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20119","created_at":"2014-07-15T17:16:53.384Z","updated_at":"2014-07-15T17:16:53.384Z"}]}},{"openinviter-for-wordpress":{"vulnerabilities":[{"id":88189,"title":"OpenInviter - Information Disclosure","url":"http://packetstormsecurity.com/files/119265/","created_at":"2014-07-15T17:16:53.437Z","updated_at":"2014-07-15T17:16:53.437Z"},{"id":89610,"title":"testing!!!!123","url":"http://www.example.com","osvdb":"12f345,12345,1234g5","cve":"12345,12345,12345","secunia":"12345,2222,12345,12345","exploitdb":"12345","created_at":"2014-07-29T16:02:58.453Z","updated_at":"2014-07-29T21:03:59.991Z"}]}},{"wp_rokbox":{"vulnerabilities":[{"id":88190,"title":"RokBox - Multiple Vulnerabilities","url":"http://1337day.com/exploit/19981","created_at":"2014-07-15T17:16:53.486Z","updated_at":"2014-07-15T17:16:53.486Z"},{"id":88191,"title":"RokBox \u003c= 2.13 - thumb.php src Parameter Malformed Input Path Disclosure","url":"http://packetstormsecurity.com/files/118884/,http://xforce.iss.net/xforce/xfdb/80732,http://www.securityfocus.com/bid/56953,http://seclists.org/fulldisclosure/2012/Dec/159","osvdb":"88604","created_at":"2014-07-15T17:16:53.548Z","updated_at":"2014-07-15T17:16:53.548Z"},{"id":88192,"title":"RokBox \u003c= 2.13 - thumb.php src Parameter XSS","url":"http://packetstormsecurity.com/files/118884/,http://xforce.iss.net/xforce/xfdb/80731,http://www.securityfocus.com/bid/56953,http://seclists.org/fulldisclosure/2012/Dec/159","osvdb":"88605","created_at":"2014-07-15T17:16:53.603Z","updated_at":"2014-07-15T17:16:53.603Z"},{"id":88193,"title":"RokBox \u003c= 2.13 - rokbox.php Direct Request Path Disclosure","url":"http://packetstormsecurity.com/files/118884/,http://www.securityfocus.com/bid/56953,http://seclists.org/fulldisclosure/2012/Dec/159","osvdb":"88606","created_at":"2014-07-15T17:16:53.653Z","updated_at":"2014-07-15T17:16:53.653Z"},{"id":88194,"title":"RokBox \u003c= 2.13 - error_log Direct Request Error Log Information Disclosure","url":"http://packetstormsecurity.com/files/118884/,http://xforce.iss.net/xforce/xfdb/80761,http://www.securityfocus.com/bid/56953,http://seclists.org/fulldisclosure/2012/Dec/159","osvdb":"88607","created_at":"2014-07-15T17:16:53.702Z","updated_at":"2014-07-15T17:16:53.702Z"},{"id":88195,"title":"RokBox \u003c= 2.13 - jwplayer/jwplayer.swf abouttext Parameter XSS","url":"http://packetstormsecurity.com/files/118884/,http://xforce.iss.net/xforce/xfdb/80731,http://www.securityfocus.com/bid/56953,http://seclists.org/fulldisclosure/2012/Dec/159","osvdb":"88608","created_at":"2014-07-15T17:16:53.749Z","updated_at":"2014-07-15T17:16:53.749Z"},{"id":88196,"title":"RokBox \u003c= 2.13 - thumb.php src Parameter Arbitrary File Upload","url":"http://packetstormsecurity.com/files/118884/,http://xforce.iss.net/xforce/xfdb/80733,http://xforce.iss.net/xforce/xfdb/80739,http://www.securityfocus.com/bid/56953,http://seclists.org/fulldisclosure/2012/Dec/159","osvdb":"88609","created_at":"2014-07-15T17:16:53.796Z","updated_at":"2014-07-15T17:16:53.796Z"}]}},{"wp_rokintroscroller":{"vulnerabilities":[{"id":88197,"title":"RokIntroScroller \u003c= 1.8 - XSS,DoS,Disclosure,Upload Vulnerabilities","url":"http://packetstormsecurity.com/files/123302/,http://seclists.org/fulldisclosure/2013/Sep/121","osvdb":"97418","secunia":"54801","created_at":"2014-07-15T17:16:53.844Z","updated_at":"2014-07-15T17:16:53.844Z"}]}},{"wp_rokmicronews":{"vulnerabilities":[{"id":88198,"title":"RokMicroNews \u003c= 1.5 - XSS,DoS,Disclosure,Upload Vulnerabilities","url":"http://packetstormsecurity.com/files/123312/,http://seclists.org/fulldisclosure/2013/Sep/124","osvdb":"97418","secunia":"54801","created_at":"2014-07-15T17:16:53.891Z","updated_at":"2014-07-15T17:16:53.891Z"}]}},{"wp_roknewspager":{"vulnerabilities":[{"id":88199,"title":"RokNewsPager \u003c= 1.17 - XSS,DoS,Disclosure,Upload Vulnerabilities","url":"http://packetstormsecurity.com/files/123271/,http://seclists.org/fulldisclosure/2013/Sep/109","osvdb":"97418","secunia":"54801","created_at":"2014-07-15T17:16:53.938Z","updated_at":"2014-07-15T17:16:53.938Z"}]}},{"wp_rokstories":{"vulnerabilities":[{"id":88200,"title":"RokStories \u003c= 1.25 - XSS,DoS,Disclosure,Upload Vulnerabilities","url":"http://packetstormsecurity.com/files/123270/,http://seclists.org/fulldisclosure/2013/Sep/108","osvdb":"97418","secunia":"54801","created_at":"2014-07-15T17:16:53.987Z","updated_at":"2014-07-15T17:16:53.987Z"}]}},{"grou-random-image-widget":{"vulnerabilities":[{"id":88201,"title":"grou-random-image-widget - Full Path Disclosure","url":"http://1337day.com/exploit/20047","created_at":"2014-07-15T17:16:54.039Z","updated_at":"2014-07-15T17:16:54.039Z"}]}},{"sintic_gallery":{"vulnerabilities":[{"id":88202,"title":"sintic_gallery - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/19993","created_at":"2014-07-15T17:16:54.084Z","updated_at":"2014-07-15T17:16:54.084Z"},{"id":88203,"title":"sintic_gallery - Path Disclosure Vulnerability","url":"http://1337day.com/exploit/20020","created_at":"2014-07-15T17:16:54.139Z","updated_at":"2014-07-15T17:16:54.139Z"}]}},{"wp-useronline":{"vulnerabilities":[{"id":88204,"title":"WP-UserOnline - Full Path Disclosure","url":"http://seclists.org/fulldisclosure/2010/Jul/8","created_at":"2014-07-15T17:16:54.190Z","updated_at":"2014-07-15T17:16:54.190Z"},{"id":88205,"title":"Wp-UserOnline \u003c= 0.62 - Persistent XSS","url":"http://seclists.org/fulldisclosure/2010/Jul/8","created_at":"2014-07-15T17:16:54.239Z","updated_at":"2014-07-15T17:16:54.239Z"}]}},{"levelfourstorefront":{"vulnerabilities":[{"id":88206,"title":"Shopping Cart 8.1.14 - Shell Upload, SQL Injection","url":"http://packetstormsecurity.com/files/119217/","secunia":"51690","created_at":"2014-07-15T17:16:54.287Z","updated_at":"2014-07-15T17:16:54.287Z","fixed_in":"8.1.15"},{"id":88207,"title":"Level Four Storefront - levelfourstorefront/getsortmanufacturers.php id Parameter SQL Injection","url":"http://packetstormsecurity.com/files/120950/","osvdb":"91680","created_at":"2014-07-15T17:16:54.345Z","updated_at":"2014-07-15T17:16:54.345Z"}]}},{"reflex-gallery":{"vulnerabilities":[{"id":88208,"title":"ReFlex Gallery 1.4.2 - Unspecified XSS","osvdb":"102585","created_at":"2014-07-15T17:16:54.393Z","updated_at":"2014-07-15T17:16:54.393Z","fixed_in":"1.4.3"},{"id":88209,"title":"ReFlex Gallery 1.4 - reflex-gallery.php Direct Request Path Disclosure","osvdb":"88869","created_at":"2014-07-15T17:16:54.444Z","updated_at":"2014-07-15T17:16:54.444Z"},{"id":88210,"title":"ReFlex Gallery 1.3 - Shell Upload","url":"http://packetstormsecurity.com/files/119218/","created_at":"2014-07-15T17:16:54.492Z","updated_at":"2014-07-15T17:16:54.492Z"}]}},{"uploader":{"vulnerabilities":[{"id":88211,"title":"Uploader 1.0.4 - Shell Upload","url":"http://packetstormsecurity.com/files/119219/","created_at":"2014-07-15T17:16:54.545Z","updated_at":"2014-07-15T17:16:54.545Z"},{"id":88212,"title":"Uploader 1.0.4 - notify.php blog Parameter XSS","osvdb":"90840","cve":"2013-2287","secunia":"52465","created_at":"2014-07-15T17:16:54.597Z","updated_at":"2014-07-15T17:16:54.597Z"}]}},{"xerte-online":{"vulnerabilities":[{"id":88213,"title":"Xerte Online 0.32 - Shell Upload","url":"http://packetstormsecurity.com/files/119220/","created_at":"2014-07-15T17:16:54.650Z","updated_at":"2014-07-15T17:16:54.650Z"}]}},{"advanced-custom-fields":{"vulnerabilities":[{"id":88214,"title":"Advanced Custom Fields \u003c= 3.5.1 - Remote File Inclusion","url":"http://packetstormsecurity.com/files/119221/","osvdb":"87353","secunia":"51037","exploitdb":"23856","created_at":"2014-07-15T17:16:54.696Z","updated_at":"2014-07-15T17:16:54.696Z","metasploit":"exploit/unix/webapp/wp_advanced_custom_fields_exec","fixed_in":"3.5.2"}]}},{"sitepress-multilingual-cms":{"vulnerabilities":[{"id":88215,"title":"sitepress-multilingual-cms - Full Path Disclosure","url":"http://1337day.com/exploit/20067","created_at":"2014-07-15T17:16:54.744Z","updated_at":"2014-07-15T17:16:54.744Z"}]}},{"asset-manager":{"vulnerabilities":[{"id":88216,"title":"Asset Manager 0.2 - Arbitrary File Upload","url":"http://www.securityfocus.com/bid/53809,http://packetstormsecurity.com/files/119133/","osvdb":"82653","secunia":"49378","exploitdb":"18993,23652","created_at":"2014-07-15T17:16:54.792Z","updated_at":"2014-07-15T17:16:54.792Z"},{"id":88217,"title":"Asset Manager - upload.php Arbitrary Code Execution","url":"http://www.ethicalhack3r.co.uk/security/wordpress-plugin-asset-manager-upload-php-arbitrary-code-execution/,http://packetstormsecurity.com/files/113285/,http://xforce.iss.net/xforce/xfdb/80823","osvdb":"82653","created_at":"2014-07-15T17:16:54.838Z","updated_at":"2014-07-15T17:16:54.838Z"}]}},{"apptha-banner":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"apptha-slider-gallery":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"blaze-slide-show-for-wordpress":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"},{"id":88219,"title":"Blaze Slideshow 2.1 - Unspecified Security Vulnerability","url":"http://www.securityfocus.com/bid/52677","created_at":"2014-07-15T17:16:55.051Z","updated_at":"2014-07-15T17:16:55.051Z","fixed_in":"2.2"}]}},{"comment-extra-field":{"vulnerabilities":[{"id":88220,"title":"Comment Extra Field 1.7 - CSRF / XSS","url":"http://packetstormsecurity.com/files/122625/,http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:55.100Z","updated_at":"2014-07-15T17:16:55.100Z"}]}},{"fluid-accessible-rich-inline-edit":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"fluid-accessible-pager":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"fluid-accessible-uploader":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"fluid-accessible-ui-options":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"fresh-page":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"pdw-file-browser":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"},{"id":88221,"title":"PDW File Browser - upload.php Arbitrary File Upload Vulnerability","url":"http://www.securityfocus.com/bid/53895","created_at":"2014-07-15T17:16:55.505Z","updated_at":"2014-07-15T17:16:55.505Z"}]}},{"power-zoomer":{"vulnerabilities":[{"id":88222,"title":"powerzoomer - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/20253","created_at":"2014-07-15T17:16:55.557Z","updated_at":"2014-07-15T17:16:55.557Z"},{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"slide-show-pro":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"smart-slide-show":{"vulnerabilities":[{"id":88223,"title":"Smart Slideshow - upload.php Multiple File Extension Upload Arbitrary Code Execution","osvdb":"87373","created_at":"2014-07-15T17:16:55.732Z","updated_at":"2014-07-15T17:16:55.732Z"},{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"spotlightyour":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"sprapid":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"ultimate-tinymce":{"vulnerabilities":[{"id":88224,"title":"TinyMCE 3.5 - swfupload Cross-Site Scripting Vulnerability","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","secunia":"51224","created_at":"2014-07-15T17:16:55.973Z","updated_at":"2014-07-15T17:16:55.973Z","fixed_in":"3.6"}]}},{"wp-3dbanner-rotator":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-3dflick-slideshow":{"vulnerabilities":[{"id":88225,"title":"wp-3dflick-slideshow - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/20255","created_at":"2014-07-15T17:16:56.079Z","updated_at":"2014-07-15T17:16:56.079Z"},{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-bliss-gallery":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-carouselslideshow":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"},{"id":88226,"title":"Carousel Slideshow - Unspecified Vulnerabilities","secunia":"50377","created_at":"2014-07-15T17:16:56.339Z","updated_at":"2014-07-15T17:16:56.339Z","fixed_in":"3.10"}]}},{"wp-dreamworkgallery":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-ecommerce-cvs-importer":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-extended":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-flipslideshow":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-homepage-slideshow":{"vulnerabilities":[{"id":88227,"title":"wp-homepage-slideshow - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/20260","created_at":"2014-07-15T17:16:56.645Z","updated_at":"2014-07-15T17:16:56.645Z"},{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-image-news-slider":{"vulnerabilities":[{"id":88228,"title":"Image News Slider 3.3 - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/20259","osvdb":"87375","created_at":"2014-07-15T17:16:56.769Z","updated_at":"2014-07-15T17:16:56.769Z"},{"id":88229,"title":"Image News Slider 3.3 - Unspecified Vulnerabilities","osvdb":"84935","secunia":"50390","created_at":"2014-07-15T17:16:56.842Z","updated_at":"2014-07-15T17:16:56.842Z","fixed_in":"3.4"},{"id":88230,"title":"Image News Slider 3.2 - Multiple Unspecified Remote Issues","url":"http://www.securityfocus.com/bid/52977,http://xforce.iss.net/xforce/xfdb/74788","osvdb":"81314","cve":"2012-4327","secunia":"48747","created_at":"2014-07-15T17:16:56.899Z","updated_at":"2014-07-15T17:16:56.899Z","fixed_in":"3.3"},{"id":88231,"title":"Image News Slider 3.1 - Multiple Unspecified Remote Issues","osvdb":"80310","secunia":"48538","created_at":"2014-07-15T17:16:56.950Z","updated_at":"2014-07-15T17:16:56.950Z","fixed_in":"3.2"},{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-image-resizer":{"vulnerabilities":[{"id":88232,"title":"Image Resizer - Cross Site Scripting","url":"http://packetstormsecurity.com/files/123651/","created_at":"2014-07-15T17:16:57.065Z","updated_at":"2014-07-15T17:16:57.065Z"}]}},{"wp-levoslideshow":{"vulnerabilities":[{"id":88233,"title":"wp-levoslideshow - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/20250","created_at":"2014-07-15T17:16:57.112Z","updated_at":"2014-07-15T17:16:57.112Z"},{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-matrix-gallery":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-powerplaygallery":{"vulnerabilities":[{"id":88234,"title":"wp-powerplaygallery - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/20252","created_at":"2014-07-15T17:16:57.277Z","updated_at":"2014-07-15T17:16:57.277Z"},{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-royal-gallery":{"vulnerabilities":[{"id":88235,"title":"wp-royal-gallery - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/20261","created_at":"2014-07-15T17:16:57.383Z","updated_at":"2014-07-15T17:16:57.383Z"},{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-superb-slideshow":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"},{"id":88236,"title":"wp superb Slideshow - Full Path Disclosure","url":"http://1337day.com/exploit/19979","created_at":"2014-07-15T17:16:57.573Z","updated_at":"2014-07-15T17:16:57.573Z"}]}},{"wp-vertical-gallery":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"wp-yasslideshow":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"}]}},{"cardoza-ajax-search":{"vulnerabilities":[{"id":88237,"title":"Ajax - Post Search Sql Injection","url":"http://seclists.org/bugtraq/2012/Nov/33,http://www.girlinthemiddle.net/2012/10/sqli-vulnerability-in-ajax-post-search.html","secunia":"51205","created_at":"2014-07-15T17:16:57.734Z","updated_at":"2014-07-15T17:16:57.734Z","fixed_in":"1.3"}]}},{"answer-my-question":{"vulnerabilities":[{"id":88238,"title":"Answer My Question 1.1 - record_question.php Multiple Parameter XSS","url":"http://www.securityfocus.com/archive/1/524625/30/0/threaded,http://seclists.org/bugtraq/2012/Nov/24","osvdb":"85567","secunia":"50655","created_at":"2014-07-15T17:16:57.782Z","updated_at":"2014-07-15T17:16:57.782Z","fixed_in":"1.2"}]}},{"catalog":{"vulnerabilities":[{"id":88239,"title":"Spider Catalog - HTML Code Injection and Cross-site scripting","url":"http://packetstormsecurity.com/files/117820/","secunia":"51143","created_at":"2014-07-15T17:16:57.828Z","updated_at":"2014-07-15T17:16:57.828Z"},{"id":88240,"title":"Spider Catalog - Multiple SQL Injection and Cross Site Scripting Vulnerabilities","url":"http://www.securityfocus.com/bid/60079","created_at":"2014-07-15T17:16:57.873Z","updated_at":"2014-07-15T17:16:57.873Z"},{"id":88241,"title":"Spider Catalog 1.4.6 - Multiple Shortcode id Parameter SQL Injection","url":"http://seclists.org/bugtraq/2013/May/79","osvdb":"93589","secunia":"53491","exploitdb":"25724","created_at":"2014-07-15T17:16:57.922Z","updated_at":"2014-07-15T17:16:57.922Z"},{"id":88242,"title":"Spider Catalog 1.4.6 - catalog.php catalog_after_search_results Function s Parameter SQL Injection","url":"http://seclists.org/bugtraq/2013/May/79","osvdb":"93590","secunia":"53491","exploitdb":"25724","created_at":"2014-07-15T17:16:57.969Z","updated_at":"2014-07-15T17:16:57.969Z"},{"id":88243,"title":"Spider Catalog 1.4.6 - Categories.php Multiple Function id Parameter SQL Injection","url":"http://seclists.org/bugtraq/2013/May/79","osvdb":"93591","secunia":"53491","exploitdb":"25724","created_at":"2014-07-15T17:16:58.016Z","updated_at":"2014-07-15T17:16:58.016Z"},{"id":88244,"title":"Spider Catalog 1.4.6 - products.php Multiple Function Multiple Parameter SQL Injection","url":"http://seclists.org/bugtraq/2013/May/79","osvdb":"93592","secunia":"53491","exploitdb":"25724","created_at":"2014-07-15T17:16:58.061Z","updated_at":"2014-07-15T17:16:58.061Z"},{"id":88245,"title":"Spider Catalog 1.4.6 - Category Entry Multiple Field XSS","url":"http://seclists.org/bugtraq/2013/May/79","osvdb":"93593","secunia":"53491","exploitdb":"25723","created_at":"2014-07-15T17:16:58.109Z","updated_at":"2014-07-15T17:16:58.109Z"},{"id":88246,"title":"Spider Catalog 1.4.6 - Categories.html.php Multiple Parameter XSS","url":"http://seclists.org/bugtraq/2013/May/79","osvdb":"93594","secunia":"53491","exploitdb":"25724","created_at":"2014-07-15T17:16:58.156Z","updated_at":"2014-07-15T17:16:58.156Z"},{"id":88247,"title":"Spider Catalog 1.4.6 - Products.html.php Multiple Parameter XSS","url":"http://seclists.org/bugtraq/2013/May/79","osvdb":"93595","secunia":"53491","exploitdb":"25724","created_at":"2014-07-15T17:16:58.206Z","updated_at":"2014-07-15T17:16:58.206Z"},{"id":88248,"title":"Spider Catalog 1.4.6 - spiderBox/spiderBox.js.php Multiple Parameter XSS","url":"http://seclists.org/bugtraq/2013/May/79","osvdb":"93596","secunia":"53491","exploitdb":"25724","created_at":"2014-07-15T17:16:58.258Z","updated_at":"2014-07-15T17:16:58.258Z"},{"id":88249,"title":"Spider Catalog 1.4.6 - catalog.php spider_box_js_php Function Multiple Parameter XSS","url":"http://seclists.org/bugtraq/2013/May/79","osvdb":"93597","secunia":"53491","exploitdb":"25724","created_at":"2014-07-15T17:16:58.307Z","updated_at":"2014-07-15T17:16:58.307Z"},{"id":88250,"title":"Spider Catalog 1.4.6 - Multiple Script Direct Request Path Disclosure","url":"http://seclists.org/bugtraq/2013/May/79","osvdb":"93598","secunia":"53491","exploitdb":"25724","created_at":"2014-07-15T17:16:58.354Z","updated_at":"2014-07-15T17:16:58.354Z"}]}},{"wordfence":{"vulnerabilities":[{"id":88251,"title":"Wordfence 3.8.6 - lib/IPTraf.php User-Agent Header Stored XSS","osvdb":"102445","secunia":"56558","created_at":"2014-07-15T17:16:58.400Z","updated_at":"2014-07-15T17:16:58.400Z","fixed_in":"3.8.7"},{"id":88252,"title":"Wordfence 3.8.1 - lib/wordfenceClass.php isStrongPasswd Function Password Creation Restriction Bypass Weakness","osvdb":"102478","created_at":"2014-07-15T17:16:58.449Z","updated_at":"2014-07-15T17:16:58.449Z","fixed_in":"3.8.3"},{"id":88253,"title":"Wordfence 3.8.1 - wp-admin/admin.php whois Parameter Stored XSS","url":"http://packetstormsecurity.com/files/122993/,http://www.securityfocus.com/bid/62053","osvdb":"97884","created_at":"2014-07-15T17:16:58.497Z","updated_at":"2014-07-15T17:16:58.497Z","fixed_in":"3.8.3"},{"id":88254,"title":"Wordfence 3.3.5 - XSS and IAA","url":"http://seclists.org/fulldisclosure/2012/Oct/139","osvdb":"86557","secunia":"51055","created_at":"2014-07-15T17:16:58.544Z","updated_at":"2014-07-15T17:16:58.544Z","fixed_in":"3.3.7"}]}},{"slideshow-jquery-image-gallery":{"vulnerabilities":[{"id":88255,"title":"Slideshow jQuery Image Gallery - Multiple Vulnerabilities","url":"http://www.waraxe.us/advisory-92.html","created_at":"2014-07-15T17:16:58.596Z","updated_at":"2014-07-15T17:16:58.596Z"},{"id":88256,"title":"Slideshow - Multiple Script Insertion Vulnerabilities","secunia":"51135","created_at":"2014-07-15T17:16:58.645Z","updated_at":"2014-07-15T17:16:58.645Z"}]}},{"social-discussions":{"vulnerabilities":[{"id":88257,"title":"Social Discussions 6.1.1 - Multiple Script Direct Request Path Disclosure","url":"http://xforce.iss.net/xforce/xfdb/79465,http://www.waraxe.us/advisory-93.html","osvdb":"86730","exploitdb":"22158","created_at":"2014-07-15T17:16:58.695Z","updated_at":"2014-07-15T17:16:58.695Z"},{"id":88258,"title":"Social Discussions 6.1.1 - social-discussions-networkpub_ajax.php HTTP_ENV_VARS Parameter Remote File Inclusion","url":"http://xforce.iss.net/xforce/xfdb/79464,http://www.waraxe.us/advisory-93.html","osvdb":"86731","exploitdb":"22158","created_at":"2014-07-15T17:16:58.745Z","updated_at":"2014-07-15T17:16:58.745Z"}]}},{"abtest":{"vulnerabilities":[{"id":88259,"title":"ABtest - Directory Traversal","url":"http://scott-herbert.com/?p=140","created_at":"2014-07-15T17:16:58.794Z","updated_at":"2014-07-15T17:16:58.794Z"}]}},{"bbpress":{"vulnerabilities":[{"id":88260,"title":"BBPress - Multiple Script Malformed Input Path Disclosure","url":"http://xforce.iss.net/xforce/xfdb/78244,http://packetstormsecurity.com/files/116123/","osvdb":"86399","exploitdb":"22396","created_at":"2014-07-15T17:16:58.847Z","updated_at":"2014-07-15T17:16:58.847Z"},{"id":88261,"title":"BBPress - forum.php page Parameter SQL Injection","url":"http://xforce.iss.net/xforce/xfdb/78244,http://packetstormsecurity.com/files/116123/","osvdb":"86400","exploitdb":"22396","created_at":"2014-07-15T17:16:58.900Z","updated_at":"2014-07-15T17:16:58.900Z"}]}},{"nextgen_cu3er_gallery":{"vulnerabilities":[{"id":88262,"title":"NextGen Cu3er Gallery - Information Disclosure","url":"http://packetstormsecurity.com/files/116150/","created_at":"2014-07-15T17:16:58.960Z","updated_at":"2014-07-15T17:16:58.960Z"}]}},{"rich-widget":{"vulnerabilities":[{"id":88263,"title":"Rich Widget - File Upload","url":"http://packetstormsecurity.com/files/115787/","created_at":"2014-07-15T17:16:59.011Z","updated_at":"2014-07-15T17:16:59.011Z"}]}},{"monsters-editor-10-for-wp-super-edit":{"vulnerabilities":[{"id":88264,"title":"Monsters Editor - Shell Upload","url":"http://packetstormsecurity.com/files/115788/","created_at":"2014-07-15T17:16:59.060Z","updated_at":"2014-07-15T17:16:59.060Z"}]}},{"quick-post-widget":{"vulnerabilities":[{"id":88265,"title":"Quick Post Widget 1.9.1 - Multiple Cross-site scripting vulnerabilities","url":"http://seclists.org/bugtraq/2012/Aug/66","created_at":"2014-07-15T17:16:59.110Z","updated_at":"2014-07-15T17:16:59.110Z"}]}},{"threewp-email-reflector":{"vulnerabilities":[{"id":88266,"title":"ThreeWP Email Reflector 1.13 - Subject Field XSS","osvdb":"85134","cve":"2012-2572","exploitdb":"20365","created_at":"2014-07-15T17:16:59.157Z","updated_at":"2014-07-15T17:16:59.157Z","fixed_in":"1.16"}]}},{"wp-simplemail":{"vulnerabilities":[{"id":88267,"title":"SimpleMail 1.0.6 - Stored XSS","osvdb":"84534","cve":"2012-2579","secunia":"50208","exploitdb":"20361","created_at":"2014-07-15T17:16:59.206Z","updated_at":"2014-07-15T17:16:59.206Z"}]}},{"postie":{"vulnerabilities":[{"id":88268,"title":"Postie 1.4.3 - Stored XSS","osvdb":"84532","cve":"2012-2580","secunia":"50207","exploitdb":"20360","created_at":"2014-07-15T17:16:59.256Z","updated_at":"2014-07-15T17:16:59.256Z","fixed_in":"1.5.15"}]}},{"rsvpmaker":{"vulnerabilities":[{"id":88269,"title":"RSVPMaker 2.5.4 - index.php RSVP Form Multiple Field XSS","osvdb":"84749","secunia":"50289","exploitdb":"20474","created_at":"2014-07-15T17:16:59.307Z","updated_at":"2014-07-15T17:16:59.307Z","fixed_in":"2.5.5"}]}},{"mz-jajak":{"vulnerabilities":[{"id":88270,"title":"Mz-jajak \u003c= 2.1 - index.php id Parameter SQL Injection","osvdb":"84698","secunia":"50217","exploitdb":"20416","created_at":"2014-07-15T17:16:59.357Z","updated_at":"2014-07-15T17:16:59.357Z"}]}},{"resume-submissions-job-postings":{"vulnerabilities":[{"id":88271,"title":"Resume Submissions Job Posting 2.5.1 - Unrestricted File Upload","url":"http://packetstormsecurity.com/files/114716/","osvdb":"83807","secunia":"49896","exploitdb":"19791","created_at":"2014-07-15T17:16:59.407Z","updated_at":"2014-07-15T17:16:59.407Z"}]}},{"wp-predict":{"vulnerabilities":[{"id":88272,"title":"WP-Predict 1.0 - Blind SQL Injection","osvdb":"83697","secunia":"49843","exploitdb":"19715","created_at":"2014-07-15T17:16:59.456Z","updated_at":"2014-07-15T17:16:59.456Z"}]}},{"backup":{"vulnerabilities":[{"id":88273,"title":"Backup 2.0.1 - Information Disclosure","osvdb":"83701","secunia":"50038","exploitdb":"19524","created_at":"2014-07-15T17:16:59.506Z","updated_at":"2014-07-15T17:16:59.506Z","fixed_in":"2.1"}]}},{"moodthingy-mood-rating-widget":{"vulnerabilities":[{"id":88274,"title":"MoodThingy Widget 0.8.7 - admin-ajax.php Multiple Parameter lydl_store_results Function SQL Injection","osvdb":"83632","secunia":"49805","exploitdb":"19572","created_at":"2014-07-15T17:16:59.559Z","updated_at":"2014-07-15T17:16:59.559Z"}]}},{"paid-business-listings":{"vulnerabilities":[{"id":88275,"title":"Paid Business Listings 1.0.2 - Form Submission pbl_listing_pkg_id Parameter SQL Injection","osvdb":"83768","exploitdb":"19481","created_at":"2014-07-15T17:16:59.609Z","updated_at":"2014-07-15T17:16:59.609Z"}]}},{"website-faq":{"vulnerabilities":[{"id":88276,"title":"Website FAQ 1.0 - wp-admin/admin-ajax.php category Parameter SQL injection","osvdb":"83265","secunia":"49682","exploitdb":"19400","created_at":"2014-07-15T17:16:59.658Z","updated_at":"2014-07-15T17:16:59.658Z"}]}},{"radykal-fancy-gallery":{"vulnerabilities":[{"id":88277,"title":"Fancy Gallery 1.2.4 - Shell Upload","url":"http://packetstormsecurity.com/files/114114/","osvdb":"83410","exploitdb":"19398","created_at":"2014-07-15T17:16:59.703Z","updated_at":"2014-07-15T17:16:59.703Z"}]}},{"flipbook":{"vulnerabilities":[{"id":88278,"title":"Flip Book 1.0 - Shell Upload","url":"http://packetstormsecurity.com/files/114112/","created_at":"2014-07-15T17:16:59.749Z","updated_at":"2014-07-15T17:16:59.749Z"}]}},{"ajax_multi_upload":{"vulnerabilities":[{"id":88279,"title":"Ajax Multi Upload 1.1 - Shell Upload","url":"http://packetstormsecurity.com/files/114109/","created_at":"2014-07-15T17:16:59.795Z","updated_at":"2014-07-15T17:16:59.795Z"}]}},{"schreikasten":{"vulnerabilities":[{"id":88280,"title":"Schreikasten 0.14.13 - wp-admin/admin-ajax.php Multiple Parameter XSS","osvdb":"83152","secunia":"49600","exploitdb":"19294","created_at":"2014-07-15T17:16:59.839Z","updated_at":"2014-07-15T17:16:59.839Z"}]}},{"wp-automatic":{"vulnerabilities":[{"id":88281,"title":"Automatic 2.0.3 - csv.php q Parameter SQL Injection","url":"http://packetstormsecurity.com/files/113763/","osvdb":"82971","secunia":"49573","exploitdb":"19187","created_at":"2014-07-15T17:16:59.885Z","updated_at":"2014-07-15T17:16:59.885Z","fixed_in":"2.0.4"}]}},{"videowhisper-video-conference-integration":{"vulnerabilities":[{"id":88282,"title":"VideoWhisper Video Conference 4.51 - Arbitrary File Upload Vulnerability","url":"http://packetstormsecurity.com/files/113580/","created_at":"2014-07-15T17:16:59.929Z","updated_at":"2014-07-15T17:16:59.929Z"},{"id":88283,"title":"Video Whisper - XSS","url":"http://packetstormsecurity.com/files/122943/","created_at":"2014-07-15T17:16:59.981Z","updated_at":"2014-07-15T17:16:59.981Z"}]}},{"videowhisper-live-streaming-integration":{"vulnerabilities":[{"id":88284,"title":"VideoWhisper Live Streaming Integration 4.29.6 - videowhisper_streaming.php Multiple Parameter XSS","url":"http://packetstormsecurity.com/files/125430/","osvdb":"103871","created_at":"2014-07-15T17:17:00.040Z","updated_at":"2014-07-15T17:17:00.040Z"},{"id":88285,"title":"VideoWhisper Live Streaming Integration 4.27.3 - ls/vc_chatlog.php msg Parameter Stored XSS","url":"https://www.htbridge.com/advisory/HTB23199","osvdb":"103821","cve":"2014-1906","created_at":"2014-07-15T17:17:00.091Z","updated_at":"2014-07-15T17:17:00.091Z","fixed_in":"4.29.5"},{"id":88286,"title":"VideoWhisper Live Streaming Integration 4.27.3 - ls/v_status.php ct Parameter Reflected XSS","url":"https://www.htbridge.com/advisory/HTB23199","osvdb":"103820","cve":"2014-1906","created_at":"2014-07-15T17:17:00.150Z","updated_at":"2014-07-15T17:17:00.150Z","fixed_in":"4.29.5"},{"id":88287,"title":"VideoWhisper Live Streaming Integration 4.27.3 - ls/lb_logout.php message Parameter Reflected XSS","url":"https://www.htbridge.com/advisory/HTB23199","osvdb":"103819","cve":"2014-1906","created_at":"2014-07-15T17:17:00.198Z","updated_at":"2014-07-15T17:17:00.198Z","fixed_in":"4.29.5"},{"id":88288,"title":"VideoWhisper Live Streaming Integration 4.27.3 - ls/videotext.php n Parameter Reflected XSS","url":"https://www.htbridge.com/advisory/HTB23199","osvdb":"103818","cve":"2014-1906","created_at":"2014-07-15T17:17:00.256Z","updated_at":"2014-07-15T17:17:00.256Z","fixed_in":"4.29.5"},{"id":88289,"title":"VideoWhisper Live Streaming Integration 4.27.3 - ls/video.php n Parameter Reflected XSS","url":"https://www.htbridge.com/advisory/HTB23199","osvdb":"103817","cve":"2014-1906","created_at":"2014-07-15T17:17:00.311Z","updated_at":"2014-07-15T17:17:00.311Z","fixed_in":"4.29.5"},{"id":88290,"title":"VideoWhisper Live Streaming Integration 4.27.3 - ls/htmlchat.php n Parameter Reflected XSS","url":"https://www.htbridge.com/advisory/HTB23199","osvdb":"103816","cve":"2014-1906","created_at":"2014-07-15T17:17:00.372Z","updated_at":"2014-07-15T17:17:00.372Z","fixed_in":"4.29.5"},{"id":88291,"title":"VideoWhisper Live Streaming Integration 4.27.3 - ls/rtmp_logout.php s Parameter Path Traversal Remote File Deletion","url":"http://packetstormsecurity.com/files/125454/,https://www.htbridge.com/advisory/HTB23199","osvdb":"103815","cve":"2014-1907","created_at":"2014-07-15T17:17:00.423Z","updated_at":"2014-07-15T17:17:00.423Z","fixed_in":"4.29.5"},{"id":88292,"title":"VideoWhisper Live Streaming Integration 4.27.3 - ls/channel.php n Parameter Reflected XSS","url":"https://www.htbridge.com/advisory/HTB23199","osvdb":"103814","cve":"2014-1906","created_at":"2014-07-15T17:17:00.473Z","updated_at":"2014-07-15T17:17:00.473Z","fixed_in":"4.29.5"},{"id":88293,"title":"VideoWhisper Live Streaming Integration 4.27.3 - Error Message Unspecified Remote Information Disclosure","osvdb":"103428","created_at":"2014-07-15T17:17:00.521Z","updated_at":"2014-07-15T17:17:00.521Z","fixed_in":"4.29.5"},{"id":88294,"title":"VideoWhisper Live Streaming Integration 4.27.3 - Unspecified Path Traversal","osvdb":"103427","created_at":"2014-07-15T17:17:00.569Z","updated_at":"2014-07-15T17:17:00.569Z","fixed_in":"4.29.5"},{"id":88295,"title":"VideoWhisper Live Streaming Integration 4.27.3 - Unspecified XSS","osvdb":"103426","created_at":"2014-07-15T17:17:00.625Z","updated_at":"2014-07-15T17:17:00.625Z","fixed_in":"4.29.5"},{"id":88296,"title":"VideoWhisper Live Streaming Integration 4.27.3 - Unspecified File Upload Remote Code Execution","osvdb":"103425","created_at":"2014-07-15T17:17:00.679Z","updated_at":"2014-07-15T17:17:00.679Z","fixed_in":"4.29.5"},{"id":88297,"title":"VideoWhisper Live Streaming Integration \u003c 4.27.2 - XSS vulnerability in ls/vv_login.php via room_name parameter","url":"http://codevigilant.com/disclosure/wp-plugin-videowhisper-live-streaming-integration-a3-cross-site-scripting-xss/","cve":"2014-4569","created_at":"2014-07-15T17:17:00.730Z","updated_at":"2014-07-15T17:17:00.730Z"},{"id":88298,"title":"VideoWhisper Live Streaming Integration - ls/htmlchat.php Multiple Parameter XSS","url":"http://www.securityfocus.com/bid/61977,http://seclists.org/bugtraq/2013/Aug/163","osvdb":"96593","cve":"2013-5714","secunia":"54619","created_at":"2014-07-15T17:17:00.781Z","updated_at":"2014-07-15T17:17:00.781Z"}]}},{"auctionPlugin":{"vulnerabilities":[{"id":88299,"title":"Sitemile Auctions 2.0.1.3 - wp-content/plugins/auctionPlugin/upload.php File Upload PHP Code Execution","url":"http://packetstormsecurity.com/files/113568/","osvdb":"83075","secunia":"49497","created_at":"2014-07-15T17:17:00.830Z","updated_at":"2014-07-15T17:17:00.830Z"}]}},{"lb-mixed-slideshow":{"vulnerabilities":[{"id":88300,"title":"LB Mixed Slideshow 1.0 - Arbitrary File Upload Vulnerability","url":"http://packetstormsecurity.com/files/113844/","created_at":"2014-07-15T17:17:00.876Z","updated_at":"2014-07-15T17:17:00.876Z"}]}},{"lim4wp":{"vulnerabilities":[{"id":88301,"title":"Lim4wp 1.1.1 - Arbitrary File Upload Vulnerability","url":"http://packetstormsecurity.com/files/113846/","created_at":"2014-07-15T17:17:00.922Z","updated_at":"2014-07-15T17:17:00.922Z"}]}},{"wp-imagezoom":{"vulnerabilities":[{"id":88302,"title":"Wp-ImageZoom 1.0.3 - Remote File Disclosure","url":"http://packetstormsecurity.com/files/113845/","created_at":"2014-07-15T17:17:00.992Z","updated_at":"2014-07-15T17:17:00.992Z"},{"id":88303,"title":"Wp-ImageZoom - zoom.php id Parameter SQL Injection","url":"http://www.securityfocus.com/bid/56691,http://xforce.iss.net/xforce/xfdb/80285","osvdb":"87870","created_at":"2014-07-15T17:17:01.042Z","updated_at":"2014-07-15T17:17:01.042Z"}]}},{"invit0r":{"vulnerabilities":[{"id":88304,"title":"Invit0r 0.22 - Shell Upload","url":"http://packetstormsecurity.com/files/113639/","created_at":"2014-07-15T17:17:01.100Z","updated_at":"2014-07-15T17:17:01.100Z"}]}},{"announces":{"vulnerabilities":[{"id":88305,"title":"Annonces 1.2.0.1 - Shell Upload","url":"http://packetstormsecurity.com/files/113637/","created_at":"2014-07-15T17:17:01.146Z","updated_at":"2014-07-15T17:17:01.146Z"}]}},{"contus-video-galleryversion-10":{"vulnerabilities":[{"id":88306,"title":"Contus Video Gallery 1.3 - Arbitrary File Upload Vulnerability","url":"http://packetstormsecurity.com/files/113571/","created_at":"2014-07-15T17:17:01.193Z","updated_at":"2014-07-15T17:17:01.193Z"}]}},{"contus-hd-flv-player":{"vulnerabilities":[{"id":88307,"title":"Contus HD FLV Player \u003c= 1.3 - SQL Injection Vulnerability","exploitdb":"17678","created_at":"2014-07-15T17:17:01.245Z","updated_at":"2014-07-15T17:17:01.245Z"},{"id":88308,"title":"Contus HD FLV Player 1.7 - Arbitrary File Upload Vulnerability","url":"http://packetstormsecurity.com/files/113570/","created_at":"2014-07-15T17:17:01.299Z","updated_at":"2014-07-15T17:17:01.299Z"}]}},{"user-meta":{"vulnerabilities":[{"id":88309,"title":"User Meta Version 1.1.1 - Arbitrary File Upload Vulnerability","exploitdb":"19052","created_at":"2014-07-15T17:17:01.349Z","updated_at":"2014-07-15T17:17:01.349Z"}]}},{"topquark":{"vulnerabilities":[{"id":88310,"title":"Top Quark Architecture 2.1.0 - lib/js/fancyupload/showcase/batch/script.php File Upload PHP Code Execution","url":"http://packetstormsecurity.com/files/113522/","osvdb":"82843","secunia":"49465","exploitdb":"19053","created_at":"2014-07-15T17:17:01.400Z","updated_at":"2014-07-15T17:17:01.400Z"}]}},{"sfbrowser":{"vulnerabilities":[{"id":88311,"title":"SFBrowser 1.4.5 - connectors/php/sfbrowser.php File Upload PHP Code Execution","osvdb":"82845","secunia":"49466","exploitdb":"19054","created_at":"2014-07-15T17:17:01.448Z","updated_at":"2014-07-15T17:17:01.448Z"}]}},{"pica-photo-gallery":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"},{"id":88312,"title":"Pica Photo Gallery 1.0 - Arbitrary File Upload Vulnerability","exploitdb":"19055","created_at":"2014-07-15T17:17:01.569Z","updated_at":"2014-07-15T17:17:01.569Z"},{"id":88313,"title":"PICA Photo Gallery 1.0 - Remote File Disclosure","url":"http://www.securityfocus.com/bid/53893","exploitdb":"19016","created_at":"2014-07-15T17:17:01.618Z","updated_at":"2014-07-15T17:17:01.618Z"}]}},{"mac-dock-gallery":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"},{"id":88314,"title":"Mac Photo Gallery - Two Security Bypass Security Issues","secunia":"49923","created_at":"2014-07-15T17:17:01.729Z","updated_at":"2014-07-15T17:17:01.729Z"},{"id":88315,"title":"Mac Photo Gallery - Multiple Script Insertion Vulnerabilities","secunia":"49836","created_at":"2014-07-15T17:17:01.774Z","updated_at":"2014-07-15T17:17:01.774Z","fixed_in":"3.0"},{"id":88316,"title":"Mac Photo Gallery 2.7 - upload-file.php File Upload PHP Code Execution","osvdb":"82844","secunia":"49468","exploitdb":"19056","created_at":"2014-07-15T17:17:01.820Z","updated_at":"2014-07-15T17:17:01.820Z"}]}},{"drag-drop-file-uploader":{"vulnerabilities":[{"id":88317,"title":"drag and drop file upload 0.1 - Arbitrary File Upload Vulnerability","exploitdb":"19057","created_at":"2014-07-15T17:17:01.865Z","updated_at":"2014-07-15T17:17:01.865Z"}]}},{"custom-content-type-manager":{"vulnerabilities":[{"id":88318,"title":"Custom Content Type Manager 0.9.5.13pl - upload_form.php File Upload PHP Code Execution","url":"http://packetstormsecurity.com/files/113520/","osvdb":"82904","exploitdb":"19058","created_at":"2014-07-15T17:17:01.909Z","updated_at":"2014-07-15T17:17:01.909Z"}]}},{"wp-gpx-map":{"vulnerabilities":[{"id":88319,"title":"wp-gpx-max version 1.1.21 - Arbitrary File Upload","url":"http://www.securityfocus.com/bid/53909,http://packetstormsecurity.org/files/113523/","osvdb":"82900","cve":"2012-6649","exploitdb":"19050","created_at":"2014-07-15T17:17:01.953Z","updated_at":"2014-07-15T17:17:01.953Z","fixed_in":"1.1.23"}]}},{"front-file-manager":{"vulnerabilities":[{"id":88320,"title":"Front File Manager 0.1 - Arbitrary File Upload","exploitdb":"19012","created_at":"2014-07-15T17:17:01.998Z","updated_at":"2014-07-15T17:17:01.998Z"}]}},{"front-end-upload":{"vulnerabilities":[{"id":88321,"title":"Front End Upload 0.5.3 - Arbitrary File Upload","exploitdb":"19008","created_at":"2014-07-15T17:17:02.041Z","updated_at":"2014-07-15T17:17:02.041Z"},{"id":88322,"title":"Front End Upload 0.5.4 - Arbitrary PHP File Upload","exploitdb":"20083","created_at":"2014-07-15T17:17:02.087Z","updated_at":"2014-07-15T17:17:02.087Z"}]}},{"omni-secure-files":{"vulnerabilities":[{"id":88323,"title":"Omni Secure Files 0.1.13 - Arbitrary File Upload","url":"http://www.securityfocus.com/bid/53872","exploitdb":"19009","created_at":"2014-07-15T17:17:02.138Z","updated_at":"2014-07-15T17:17:02.138Z"}]}},{"easy-contact-forms-exporter":{"vulnerabilities":[{"id":88324,"title":"Easy Contact Forms Export 1.1.0 - Information Disclosure Vulnerability","exploitdb":"19013","created_at":"2014-07-15T17:17:02.183Z","updated_at":"2014-07-15T17:17:02.183Z"}]}},{"plugin-newsletter":{"vulnerabilities":[{"id":88325,"title":"Plugin Newsletter 1.5 - Remote File Disclosure Vulnerability","url":"http://packetstormsecurity.org/files/113413/","osvdb":"82703","cve":"2012-3588","secunia":"49464","exploitdb":"19018","created_at":"2014-07-15T17:17:02.232Z","updated_at":"2014-07-15T17:17:02.232Z"}]}},{"rbxgallery":{"vulnerabilities":[{"id":88326,"title":"RBX Gallery 2.1 - uploader.php File Upload PHP Code Execution","url":"http://packetstormsecurity.com/files/113414/,http://xforce.iss.net/xforce/xfdb/76170","osvdb":"82796","cve":"2012-3575","secunia":"49463","exploitdb":"19019","created_at":"2014-07-15T17:17:02.277Z","updated_at":"2014-07-15T17:17:02.277Z"}]}},{"simple-download-button-shortcode":{"vulnerabilities":[{"id":88327,"title":"Simple Download Button Shortcode 1.0 - Remote File Disclosure","exploitdb":"19020","created_at":"2014-07-15T17:17:02.325Z","updated_at":"2014-07-15T17:17:02.325Z"}]}},{"thinkun-remind":{"vulnerabilities":[{"id":88328,"title":"Thinkun Remind 1.1.3 - Remote File Disclosure","exploitdb":"19021","created_at":"2014-07-15T17:17:02.371Z","updated_at":"2014-07-15T17:17:02.371Z"}]}},{"tinymce-thumbnail-gallery":{"vulnerabilities":[{"id":88329,"title":"Tinymce Thumbnail Gallery 1.0.7 - download-image.php href Parameter Traversal Arbitrary File Access","url":"http://packetstormsecurity.org/files/113417/","osvdb":"82706","secunia":"49460","exploitdb":"19022","created_at":"2014-07-15T17:17:02.418Z","updated_at":"2014-07-15T17:17:02.418Z"}]}},{"wpstorecart":{"vulnerabilities":[{"id":88330,"title":"wpStoreCart 2.5.27-2.5.29 - Arbitrary File Upload","exploitdb":"19023","created_at":"2014-07-15T17:17:02.462Z","updated_at":"2014-07-15T17:17:02.462Z"}]}},{"gallery-plugin":{"vulnerabilities":[{"id":88331,"title":"Gallery 3.06 - gallery-plugin/upload/php.php File Upload PHP Code Execution","osvdb":"82661","exploitdb":"18998","created_at":"2014-07-15T17:17:02.507Z","updated_at":"2014-07-15T17:17:02.507Z"},{"id":88332,"title":"Gallery Plugin 3.8.3 - gallery-plugin.php filename_1 Parameter Arbitrary File Access","url":"http://packetstormsecurity.com/files/119458/,http://www.securityfocus.com/bid/57256,http://seclists.org/bugtraq/2013/Jan/45","osvdb":"89124","created_at":"2014-07-15T17:17:02.552Z","updated_at":"2014-07-15T17:17:02.552Z"}]}},{"font-uploader":{"vulnerabilities":[{"id":88333,"title":"Font Uploader 1.2.4 - Arbitrary File Upload","url":"http://www.securityfocus.com/bid/53853","osvdb":"82657","cve":"2012-3814","exploitdb":"18994","created_at":"2014-07-15T17:17:02.595Z","updated_at":"2014-07-15T17:17:02.595Z"}]}},{"wp-property":{"vulnerabilities":[{"id":88334,"title":"WP Property \u003c= 1.38.3.2 - Non-administrative User XMLI Remote Information Disclosure","osvdb":"102709","created_at":"2014-07-15T17:17:02.643Z","updated_at":"2014-07-15T17:17:02.643Z","fixed_in":"1.38.4"},{"id":88335,"title":"WP Property \u003c= 1.35.0 - Arbitrary File Upload","url":"http://packetstormsecurity.com/files/113274/","osvdb":"82656","secunia":"49394","exploitdb":"18987,23651","created_at":"2014-07-15T17:17:02.692Z","updated_at":"2014-07-15T17:17:02.692Z"}]}},{"wpmarketplace":{"vulnerabilities":[{"id":88336,"title":"WP Marketplace 1.5.0-1.6.1 - Arbitrary File Upload","exploitdb":"18988","created_at":"2014-07-15T17:17:02.736Z","updated_at":"2014-07-15T17:17:02.736Z"},{"id":88337,"title":"WP Marketplace 1.2.1 - File Enumeration Weakness and File Upload Vulnerabilities","url":"http://www.securityfocus.com/bid/52960","created_at":"2014-07-15T17:17:02.784Z","updated_at":"2014-07-15T17:17:02.784Z","fixed_in":"1.2.2"}]}},{"store-locator-le":{"vulnerabilities":[{"id":88338,"title":"Google Maps via Store Locator - Multiple Vulnerabilities","exploitdb":"18989","created_at":"2014-07-15T17:17:02.833Z","updated_at":"2014-07-15T17:17:02.833Z"},{"id":88339,"title":"store-locator-le - SQL Injection","secunia":"51757","created_at":"2014-07-15T17:17:02.881Z","updated_at":"2014-07-15T17:17:02.881Z","fixed_in":"3.8.7"}]}},{"html5avmanager":{"vulnerabilities":[{"id":88340,"title":"HTML5 AV Manager 0.2.7 - Arbitrary File Upload","url":"http://www.securityfocus.com/bid/53804","exploitdb":"18990","created_at":"2014-07-15T17:17:02.928Z","updated_at":"2014-07-15T17:17:02.928Z"}]}},{"foxypress":{"vulnerabilities":[{"id":88341,"title":"Foxypress 0.4.1.1-0.4.2.1 - Arbitrary File Upload","url":"http://packetstormsecurity.com/files/113576/,http://www.securityfocus.com/bid/53805","exploitdb":"18991,19100","created_at":"2014-07-15T17:17:02.976Z","updated_at":"2014-07-15T17:17:02.976Z"},{"id":88342,"title":"FoxyPress 0.4.2.5 - XSS, CSRF, SQL Injection","url":"http://packetstormsecurity.com/files/117768/","secunia":"51109","created_at":"2014-07-15T17:17:03.023Z","updated_at":"2014-07-15T17:17:03.023Z"},{"id":88343,"title":"FoxyPress 0.4.2.5 - documenthandler.php prefix Parameter SQL Injection","url":"http://xforce.iss.net/xforce/xfdb/79698","osvdb":"86804","exploitdb":"22374","created_at":"2014-07-15T17:17:03.068Z","updated_at":"2014-07-15T17:17:03.068Z"},{"id":88344,"title":"FoxyPress 0.4.2.5 - foxypress-manage-emails.php id Parameter SQL Injection","url":"http://xforce.iss.net/xforce/xfdb/79697","osvdb":"86805","exploitdb":"22374","created_at":"2014-07-15T17:17:03.125Z","updated_at":"2014-07-15T17:17:03.125Z"},{"id":88345,"title":"FoxyPress 0.4.2.5 - inventory-category.php Multiple Parameter SQL Injection","url":"http://xforce.iss.net/xforce/xfdb/79697","osvdb":"86806","exploitdb":"22374","created_at":"2014-07-15T17:17:03.173Z","updated_at":"2014-07-15T17:17:03.173Z"},{"id":88346,"title":"FoxyPress 0.4.2.5 - reports.php Multiple Parameter XSS","url":"http://xforce.iss.net/xforce/xfdb/79699","osvdb":"86807","exploitdb":"22374","created_at":"2014-07-15T17:17:03.219Z","updated_at":"2014-07-15T17:17:03.219Z"},{"id":88347,"title":"FoxyPress 0.4.2.5 - foxypress-affiliate.php aff_id Parameter XSS","url":"http://xforce.iss.net/xforce/xfdb/79699","osvdb":"86808","exploitdb":"22374","created_at":"2014-07-15T17:17:03.269Z","updated_at":"2014-07-15T17:17:03.269Z"},{"id":88348,"title":"FoxyPress 0.4.2.5 - affiliate-management.php Multiple Parameter SQL Injection","url":"http://xforce.iss.net/xforce/xfdb/79697","osvdb":"86809","exploitdb":"22374","created_at":"2014-07-15T17:17:03.319Z","updated_at":"2014-07-15T17:17:03.319Z"},{"id":88349,"title":"FoxyPress 0.4.2.5 - foxypress-manage-emails.php id Parameter XSS","url":"http://xforce.iss.net/xforce/xfdb/79699","osvdb":"86810","exploitdb":"22374","created_at":"2014-07-15T17:17:03.365Z","updated_at":"2014-07-15T17:17:03.365Z"},{"id":88350,"title":"FoxyPress 0.4.2.5 - order-management.php status Parameter XSS","url":"http://xforce.iss.net/xforce/xfdb/79699","osvdb":"86811","exploitdb":"22374","created_at":"2014-07-15T17:17:03.414Z","updated_at":"2014-07-15T17:17:03.414Z"},{"id":88351,"title":"FoxyPress 0.4.2.5 - affiliate-management.php page Parameter XSS","url":"http://xforce.iss.net/xforce/xfdb/79699","osvdb":"86812","exploitdb":"22374","created_at":"2014-07-15T17:17:03.462Z","updated_at":"2014-07-15T17:17:03.462Z"},{"id":88352,"title":"FoxyPress 0.4.2.5 - foxypress-affiliate.php url Parameter Arbitrary Site Redirect","url":"http://xforce.iss.net/xforce/xfdb/79700","osvdb":"86813","exploitdb":"22374","created_at":"2014-07-15T17:17:03.513Z","updated_at":"2014-07-15T17:17:03.513Z"},{"id":88353,"title":"FoxyPress 0.4.2.5 - Multiple CSV File Direct Request Information Disclosure","url":"http://xforce.iss.net/xforce/xfdb/79701","osvdb":"86814","exploitdb":"22374","created_at":"2014-07-15T17:17:03.560Z","updated_at":"2014-07-15T17:17:03.560Z"},{"id":88354,"title":"FoxyPress 0.4.2.5 - ajax.php Access Restriction Multiple Command Execution","url":"http://xforce.iss.net/xforce/xfdb/79703","osvdb":"86815","exploitdb":"22374","created_at":"2014-07-15T17:17:03.608Z","updated_at":"2014-07-15T17:17:03.608Z"},{"id":88355,"title":"FoxyPress 0.4.2.5 - Multiple Script Direct Request Path Disclosure","url":"http://xforce.iss.net/xforce/xfdb/79704","osvdb":"86816","exploitdb":"22374","created_at":"2014-07-15T17:17:03.657Z","updated_at":"2014-07-15T17:17:03.657Z"},{"id":88356,"title":"FoxyPress 0.4.2.5 - Multiple Object Deletion CSRF","url":"http://xforce.iss.net/xforce/xfdb/79702","osvdb":"86817","exploitdb":"22374","created_at":"2014-07-15T17:17:03.704Z","updated_at":"2014-07-15T17:17:03.704Z"},{"id":88357,"title":"FoxyPress 0.4.2.5 - documenthandler.php File Upload Arbitrary Code Execution","url":"http://xforce.iss.net/xforce/xfdb/79697","osvdb":"86818","exploitdb":"22374","created_at":"2014-07-15T17:17:03.749Z","updated_at":"2014-07-15T17:17:03.749Z"}]}},{"track-that-stat":{"vulnerabilities":[{"id":88358,"title":"Track That Stat \u003c= 1.0.8 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112722/,http://www.securityfocus.com/bid/53551","created_at":"2014-07-15T17:17:03.794Z","updated_at":"2014-07-15T17:17:03.794Z"}]}},{"wp-facethumb":{"vulnerabilities":[{"id":88359,"title":"WP-Facethumb Gallery \u003c= 0.1 - Reflected Cross Site Scripting","url":"http://packetstormsecurity.com/files/112658/","created_at":"2014-07-15T17:17:03.841Z","updated_at":"2014-07-15T17:17:03.841Z"}]}},{"wp-survey-and-quiz-tool":{"vulnerabilities":[{"id":88360,"title":"Survey And Quiz Tool \u003c= 2.9.2 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112685/","created_at":"2014-07-15T17:17:03.885Z","updated_at":"2014-07-15T17:17:03.885Z"}]}},{"wp-statistics":{"vulnerabilities":[{"id":88361,"title":"WP Statistics \u003c= 2.2.4 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112686/","created_at":"2014-07-15T17:17:03.931Z","updated_at":"2014-07-15T17:17:03.931Z"}]}},{"wp-easy-gallery":{"vulnerabilities":[{"id":88362,"title":"WP Easy Gallery \u003c= 2.7 - CSRF","url":"https://plugins.trac.wordpress.org/changeset?reponame=\u0026old=669527@wp-easy-gallery\u0026new=669527@wp-easy-gallery","secunia":"49190","created_at":"2014-07-15T17:17:03.977Z","updated_at":"2014-07-15T17:17:03.977Z","fixed_in":"2.7.3"},{"id":88363,"title":"WP Easy Gallery 2.7 - admin/overview.php galleryId Parameter SQL Injection","osvdb":"105012","created_at":"2014-07-15T17:17:04.022Z","updated_at":"2014-07-15T17:17:04.022Z","fixed_in":"2.7.1"},{"id":88364,"title":"WP Easy Gallery 2.7 - admin/add-images.php Multiple Parameter SQL Injection","osvdb":"105013","created_at":"2014-07-15T17:17:04.071Z","updated_at":"2014-07-15T17:17:04.071Z","fixed_in":"2.7.1"},{"id":88365,"title":"WP Easy Gallery 2.7 - Multiple Admin Function CSRF","osvdb":"105014","created_at":"2014-07-15T17:17:04.116Z","updated_at":"2014-07-15T17:17:04.116Z","fixed_in":"2.7.1"},{"id":88366,"title":"WP Easy Gallery \u003c= 1.7 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112687/","secunia":"49190","created_at":"2014-07-15T17:17:04.161Z","updated_at":"2014-07-15T17:17:04.161Z","fixed_in":"2.7.3"}]}},{"subscribe2":{"vulnerabilities":[{"id":88367,"title":"Subscribe2 \u003c= 8.0 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112688/,http://www.securityfocus.com/bid/53538","secunia":"49189","created_at":"2014-07-15T17:17:04.208Z","updated_at":"2014-07-15T17:17:04.208Z","fixed_in":"8.1"}]}},{"soundcloud-is-gold":{"vulnerabilities":[{"id":88368,"title":"Soundcloud Is Gold \u003c= 2.1 - 'action' Parameter Cross Site Scripting Vulnerability","url":"http://packetstormsecurity.com/files/112689/,http://www.securityfocus.com/bid/53537","cve":"2012-6624","secunia":"49188","created_at":"2014-07-15T17:17:04.253Z","updated_at":"2014-07-15T17:17:04.253Z"}]}},{"sharebar":{"vulnerabilities":[{"id":88369,"title":"Sharebar \u003c= 1.2.5 - sharebar-admin.php page Parameter XSS","url":"http://packetstormsecurity.com/files/123365/","osvdb":"98078","created_at":"2014-07-15T17:17:04.302Z","updated_at":"2014-07-15T17:17:04.302Z"},{"id":88370,"title":"Sharebar \u003c= 1.2.5 - Button Manipulation CSRF","url":"http://www.securityfocus.com/bid/60956","osvdb":"94843","cve":"2013-3491","secunia":"52948","created_at":"2014-07-15T17:17:04.349Z","updated_at":"2014-07-15T17:17:04.349Z"},{"id":88371,"title":"Sharebar 1.2.3 - wp-admin/options-general.php status Parameter XSS","osvdb":"81465","secunia":"48908","created_at":"2014-07-15T17:17:04.395Z","updated_at":"2014-07-15T17:17:04.395Z"},{"id":88372,"title":"Sharebar \u003c= 1.2.1 - SQL Injection / Cross Site Scripting","url":"http://packetstormsecurity.com/files/112690/","created_at":"2014-07-15T17:17:04.441Z","updated_at":"2014-07-15T17:17:04.441Z","fixed_in":"1.2.2"}]}},{"share-and-follow":{"vulnerabilities":[{"id":88373,"title":"Share And Follow \u003c= 1.80.3 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112691/","created_at":"2014-07-15T17:17:04.489Z","updated_at":"2014-07-15T17:17:04.489Z"}]}},{"sabre":{"vulnerabilities":[{"id":88374,"title":"SABRE \u003c= 1.2.0 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112692/","created_at":"2014-07-15T17:17:04.533Z","updated_at":"2014-07-15T17:17:04.533Z"}]}},{"pretty-link":{"vulnerabilities":[{"id":88375,"title":"Pretty Link Lite \u003c= 1.5.2 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112693/","created_at":"2014-07-15T17:17:04.578Z","updated_at":"2014-07-15T17:17:04.578Z"},{"id":88376,"title":"Pretty Link Lite \u003c= 1.6.1 - Cross Site Scripting","secunia":"50980","created_at":"2014-07-15T17:17:04.622Z","updated_at":"2014-07-15T17:17:04.622Z"},{"id":88377,"title":"pretty-link - XSS in SWF","url":"http://seclists.org/bugtraq/2013/Feb/100,http://packetstormsecurity.com/files/120433/","cve":"2013-1636","created_at":"2014-07-15T17:17:04.667Z","updated_at":"2014-07-15T17:17:04.667Z"}]}},{"newsletter-manager":{"vulnerabilities":[{"id":88378,"title":"Newsletter Manager \u003c= 1.0.2 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112694/","cve":"2012-6628","secunia":"49183","created_at":"2014-07-15T17:17:04.714Z","updated_at":"2014-07-15T17:17:04.714Z","fixed_in":"1.0.2"},{"id":88379,"title":"Newsletter Manager 1.0.2 - Cross Site Scripting \u0026 Cross-Site Request Forgery","cve":"2012-6627,2012-6629","secunia":"49152","created_at":"2014-07-15T17:17:04.761Z","updated_at":"2014-07-15T17:17:04.761Z"}]}},{"network-publisher":{"vulnerabilities":[{"id":88380,"title":"Network Publisher \u003c= 5.0.1 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112695/","created_at":"2014-07-15T17:17:04.805Z","updated_at":"2014-07-15T17:17:04.805Z"}]}},{"leaguemanager":{"vulnerabilities":[{"id":88381,"title":"LeagueManager \u003c= 3.7 - wp-admin/admin.php Multiple Parameter XSS","url":"http://packetstormsecurity.com/files/112698/,http://www.securityfocus.com/bid/53525,http://xforce.iss.net/xforce/xfdb/75629","osvdb":"82266","secunia":"49949","created_at":"2014-07-15T17:17:04.849Z","updated_at":"2014-07-15T17:17:04.849Z"},{"id":88382,"title":"LeagueManager 3.8 - SQL Injection","osvdb":"91442","cve":"2013-1852","exploitdb":"24789","created_at":"2014-07-15T17:17:04.896Z","updated_at":"2014-07-15T17:17:04.896Z"}]}},{"leaflet":{"vulnerabilities":[{"id":88383,"title":"Leaflet \u003c= 0.0.1 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112699/","created_at":"2014-07-15T17:17:04.942Z","updated_at":"2014-07-15T17:17:04.942Z"}]}},{"joliprint":{"vulnerabilities":[{"id":88384,"title":"PDF And Print Button Joliprint \u003c= 1.3.0 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112700/","created_at":"2014-07-15T17:17:04.989Z","updated_at":"2014-07-15T17:17:04.989Z"}]}},{"iframe-admin-pages":{"vulnerabilities":[{"id":88385,"title":"IFrame Admin Pages \u003c= 0.1 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112701/","created_at":"2014-07-15T17:17:05.034Z","updated_at":"2014-07-15T17:17:05.034Z"}]}},{"ezpz-one-click-backup":{"vulnerabilities":[{"id":88386,"title":"EZPZ One Click Backup \u003c= 12.03.10 - OS Command Injection","url":"http://www.openwall.com/lists/oss-security/2014/05/01/11","osvdb":"106511","cve":"2014-3114","created_at":"2014-07-15T17:17:05.086Z","updated_at":"2014-07-15T17:17:05.086Z"},{"id":88387,"title":"EZPZ One Click Backup \u003c= 12.03.10 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112705/","created_at":"2014-07-15T17:17:05.131Z","updated_at":"2014-07-15T17:17:05.131Z"}]}},{"dynamic-widgets":{"vulnerabilities":[{"id":88388,"title":"Dynamic Widgets \u003c= 1.5.1 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112706/","created_at":"2014-07-15T17:17:05.178Z","updated_at":"2014-07-15T17:17:05.178Z"}]}},{"download-monitor":{"vulnerabilities":[{"id":88389,"title":"Download Monitor \u003c= 3.3.6.1 - wp-admin/admin.php Multiple Parameter XSS (Note: This plugin changed its version numbering, this may produce false positive)","url":"http://www.securityfocus.com/bid/61407,http://xforce.iss.net/xforce/xfdb/85921","osvdb":"95613","cve":"2013-5098,2013-3262","secunia":"53116","created_at":"2014-07-15T17:17:05.226Z","updated_at":"2014-07-15T17:17:05.226Z","fixed_in":"3.3.6.2"},{"id":88390,"title":"Download Monitor \u003c= 3.3.5.7 - index.php dlsearch Parameter XSS (Note: This plugin changed its version numbering, this may produce false positive)","url":"http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html","osvdb":"85319","cve":"2012-4768","secunia":"50511","created_at":"2014-07-15T17:17:05.270Z","updated_at":"2014-07-15T17:17:05.270Z","fixed_in":"3.3.5.9"},{"id":88391,"title":"Download Monitor \u003c= 3.3.5.4 - Cross Site Scripting (Note: This plugin changed its version numbering, this may produce false positive)","url":"http://packetstormsecurity.com/files/112707/","created_at":"2014-07-15T17:17:05.316Z","updated_at":"2014-07-15T17:17:05.316Z"},{"id":88392,"title":"Download Monitor 2.0.6 - wp-download_monitor/download.php id Parameter SQL Injection (Note: This plugin changed its version numbering, this may produce false positive)","osvdb":"44616","cve":"2008-2034","secunia":"29876","created_at":"2014-07-15T17:17:05.362Z","updated_at":"2014-07-15T17:17:05.362Z","fixed_in":"2.0.8"}]}},{"download-manager":{"vulnerabilities":[{"id":88393,"title":"Download Manager 2.5.8 - Download Package file Parameter Stored XSS","url":"http://www.securityfocus.com/bid/64159","osvdb":"101143","cve":"2013-7319","secunia":"55969","created_at":"2014-07-15T17:17:05.407Z","updated_at":"2014-07-15T17:17:05.407Z","fixed_in":"2.5.9"},{"id":88394,"title":"Download Manager \u003c= 2.2.2 - admin.php cid Parameter XSS","url":"http://packetstormsecurity.com/files/112708/","osvdb":"81449","secunia":"48927","created_at":"2014-07-15T17:17:05.452Z","updated_at":"2014-07-15T17:17:05.452Z","fixed_in":"2.2.3"}]}},{"codestyling-localization":{"vulnerabilities":[{"id":88395,"title":"Code Styling Localization \u003c= 1.99.17 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112709/","secunia":"49037","created_at":"2014-07-15T17:17:05.499Z","updated_at":"2014-07-15T17:17:05.499Z","fixed_in":"1.99.20"}]}},{"catablog":{"vulnerabilities":[{"id":88396,"title":"Catablog \u003c= 1.6 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112619/","created_at":"2014-07-15T17:17:05.549Z","updated_at":"2014-07-15T17:17:05.549Z"}]}},{"bad-behavior":{"vulnerabilities":[{"id":88397,"title":"Bad Behavior \u003c= 2.24 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112619/","created_at":"2014-07-15T17:17:05.595Z","updated_at":"2014-07-15T17:17:05.595Z"}]}},{"bulletproof-security":{"vulnerabilities":[{"id":88398,"title":"BulletProof Security \u003c= 0.47 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112618/","created_at":"2014-07-15T17:17:05.650Z","updated_at":"2014-07-15T17:17:05.650Z"},{"id":88399,"title":"BulletProof Security - Security Log Script Insertion Vulnerability","osvdb":"95928,95929,95930","cve":"2013-3487","secunia":"53614","created_at":"2014-07-15T17:17:05.695Z","updated_at":"2014-07-15T17:17:05.695Z","fixed_in":"0.49"}]}},{"better-wp-security":{"vulnerabilities":[{"id":88400,"title":"Better WP Security 3.6.3 - Online Backup Storage current_time Function Brute Force Disclosure","url":"http://packetstormsecurity.com/files/125219/","osvdb":"103358","created_at":"2014-07-15T17:17:05.741Z","updated_at":"2014-07-15T17:17:05.741Z"},{"id":88401,"title":"Better WP Security 3.6.3 - /wp-admin/admin-ajax.php license Parameter Stored XSS Weakness","url":"http://packetstormsecurity.com/files/125219/","osvdb":"103357","created_at":"2014-07-15T17:17:05.785Z","updated_at":"2014-07-15T17:17:05.785Z"},{"id":88402,"title":"Better WP Security 3.5.5 - inc/admin/content.php id_specialfile Parameter Stored XSS","osvdb":"101788","created_at":"2014-07-15T17:17:05.833Z","updated_at":"2014-07-15T17:17:05.833Z","fixed_in":"3.5.6"},{"id":88403,"title":"Better WP Security \u003c= 3.5.3 - inc/secure.php logevent Function URL Handling Stored XSS","url":"http://packetstormsecurity.com/files/122615/,https://github.com/wpscanteam/wpscan/issues/251,http://www.securityfocus.com/archive/1/527634/30/0/threaded","osvdb":"95884","secunia":"54299","exploitdb":"27290","created_at":"2014-07-15T17:17:05.878Z","updated_at":"2014-07-15T17:17:05.878Z","fixed_in":"3.5.4"},{"id":88404,"title":"Better WP Security 3.4.3 - Multiple XSS","url":"http://seclists.org/bugtraq/2012/Oct/9","created_at":"2014-07-15T17:17:05.922Z","updated_at":"2014-07-15T17:17:05.922Z","fixed_in":"3.4.4"},{"id":88405,"title":"Better WP Security \u003c= 3.2.4 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112617/","created_at":"2014-07-15T17:17:05.968Z","updated_at":"2014-07-15T17:17:05.968Z","fixed_in":"3.2.5"}]}},{"custom-contact-forms":{"vulnerabilities":[{"id":88406,"title":"Custom Contact Forms \u003c= 5.0.0.1 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112616/","created_at":"2014-07-15T17:17:06.012Z","updated_at":"2014-07-15T17:17:06.012Z"}]}},{"2-click-socialmedia-button":{"vulnerabilities":[{"id":88407,"title":"2-Click-Socialmedia-Buttons \u003c= 0.34 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112615/","created_at":"2014-07-15T17:17:06.060Z","updated_at":"2014-07-15T17:17:06.060Z"},{"id":88408,"title":"2-Click-Socialmedia-Buttons \u003c= 0.32.2 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112711/","secunia":"49181","created_at":"2014-07-15T17:17:06.104Z","updated_at":"2014-07-15T17:17:06.104Z","fixed_in":"0.35"}]}},{"login-with-ajax":{"vulnerabilities":[{"id":88409,"title":"Login With Ajax - Cross Site Scripting","secunia":"49013","created_at":"2014-07-15T17:17:06.149Z","updated_at":"2014-07-15T17:17:06.149Z","fixed_in":"3.0.4.1"},{"id":88410,"title":"Login With Ajax - Cross-Site Request Forgery Vulnerability","osvdb":"93031","cve":"2013-2707","secunia":"52950","created_at":"2014-07-15T17:17:06.194Z","updated_at":"2014-07-15T17:17:06.194Z","fixed_in":"3.1"}]}},{"media-library-categories":{"vulnerabilities":[{"id":88411,"title":"Media Library Categories \u003c= 1.0.6 - SQL Injection Vulnerability","exploitdb":"17628","created_at":"2014-07-15T17:17:06.240Z","updated_at":"2014-07-15T17:17:06.240Z"},{"id":88412,"title":"Media Library Categories \u003c= 1.1.1 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112697/","cve":"2012-6630","created_at":"2014-07-15T17:17:06.284Z","updated_at":"2014-07-15T17:17:06.284Z"}]}},{"deans-fckeditor-with-pwwangs-code-plugin-for-wordpress":{"vulnerabilities":[{"id":88413,"title":"FCKeditor Deans With Pwwangs Code \u003c= 1.0.0 - Remote Shell Upload","url":"http://packetstormsecurity.com/files/111319/","created_at":"2014-07-15T17:17:06.329Z","updated_at":"2014-07-15T17:17:06.329Z"}]}},{"zingiri-web-shop":{"vulnerabilities":[{"id":88414,"title":"Zingiri Web Shop 2.6.5 - fwkfor/ajax/uploadfilexd.php Unspecified Issue","osvdb":"103554","created_at":"2014-07-15T17:17:06.376Z","updated_at":"2014-07-15T17:17:06.376Z","fixed_in":"2.6.6"},{"id":88415,"title":"Zingiri Web Shop 2.6.4 - mform.php Unspecified Issue","osvdb":"101717","secunia":"56230","created_at":"2014-07-15T17:17:06.420Z","updated_at":"2014-07-15T17:17:06.420Z","fixed_in":"2.6.5"},{"id":88416,"title":"Zingiri Web Shop 2.5.0 - ajaxfilemanager.php path Parameter File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/118318/,http://www.securityfocus.com/bid/56659,http://xforce.iss.net/xforce/xfdb/80257","osvdb":"87833","created_at":"2014-07-15T17:17:06.464Z","updated_at":"2014-07-15T17:17:06.464Z"},{"id":88417,"title":"Zingiri Web Shop 2.4.3 - Shell Upload","url":"http://packetstormsecurity.com/files/113668/","created_at":"2014-07-15T17:17:06.518Z","updated_at":"2014-07-15T17:17:06.518Z"},{"id":88418,"title":"Zingiri Web Shop - Cookie SQL Injection Vulnerability","secunia":"49398","created_at":"2014-07-15T17:17:06.567Z","updated_at":"2014-07-15T17:17:06.567Z","fixed_in":"2.4.8"},{"id":88419,"title":"Zingiri Web Shop \u003c= 2.4.0 - zing.inc.php page Parameter XSS","url":"http://www.securityfocus.com/bid/53278,http://xforce.iss.net/xforce/xfdb/75178","osvdb":"81492","cve":"2012-6506","secunia":"48991","exploitdb":"18787","created_at":"2014-07-15T17:17:06.630Z","updated_at":"2014-07-15T17:17:06.630Z","fixed_in":"2.4.2"},{"id":88420,"title":"Zingiri Web Shop \u003c= 2.4.0 - onecheckout.php notes Parameter XSS","url":"http://www.securityfocus.com/bid/53278,http://xforce.iss.net/xforce/xfdb/75179","osvdb":"81493","cve":"2012-6506","secunia":"48991","exploitdb":"18787","created_at":"2014-07-15T17:17:06.687Z","updated_at":"2014-07-15T17:17:06.687Z","fixed_in":"2.4.2"},{"id":88421,"title":"Zingiri Web Shop \u003c= 2.3.5 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112684/","created_at":"2014-07-15T17:17:06.732Z","updated_at":"2014-07-15T17:17:06.732Z"}]}},{"organizer":{"vulnerabilities":[{"id":88422,"title":"Organizer 1.2.1 - Cross Site Scripting / Path Disclosure","url":"http://packetstormsecurity.com/files/112086/,http://packetstormsecurity.com/files/113800/","created_at":"2014-07-15T17:17:06.777Z","updated_at":"2014-07-15T17:17:06.777Z"}]}},{"zingiri-tickets":{"vulnerabilities":[{"id":88423,"title":"Zingiri Tickets 2.1.2 - Unspecified Issue","osvdb":"105015","created_at":"2014-07-15T17:17:06.821Z","updated_at":"2014-07-15T17:17:06.821Z","fixed_in":"2.1.3"},{"id":88424,"title":"Zingiri Tickets - File Disclosure","url":"http://packetstormsecurity.com/files/111904/","created_at":"2014-07-15T17:17:06.865Z","updated_at":"2014-07-15T17:17:06.865Z"}]}},{"cms-tree-page-view":{"vulnerabilities":[{"id":88425,"title":"CMS Tree Page View 1.2.4 - Page Creation CSRF","osvdb":"91270","secunia":"52581","created_at":"2014-07-15T17:17:06.909Z","updated_at":"2014-07-15T17:17:06.909Z","fixed_in":"1.2.5"},{"id":88426,"title":"CMS Tree Page View 0.8.8 - XSS vulnerability","url":"https://www.htbridge.com/advisory/HTB23083,http://www.securityfocus.com/bid/52708,http://xforce.iss.net/xforce/xfdb/74337","osvdb":"80573","secunia":"48510","created_at":"2014-07-15T17:17:06.954Z","updated_at":"2014-07-15T17:17:06.954Z","fixed_in":"0.8.9"}]}},{"all-in-one-event-calendar":{"vulnerabilities":[{"id":88427,"title":"All-in-One Event Calendar 1.4 - Multiple XSS vulnerabilities","url":"http://seclists.org/bugtraq/2012/Apr/70","created_at":"2014-07-15T17:17:07.007Z","updated_at":"2014-07-15T17:17:07.007Z"},{"id":88428,"title":"All-in-One Event Calendar 1.9 - wp-admin/post-new.php Multiple Parameter XSS","url":"http://www.firefart.net/sql-injection-and-xss-in-all-in-one-event-calendar-wordpress-plugin/","osvdb":"96271","secunia":"54038","created_at":"2014-07-15T17:17:07.051Z","updated_at":"2014-07-15T17:17:07.051Z","fixed_in":"1.10"},{"id":88429,"title":"All-in-One Event Calendar 1.9 - index.php Multiple Parameter SQL Injection","url":"http://www.firefart.net/sql-injection-and-xss-in-all-in-one-event-calendar-wordpress-plugin/","osvdb":"96272","secunia":"54038","created_at":"2014-07-15T17:17:07.096Z","updated_at":"2014-07-15T17:17:07.096Z","fixed_in":"1.10"}]}},{"buddypress":{"vulnerabilities":[{"id":88430,"title":"Buddypress \u003c= 1.9.1 - Crafted bp_new_group_id Cookie Arbitrary Group Manipulation","url":"http://packetstormsecurity.com/files/125213/","osvdb":"103308","cve":"2014-1889","secunia":"56950","exploitdb":"31571","created_at":"2014-07-15T17:17:07.146Z","updated_at":"2014-07-15T17:17:07.146Z","fixed_in":"1.9.2"},{"id":88431,"title":"Buddypress \u003c= 1.9.1 - groups/create/step/group-details/ Group Name Field Stored XSS","url":"http://packetstormsecurity.com/files/125212/","osvdb":"103307","cve":"2014-1888","secunia":"56950","created_at":"2014-07-15T17:17:07.194Z","updated_at":"2014-07-15T17:17:07.194Z","fixed_in":"1.9.2"},{"id":88432,"title":"BuddyPress 1.7.1 - bp-activity-classes.php Multiple Parameter SQL Injection","osvdb":"104761","created_at":"2014-07-15T17:17:07.239Z","updated_at":"2014-07-15T17:17:07.239Z","fixed_in":"1.7.2"},{"id":88433,"title":"BuddyPress 1.7.1 - bp-blogs-classes.php Multiple Parameter SQL Injection","osvdb":"104761","created_at":"2014-07-15T17:17:07.284Z","updated_at":"2014-07-15T17:17:07.284Z","fixed_in":"1.7.2"},{"id":88434,"title":"BuddyPress 1.7.1 - bp-friends/bp-friends-classes.php Multiple Parameter SQL Injection","osvdb":"104760","created_at":"2014-07-15T17:17:07.331Z","updated_at":"2014-07-15T17:17:07.331Z","fixed_in":"1.7.2"},{"id":88435,"title":"BuddyPress 1.7.1 - bp-core/bp-core-classes.php Multiple Parameter SQL Injection","osvdb":"104759","created_at":"2014-07-15T17:17:07.377Z","updated_at":"2014-07-15T17:17:07.377Z","fixed_in":"1.7.2"},{"id":88436,"title":"BuddyPress 1.7.1 - bp-core/bp-core-functions.php page_ids Parameter SQL Injection","osvdb":"104758","created_at":"2014-07-15T17:17:07.424Z","updated_at":"2014-07-15T17:17:07.424Z","fixed_in":"1.7.2"},{"id":88437,"title":"BuddyPress 1.7.1 - bp-core/bp-core-filters.php user_ids Parameter SQL Injection","osvdb":"104757","created_at":"2014-07-15T17:17:07.473Z","updated_at":"2014-07-15T17:17:07.473Z","fixed_in":"1.7.2"},{"id":88438,"title":"BuddyPress 1.7.1 - bp-core/bp-core-cache.php object_ids Parameter SQL Injection","osvdb":"104755","created_at":"2014-07-15T17:17:07.523Z","updated_at":"2014-07-15T17:17:07.523Z","fixed_in":"1.7.2"},{"id":88439,"title":"Buddypress - player.swf / jwplayer.swf playerready Parameter XSS","url":"http://packetstormsecurity.com/files/119020/,http://xforce.iss.net/xforce/xfdb/80840","osvdb":"88886","created_at":"2014-07-15T17:17:07.569Z","updated_at":"2014-07-15T17:17:07.569Z"},{"id":88440,"title":"Buddypress \u003c= 1.5.4 - wp-load.php exclude Parameter SQL Injection","osvdb":"80763","exploitdb":"18690","created_at":"2014-07-15T17:17:07.615Z","updated_at":"2014-07-15T17:17:07.615Z","fixed_in":"1.5.5"},{"id":88441,"title":"BuddyPress 1.2.9 - groups/test-group/activity/ activity_ids Parameter SQL Injection","osvdb":"104756","created_at":"2014-07-15T17:17:07.661Z","updated_at":"2014-07-15T17:17:07.661Z","fixed_in":"1.2.10"}]}},{"register-plus-redux":{"vulnerabilities":[{"id":88442,"title":"Register Plus Redux \u003c= 3.8.3 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/111367/","created_at":"2014-07-15T17:17:07.707Z","updated_at":"2014-07-15T17:17:07.707Z"}]}},{"magn-html5-drag-and-drop-media-uploader":{"vulnerabilities":[{"id":88443,"title":"Magn WP Drag and Drop \u003c= 1.1.4 - Upload Shell Upload Vulnerability","url":"http://packetstormsecurity.com/files/110103/","created_at":"2014-07-15T17:17:07.751Z","updated_at":"2014-07-15T17:17:07.751Z"}]}},{"kish-guest-posting":{"vulnerabilities":[{"id":88444,"title":"Kish Guest Posting 1.0 - Arbitrary File Upload","exploitdb":"18412","created_at":"2014-07-15T17:17:07.798Z","updated_at":"2014-07-15T17:17:07.798Z"}]}},{"allwebmenus-wordpress-menu-plugin":{"vulnerabilities":[{"id":88445,"title":"AllWebMenus Shell Upload \u003c= 1.1.9 - Shell Upload","url":"http://packetstormsecurity.com/files/108946/","created_at":"2014-07-15T17:17:07.843Z","updated_at":"2014-07-15T17:17:07.843Z"},{"id":88446,"title":"AllWebMenus 1.1.3 - Remote File Inclusion","exploitdb":"17861","created_at":"2014-07-15T17:17:07.889Z","updated_at":"2014-07-15T17:17:07.889Z"}]}},{"shortcode-redirect":{"vulnerabilities":[{"id":88447,"title":"Shortcode Redirect \u003c= 1.0.01 - Stored Cross Site Scripting","url":"http://packetstormsecurity.com/files/108914/","created_at":"2014-07-15T17:17:07.935Z","updated_at":"2014-07-15T17:17:07.935Z"}]}},{"ucan-post":{"vulnerabilities":[{"id":88448,"title":"uCan Post \u003c= 1.0.09 - Stored XSS","exploitdb":"18390","created_at":"2014-07-15T17:17:07.979Z","updated_at":"2014-07-15T17:17:07.979Z"}]}},{"wp-cycle-playlist":{"vulnerabilities":[{"id":88449,"title":"WP Cycle Playlist - Multiple Vulnerabilities","url":"http://1337day.com/exploit/17396","created_at":"2014-07-15T17:17:08.023Z","updated_at":"2014-07-15T17:17:08.023Z"}]}},{"myeasybackup":{"vulnerabilities":[{"id":88450,"title":"myEASYbackup 1.0.8.1 - Directory Traversal","url":"http://packetstormsecurity.com/files/108711/","created_at":"2014-07-15T17:17:08.068Z","updated_at":"2014-07-15T17:17:08.068Z"}]}},{"count-per-day":{"vulnerabilities":[{"id":88451,"title":"Count per Day 3.2.5 - wp-admin/index.php daytoshow Parameter XSS","url":"http://packetstormsecurity.com/files/120649/","osvdb":"90893","secunia":"52436","created_at":"2014-07-15T17:17:08.112Z","updated_at":"2014-07-15T17:17:08.112Z"},{"id":88452,"title":"Count per Day 3.2.5 - counter.php HTTP Referer Header XSS","url":"http://packetstormsecurity.com/files/120870/","osvdb":"91491","exploitdb":"24859","created_at":"2014-07-15T17:17:08.157Z","updated_at":"2014-07-15T17:17:08.157Z"},{"id":88453,"title":"Count Per Day 3.2.3 - notes.php Malformed Requests Remote DoS","url":"http://packetstormsecurity.com/files/120631/,http://seclists.org/fulldisclosure/2013/Mar/43","osvdb":"90833","created_at":"2014-07-15T17:17:08.201Z","updated_at":"2014-07-15T17:17:08.201Z"},{"id":88454,"title":"Count Per Day 3.2.3 - Multiple Script Direct Request Path Disclosure","url":"http://packetstormsecurity.com/files/120631/,http://seclists.org/fulldisclosure/2013/Mar/43","osvdb":"90832","created_at":"2014-07-15T17:17:08.247Z","updated_at":"2014-07-15T17:17:08.247Z"},{"id":88455,"title":"Count Per Day 3.2.3 - notes.php note Parameter XSS","url":"http://packetstormsecurity.com/files/115904/","osvdb":"84933","secunia":"50450","exploitdb":"20862","created_at":"2014-07-15T17:17:08.294Z","updated_at":"2014-07-15T17:17:08.294Z"},{"id":88456,"title":"Count Per Day 3.2.2 - notes.php note Parameter XSS","osvdb":"84920","secunia":"50419","created_at":"2014-07-15T17:17:08.339Z","updated_at":"2014-07-15T17:17:08.339Z","fixed_in":"3.2.3"},{"id":88457,"title":"Count Per Day 3.1.1 - userperspan.php Multiple Parameter XSS","url":"http://packetstormsecurity.com/files/114787/,http://www.securityfocus.com/bid/54258","osvdb":"83491","cve":"2012-3434","secunia":"49692","created_at":"2014-07-15T17:17:08.384Z","updated_at":"2014-07-15T17:17:08.384Z","fixed_in":"3.2"},{"id":88458,"title":"Count Per Day \u003c= 3.1 - download.php f Parameter Traversal Arbitrary File Access","url":"http://xforce.iss.net/xforce/xfdb/72385,http://packetstormsecurity.org/files/108631/","osvdb":"78270","secunia":"47529","exploitdb":"18355","created_at":"2014-07-15T17:17:08.428Z","updated_at":"2014-07-15T17:17:08.428Z","fixed_in":"3.1.1"},{"id":88459,"title":"Count Per Day \u003c= 3.1 - map.php map Parameter XSS","url":"http://xforce.iss.net/xforce/xfdb/72385,http://packetstormsecurity.org/files/108631/","osvdb":"78271","secunia":"47529","exploitdb":"18355","created_at":"2014-07-15T17:17:08.473Z","updated_at":"2014-07-15T17:17:08.473Z","fixed_in":"3.1.1"},{"id":88460,"title":"Count per Day \u003c= 2.17 - SQL Injection Vulnerability","osvdb":"75598","secunia":"46051","exploitdb":"17857","created_at":"2014-07-15T17:17:08.523Z","updated_at":"2014-07-15T17:17:08.523Z","fixed_in":"3.0"}]}},{"wp-autoyoutube":{"vulnerabilities":[{"id":88461,"title":"WP-AutoYoutube \u003c= 0.1 - Blind SQL Injection Vulnerability","url":"http://1337day.com/exploit/17368","created_at":"2014-07-15T17:17:08.570Z","updated_at":"2014-07-15T17:17:08.570Z"}]}},{"age-verification":{"vulnerabilities":[{"id":88462,"title":"Age Verification \u003c= 0.4 - Open Redirect","exploitdb":"18350","created_at":"2014-07-15T17:17:08.618Z","updated_at":"2014-07-15T17:17:08.618Z"}]}},{"yousaytoo-auto-publishing-plugin":{"vulnerabilities":[{"id":88463,"title":"Yousaytoo Auto Publishing \u003c= 1.0 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/108470/","created_at":"2014-07-15T17:17:08.666Z","updated_at":"2014-07-15T17:17:08.666Z"}]}},{"pay-with-tweet":{"vulnerabilities":[{"id":88464,"title":"Pay With Tweet \u003c= 1.1 - Multiple Vulnerabilities","exploitdb":"18330","created_at":"2014-07-15T17:17:08.712Z","updated_at":"2014-07-15T17:17:08.712Z"}]}},{"wp-whois":{"vulnerabilities":[{"id":88465,"title":"Whois Search \u003c= 1.4.2 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/108271/","created_at":"2014-07-15T17:17:08.775Z","updated_at":"2014-07-15T17:17:08.775Z"}]}},{"upm-polls":{"vulnerabilities":[{"id":88466,"title":"UPM-POLLS 1.0.4 - BLIND SQL injection","exploitdb":"18231","created_at":"2014-07-15T17:17:08.834Z","updated_at":"2014-07-15T17:17:08.834Z"}]}},{"disqus-comment-system":{"vulnerabilities":[{"id":88467,"title":"Disqus \u003c= 2.75 - Remote Code Execution Vuln","url":"http://blog.sucuri.net/2014/06/anatomy-of-a-remote-code-execution-bug-on-disqus.html","created_at":"2014-07-15T17:17:08.880Z","updated_at":"2014-07-15T17:17:08.880Z","fixed_in":"2.76"},{"id":88468,"title":"Disqus Comment System \u003c= 2.68 - Reflected Cross-Site Scripting (XSS)","url":"http://www.ethicalhack3r.co.uk/security/wordpress-plugin-disqus-comment-system-xss/","created_at":"2014-07-15T17:17:08.937Z","updated_at":"2014-07-15T17:17:08.937Z","fixed_in":"2.69"},{"id":88469,"title":"Disqus Blog Comments - Blind SQL Injection Vulnerability","osvdb":"85935","exploitdb":"20913","created_at":"2014-07-15T17:17:08.985Z","updated_at":"2014-07-15T17:17:08.985Z"}]}},{"wp-recaptcha":{"vulnerabilities":[{"id":88470,"title":"Google reCAPTCHA \u003c= 3.1.3 - Reflected XSS Vulnerability","url":"http://security-sh3ll.blogspot.com/2011/12/google-recaptcha-wordpress-plugin.html","created_at":"2014-07-15T17:17:09.030Z","updated_at":"2014-07-15T17:17:09.030Z","fixed_in":"3.1.4"}]}},{"link-library":{"vulnerabilities":[{"id":88471,"title":"Link Library 5.8.0.9 - Multiple Unspecified Issues","osvdb":"102842","created_at":"2014-07-15T17:17:09.075Z","updated_at":"2014-07-15T17:17:09.075Z","fixed_in":"5.8.1"},{"id":88472,"title":"Link Library 5.1.6 - link-library-ajax.php Multiple Parameter SQL Injection","osvdb":"102804","created_at":"2014-07-15T17:17:09.119Z","updated_at":"2014-07-15T17:17:09.119Z","fixed_in":"5.1.7"},{"id":88473,"title":"Link Library 5.0.8 - wp-content/plugins/link-library/tracker.php id Parameter XSS","osvdb":"74561","secunia":"45588","created_at":"2014-07-15T17:17:09.167Z","updated_at":"2014-07-15T17:17:09.167Z","fixed_in":"5.0.9"},{"id":88474,"title":"Link Library 5.0.8 - wp-content/plugins/link-library/tracker.php id Parameter SQL Injection","osvdb":"74562","secunia":"45588","created_at":"2014-07-15T17:17:09.212Z","updated_at":"2014-07-15T17:17:09.212Z","fixed_in":"5.0.9"},{"id":88475,"title":"Link Library \u003c= 5.2.1 - SQL Injection","osvdb":"84579","exploitdb":"17887","created_at":"2014-07-15T17:17:09.259Z","updated_at":"2014-07-15T17:17:09.259Z","fixed_in":"5.7.9.7"}]}},{"cevhershare":{"vulnerabilities":[{"id":88476,"title":"CevherShare 2.0 - SQL Injection Vulnerability","exploitdb":"17891","created_at":"2014-07-15T17:17:09.304Z","updated_at":"2014-07-15T17:17:09.304Z"}]}},{"meenews":{"vulnerabilities":[{"id":88477,"title":"meenews 5.1 - Cross-Site Scripting Vulnerabilities","url":"http://seclists.org/bugtraq/2011/Nov/151","created_at":"2014-07-15T17:17:09.350Z","updated_at":"2014-07-15T17:17:09.350Z"}]}},{"clickdesk-live-support-chat":{"vulnerabilities":[{"id":88478,"title":"Click Desk Live Support Chat - Cross Site Scripting Vulnerability","url":"http://seclists.org/bugtraq/2011/Nov/148","created_at":"2014-07-15T17:17:09.396Z","updated_at":"2014-07-15T17:17:09.396Z","fixed_in":"2.0"}]}},{"adminimize":{"vulnerabilities":[{"id":88479,"title":"adminimize 1.7.21 - 'page' Parameter Cross Site Scripting Vulnerability","url":"http://www.securityfocus.com/bid/50745,http://seclists.org/bugtraq/2011/Nov/135","cve":"2011-4926","created_at":"2014-07-15T17:17:09.441Z","updated_at":"2014-07-15T17:17:09.441Z","fixed_in":"1.7.22"}]}},{"advanced-text-widget":{"vulnerabilities":[{"id":88480,"title":"Advanced Text Widget \u003c= 2.0.0 - Cross Site Scripting Vulnerability","url":"http://seclists.org/bugtraq/2011/Nov/133","created_at":"2014-07-15T17:17:09.486Z","updated_at":"2014-07-15T17:17:09.486Z"}]}},{"mm-duplicate":{"vulnerabilities":[{"id":88481,"title":"MM Duplicate \u003c= 1.2 - SQL Injection Vulnerability","exploitdb":"17707","created_at":"2014-07-15T17:17:09.536Z","updated_at":"2014-07-15T17:17:09.536Z"}]}},{"wp-menu-creator":{"vulnerabilities":[{"id":88482,"title":"Menu Creator \u003c= 1.1.7 - SQL Injection Vulnerability","exploitdb":"17689","created_at":"2014-07-15T17:17:09.581Z","updated_at":"2014-07-15T17:17:09.581Z"}]}},{"allow-php-in-posts-and-pages":{"vulnerabilities":[{"id":88483,"title":"Allow PHP in Posts and Pages \u003c= 2.0.0.RC2 - SQL Injection Vulnerability","exploitdb":"17688","created_at":"2014-07-15T17:17:09.627Z","updated_at":"2014-07-15T17:17:09.627Z","fixed_in":"2.1.0"}]}},{"global-content-blocks":{"vulnerabilities":[{"id":88484,"title":"Global Content Blocks \u003c= 1.2 - SQL Injection Vulnerability","exploitdb":"17687","created_at":"2014-07-15T17:17:09.673Z","updated_at":"2014-07-15T17:17:09.673Z"}]}},{"ajaxgallery":{"vulnerabilities":[{"id":88485,"title":"Ajax Gallery \u003c= 3.0 - SQL Injection Vulnerability","exploitdb":"17686","created_at":"2014-07-15T17:17:09.717Z","updated_at":"2014-07-15T17:17:09.717Z"}]}},{"wp-ds-faq":{"vulnerabilities":[{"id":88486,"title":"WP DS FAQ \u003c= 1.3.2 - ajax.php id Parameter SQL Injection","osvdb":"74574","secunia":"45640","exploitdb":"17683","created_at":"2014-07-15T17:17:09.765Z","updated_at":"2014-07-15T17:17:09.765Z"}]}},{"wp-ds-faq-plus":{"vulnerabilities":[{"id":88487,"title":"WP DS FAQ Plus 1.0.12 - Multiple Unspecified Issues","osvdb":"106614","created_at":"2014-07-15T17:17:09.809Z","updated_at":"2014-07-15T17:17:09.809Z","fixed_in":"1.0.13"},{"id":88488,"title":"WP DS FAQ Plus 1.0.11 - Multiple Unspecified Issues","osvdb":"106615","created_at":"2014-07-15T17:17:09.855Z","updated_at":"2014-07-15T17:17:09.855Z","fixed_in":"1.0.12"},{"id":88489,"title":"WP DS FAQ Plus 1.0.3 - Multiple Unspecified CSRF","osvdb":"106618","created_at":"2014-07-15T17:17:09.899Z","updated_at":"2014-07-15T17:17:09.899Z","fixed_in":"1.0.3"},{"id":88490,"title":"WP DS FAQ Plus - Unspecified SQL Injection","osvdb":"106724","created_at":"2014-07-15T17:17:09.944Z","updated_at":"2014-07-15T17:17:09.944Z","fixed_in":"1.0.0"}]}},{"odihost-newsletter-plugin":{"vulnerabilities":[{"id":88491,"title":"OdiHost Newsletter \u003c= 1.0 - SQL Injection Vulnerability","exploitdb":"17681","created_at":"2014-07-15T17:17:09.992Z","updated_at":"2014-07-15T17:17:09.992Z"}]}},{"easy-contact-form-lite":{"vulnerabilities":[{"id":88492,"title":"Easy Contact Form Lite \u003c= 1.0.7 - SQL Injection Vulnerability","exploitdb":"17680","created_at":"2014-07-15T17:17:10.037Z","updated_at":"2014-07-15T17:17:10.037Z"}]}},{"wp-symposium":{"vulnerabilities":[{"id":88493,"title":"WP Symposium 13.04 - invite.php u Parameter Arbitrary Site Redirect","osvdb":"92274","cve":"2013-2694","secunia":"52925","created_at":"2014-07-15T17:17:10.083Z","updated_at":"2014-07-15T17:17:10.083Z"},{"id":88494,"title":"WP Symposium 13.02 - wp-symposium/invite.php u Parameter XSS","osvdb":"92275","cve":"2013-2695","secunia":"52864","created_at":"2014-07-15T17:17:10.128Z","updated_at":"2014-07-15T17:17:10.128Z","fixed_in":"13.04"},{"id":88495,"title":"WP Symposium \u003c= 12.09 - ajax/symposium_groups_functions.php gid Parameter SQL Injection","url":"http://www.securityfocus.com/bid/57478,http://ceriksen.com/2013/02/18/wp-symposium-multiple-sql-injection/","osvdb":"89455","secunia":"50674","created_at":"2014-07-15T17:17:10.173Z","updated_at":"2014-07-15T17:17:10.173Z","fixed_in":"12.12"},{"id":88496,"title":"WP Symposium \u003c= 12.09 - index.php uid Parameter SQL Injection","url":"http://www.securityfocus.com/bid/57478,http://ceriksen.com/2013/02/18/wp-symposium-multiple-sql-injection/","osvdb":"89456","secunia":"50674","created_at":"2014-07-15T17:17:10.218Z","updated_at":"2014-07-15T17:17:10.218Z","fixed_in":"12.12"},{"id":88497,"title":"WP Symposium \u003c= 12.09 - ajax/symposium_profile_functions.php friend_to Parameter SQL Injection","url":"http://www.securityfocus.com/bid/57478,http://ceriksen.com/2013/02/18/wp-symposium-multiple-sql-injection/","osvdb":"89457","secunia":"50674","created_at":"2014-07-15T17:17:10.264Z","updated_at":"2014-07-15T17:17:10.264Z","fixed_in":"12.12"},{"id":88498,"title":"WP Symposium \u003c= 12.09 - ajax/symposium_forum_functions.php Multiple Parameter SQL Injection","url":"http://www.securityfocus.com/bid/57478,http://ceriksen.com/2013/02/18/wp-symposium-multiple-sql-injection/","osvdb":"89458","secunia":"50674","created_at":"2014-07-15T17:17:10.313Z","updated_at":"2014-07-15T17:17:10.313Z","fixed_in":"12.12"},{"id":88499,"title":"WP Symposium \u003c= 12.09 - get_album_item.php size Parameter SQL Injection","url":"http://www.securityfocus.com/bid/57478,http://ceriksen.com/2013/02/18/wp-symposium-multiple-sql-injection/","osvdb":"89459","secunia":"50674","created_at":"2014-07-15T17:17:10.357Z","updated_at":"2014-07-15T17:17:10.357Z","fixed_in":"12.12"},{"id":88500,"title":"WP Symposium \u003c= 12.07.07 - ajax/symposium_ajax_functions.php Authentication Bypass","osvdb":"83696","secunia":"49791","created_at":"2014-07-15T17:17:10.401Z","updated_at":"2014-07-15T17:17:10.401Z"},{"id":88501,"title":"WP Symposium \u003c= 12.06.16 - ajax/symposium_forum_functions.php tid Parameter SQL Injection","osvdb":"83662","secunia":"49534","created_at":"2014-07-15T17:17:10.446Z","updated_at":"2014-07-15T17:17:10.446Z","fixed_in":"12.07.01"},{"id":88502,"title":"WP Symposium \u003c= 12.06.16 - ajax/symposium_group_functions.php uid1 Parameter SQL Injection","osvdb":"83663","secunia":"49534","created_at":"2014-07-15T17:17:10.490Z","updated_at":"2014-07-15T17:17:10.490Z","fixed_in":"12.07.01"},{"id":88503,"title":"WP Symposium \u003c= 12.06.16 - ajax/symposium_bar_functions.php chat_to Parameter SQL Injection","osvdb":"83668","secunia":"49534","created_at":"2014-07-15T17:17:10.536Z","updated_at":"2014-07-15T17:17:10.536Z","fixed_in":"12.07.01"},{"id":88504,"title":"WP Symposium \u003c= 12.06.16 - ajax/symposium_mail_functions.php Multiple Parameter SQL Injection","osvdb":"83675","secunia":"49534","created_at":"2014-07-15T17:17:10.584Z","updated_at":"2014-07-15T17:17:10.584Z","fixed_in":"12.07.01"},{"id":88505,"title":"WP Symposium \u003c= 11.11.26 - uploadify/upload_admin_avatar.php File Upload Remote PHP Code Execution","url":"http://xforce.iss.net/xforce/xfdb/72012","osvdb":"78041","cve":"2011-5051","secunia":"46097","created_at":"2014-07-15T17:17:10.629Z","updated_at":"2014-07-15T17:17:10.629Z","fixed_in":"11.12.24"},{"id":88506,"title":"WP Symposium \u003c= 11.11.26 - uploadify/upload_profile_avatar.php File Upload Remote PHP Code Execution","url":"http://xforce.iss.net/xforce/xfdb/72012","osvdb":"78042","cve":"2011-5051","secunia":"46097","created_at":"2014-07-15T17:17:10.674Z","updated_at":"2014-07-15T17:17:10.674Z","fixed_in":"11.12.24"},{"id":88507,"title":"WP Symposium \u003c= 11.11.26 - uploadify/get_profile_avatar.php uid Parameter XSS","url":"http://www.securityfocus.com/bid/51017,http://xforce.iss.net/xforce/xfdb/71748","osvdb":"77634","cve":"2011-3841","secunia":"47243","created_at":"2014-07-15T17:17:10.720Z","updated_at":"2014-07-15T17:17:10.720Z","fixed_in":"11.12.08"},{"id":88508,"title":"WP Symposium \u003c= 0.64 - uploadify/get_profile_avatar.php uid Parameter SQL Injection","osvdb":"74664","secunia":"47243","exploitdb":"17679","created_at":"2014-07-15T17:17:10.767Z","updated_at":"2014-07-15T17:17:10.767Z","fixed_in":"11.08.18"}]}},{"file-groups":{"vulnerabilities":[{"id":88509,"title":"File Groups \u003c= 1.1.2 - SQL Injection Vulnerability","exploitdb":"17677","created_at":"2014-07-15T17:17:10.821Z","updated_at":"2014-07-15T17:17:10.821Z"}]}},{"ip-logger":{"vulnerabilities":[{"id":88510,"title":"IP-Logger \u003c= 3.0 - SQL Injection Vulnerability","exploitdb":"17673","created_at":"2014-07-15T17:17:10.867Z","updated_at":"2014-07-15T17:17:10.867Z"}]}},{"beer-recipes":{"vulnerabilities":[{"id":88511,"title":"Beer Recipes 1.0 - XSS","exploitdb":"17453","created_at":"2014-07-15T17:17:10.914Z","updated_at":"2014-07-15T17:17:10.914Z"}]}},{"is-human":{"vulnerabilities":[{"id":88512,"title":"Is-human \u003c= 1.4.2 - Remote Command Execution Vulnerability","exploitdb":"17299","created_at":"2014-07-15T17:17:10.962Z","updated_at":"2014-07-15T17:17:10.962Z"}]}},{"editormonkey":{"vulnerabilities":[{"id":88513,"title":"EditorMonkey - (FCKeditor) Arbitrary File Upload","exploitdb":"17284","created_at":"2014-07-15T17:17:11.014Z","updated_at":"2014-07-15T17:17:11.014Z"}]}},{"sermon-browser":{"vulnerabilities":[{"id":88514,"title":"SermonBrowser 0.43 - SQL Injection","exploitdb":"17214","created_at":"2014-07-15T17:17:11.061Z","updated_at":"2014-07-15T17:17:11.061Z"}]}},{"ajax-category-dropdown":{"vulnerabilities":[{"id":88515,"title":"Ajax Category Dropdown 0.1.5 - Multiple Vulnerabilities","exploitdb":"17207","created_at":"2014-07-15T17:17:11.106Z","updated_at":"2014-07-15T17:17:11.106Z"}]}},{"wp-custom-pages":{"vulnerabilities":[{"id":88516,"title":"WP Custom Pages 0.5.0.1 - LFI Vulnerability","exploitdb":"17119","created_at":"2014-07-15T17:17:11.152Z","updated_at":"2014-07-15T17:17:11.152Z"}]}},{"flash-album-gallery":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"},{"id":88517,"title":"GRAND Flash Album Gallery 2.70- \"s\" Cross-Site Scripting Vulnerability","osvdb":"93714","cve":"2013-3261","secunia":"53111","created_at":"2014-07-15T17:17:11.257Z","updated_at":"2014-07-15T17:17:11.257Z","fixed_in":"2.72"},{"id":88518,"title":"GRAND Flash Album Gallery 2.55 - \"gid\" SQL Injection Vulnerability","osvdb":"93087","secunia":"53356","created_at":"2014-07-15T17:17:11.305Z","updated_at":"2014-07-15T17:17:11.305Z","fixed_in":"2.56"},{"id":88519,"title":"GRAND Flash Album Gallery - Multiple Vulnerabilities","secunia":"51100","created_at":"2014-07-15T17:17:11.349Z","updated_at":"2014-07-15T17:17:11.349Z","fixed_in":"2.17"},{"id":88520,"title":"GRAND Flash Album Gallery 1.9.0 and 2.0.0 - Multiple Vulnerabilities","url":"http://packetstormsecurity.com/files/117665/,http://www.waraxe.us/advisory-94.html","secunia":"51601","created_at":"2014-07-15T17:17:11.393Z","updated_at":"2014-07-15T17:17:11.393Z"},{"id":88521,"title":"GRAND Flash Album Gallery \u003c= 1.71 - wp-admin/admin.php skin Parameter XSS","url":"http://packetstormsecurity.com/files/112704/","osvdb":"81923","created_at":"2014-07-15T17:17:11.438Z","updated_at":"2014-07-15T17:17:11.438Z","fixed_in":"1.76"},{"id":88522,"title":"GRAND Flash Album Gallery \u003c= 1.56 - XSS Vulnerability","url":"http://seclists.org/bugtraq/2011/Nov/186","created_at":"2014-07-15T17:17:11.486Z","updated_at":"2014-07-15T17:17:11.486Z"},{"id":88523,"title":"GRAND Flash Album Gallery 0.55 - lib/hitcounter.php pid Parameter SQL Injection","osvdb":"71072","secunia":"43648","exploitdb":"16947","created_at":"2014-07-15T17:17:11.539Z","updated_at":"2014-07-15T17:17:11.539Z"},{"id":88524,"title":"GRAND Flash Album Gallery 0.55 - admin/news.php want2Read Parameter Traversal Arbitrary File Access","osvdb":"71073","secunia":"43648","exploitdb":"16947","created_at":"2014-07-15T17:17:11.586Z","updated_at":"2014-07-15T17:17:11.586Z"}]}},{"php_speedy_wp":{"vulnerabilities":[{"id":88525,"title":"PHP Speedy \u003c= 0.5.2 - (admin_container.php) Remote Code Exec Exploit","exploitdb":"16273","created_at":"2014-07-15T17:17:11.630Z","updated_at":"2014-07-15T17:17:11.630Z"}]}},{"old-post-spinner":{"vulnerabilities":[{"id":88526,"title":"OPS Old Post Spinner 2.2.1 - LFI Vulnerability","exploitdb":"16251","created_at":"2014-07-15T17:17:11.675Z","updated_at":"2014-07-15T17:17:11.675Z"}]}},{"jquery-mega-menu":{"vulnerabilities":[{"id":88527,"title":"jQuery Mega Menu 1.0 - Local File Inclusion","exploitdb":"16250","created_at":"2014-07-15T17:17:11.721Z","updated_at":"2014-07-15T17:17:11.721Z"}]}},{"iwant-one-ihave-one":{"vulnerabilities":[{"id":88528,"title":"IWantOneButton 3.0.1 - Multiple Vulnerabilities","exploitdb":"16236","created_at":"2014-07-15T17:17:11.765Z","updated_at":"2014-07-15T17:17:11.765Z"}]}},{"forum-server":{"vulnerabilities":[{"id":88529,"title":"WP Forum Server \u003c= 1.7.3 - wpf-insert.php edit_post_id Parameter SQL Injection","url":"http://packetstormsecurity.com/files/112703/","osvdb":"75463","cve":"2012-6625","secunia":"45974","created_at":"2014-07-15T17:17:11.810Z","updated_at":"2014-07-15T17:17:11.810Z","fixed_in":"1.7.4"},{"id":88530,"title":"WP Forum Server \u003c= 1.7.3 - fs-admin/wpf-add-forum.php groupid Parameter XSS","url":"http://packetstormsecurity.com/files/112703/,http://www.securityfocus.com/bid/65215","osvdb":"102185","cve":"2012-6623","secunia":"49167","created_at":"2014-07-15T17:17:11.854Z","updated_at":"2014-07-15T17:17:11.854Z"},{"id":88531,"title":"WP Forum Server \u003c= 1.7.3 - fs-admin/fs-admin.php Multiple Parameter XSS","url":"http://packetstormsecurity.com/files/112703/","osvdb":"81914","cve":"2012-6622","secunia":"49155","created_at":"2014-07-15T17:17:11.899Z","updated_at":"2014-07-15T17:17:11.899Z"},{"id":88532,"title":"WP Forum Server \u003c= 1.7 - SQL Injection Vulnerability","exploitdb":"17828","created_at":"2014-07-15T17:17:11.945Z","updated_at":"2014-07-15T17:17:11.945Z"},{"id":88533,"title":"WP Forum Server 1.6.5 - feed.php topic Parameter SQL Injection","url":"http://www.securityfocus.com/bid/46360,http://www.securityfocus.com/bid/46362","osvdb":"70994","cve":"2011-1047","secunia":"43306","exploitdb":"16235","created_at":"2014-07-15T17:17:11.990Z","updated_at":"2014-07-15T17:17:11.990Z"},{"id":88534,"title":"WP Forum Server 1.6.5 - index.php Multiple Parameter SQL Injection","url":"http://www.securityfocus.com/bid/46362","osvdb":"70993","cve":"2011-1047","secunia":"43306","exploitdb":"16235","created_at":"2014-07-15T17:17:12.038Z","updated_at":"2014-07-15T17:17:12.038Z"}]}},{"relevanssi":{"vulnerabilities":[{"id":88535,"title":"Relevanssi 3.2 - Unspecified SQL Injection","url":"http://www.securityfocus.com/bid/65960","osvdb":"104014","secunia":"56641","created_at":"2014-07-15T17:17:12.085Z","updated_at":"2014-07-15T17:17:12.085Z","fixed_in":"3.3"},{"id":88536,"title":"Relevanssi 2.7.2 - Stored XSS Vulnerability","osvdb":"71236","secunia":"43461","exploitdb":"16233","created_at":"2014-07-15T17:17:12.130Z","updated_at":"2014-07-15T17:17:12.130Z","fixed_in":"2.7.3"}]}},{"gigpress":{"vulnerabilities":[{"id":88537,"title":"GigPress 2.1.10 - Stored XSS Vulnerability","exploitdb":"16232","created_at":"2014-07-15T17:17:12.176Z","updated_at":"2014-07-15T17:17:12.176Z"}]}},{"comment-rating":{"vulnerabilities":[{"id":88538,"title":"Comment Rating 2.9.32 - Security Bypass Weakness and SQL Injection","url":"http://packetstormsecurity.com/files/120569/","osvdb":"90676","secunia":"52348","exploitdb":"24552","created_at":"2014-07-15T17:17:12.221Z","updated_at":"2014-07-15T17:17:12.221Z"},{"id":88539,"title":"Comment Rating 2.9.23 - Multiple Vulnerabilities","osvdb":"71044","secunia":"43406","exploitdb":"16221","created_at":"2014-07-15T17:17:12.265Z","updated_at":"2014-07-15T17:17:12.265Z","fixed_in":"2.9.24"}]}},{"z-vote":{"vulnerabilities":[{"id":88540,"title":"Z-Vote 1.1 - SQL Injection Vulnerability","exploitdb":"16218","created_at":"2014-07-15T17:17:12.312Z","updated_at":"2014-07-15T17:17:12.312Z"}]}},{"user-photo":{"vulnerabilities":[{"id":88541,"title":"User Photo - Component Remote File Upload Vulnerability","osvdb":"71071","exploitdb":"16181","created_at":"2014-07-15T17:17:12.358Z","updated_at":"2014-07-15T17:17:12.358Z","fixed_in":"0.9.5"}]}},{"enable-media-replace":{"vulnerabilities":[{"id":88542,"title":"Enable Media Replace - Multiple Vulnerabilities","exploitdb":"16144","created_at":"2014-07-15T17:17:12.404Z","updated_at":"2014-07-15T17:17:12.404Z"}]}},{"mingle-forum":{"vulnerabilities":[{"id":88543,"title":"Mingle Forum \u003c= 1.0.32.1 - Cross Site Scripting / SQL Injection","url":"http://packetstormsecurity.com/files/108915/","created_at":"2014-07-15T17:17:12.448Z","updated_at":"2014-07-15T17:17:12.448Z"},{"id":88544,"title":"Mingle Forum \u003c= 1.0.31 - SQL Injection Vulnerability","exploitdb":"17894","created_at":"2014-07-15T17:17:12.496Z","updated_at":"2014-07-15T17:17:12.496Z"},{"id":88545,"title":"Mingle Forum \u003c= 1.0.26 - Multiple Vulnerabilities","exploitdb":"15943","created_at":"2014-07-15T17:17:12.540Z","updated_at":"2014-07-15T17:17:12.540Z"},{"id":88546,"title":"Mingle Forum \u003c= 1.0.33 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112696/","secunia":"49171","created_at":"2014-07-15T17:17:12.587Z","updated_at":"2014-07-15T17:17:12.587Z","fixed_in":"1.0.33.2"},{"id":88547,"title":"Mingle Forum 1.0.33.3 - fs-admin.php togroupusers Parameter XSS","osvdb":"90432","cve":"2013-0734","secunia":"52167","created_at":"2014-07-15T17:17:12.632Z","updated_at":"2014-07-15T17:17:12.632Z","fixed_in":"1.0.34"},{"id":88548,"title":"Mingle Forum 1.0.33.3 - wpf.class.php search_words Parameter XSS","osvdb":"90433","cve":"2013-0734","secunia":"52167","created_at":"2014-07-15T17:17:12.677Z","updated_at":"2014-07-15T17:17:12.677Z","fixed_in":"1.0.34"},{"id":88549,"title":"Mingle Forum 1.0.33.3 - wpf.class.php Multiple Parameter SQL Injection","osvdb":"90434","cve":"2013-0735","secunia":"52167","created_at":"2014-07-15T17:17:12.733Z","updated_at":"2014-07-15T17:17:12.733Z","fixed_in":"1.0.34"},{"id":88550,"title":"Mingle Forum 1.0.35 - Privilege Escalation CSRF","osvdb":"96905","cve":"2013-0736","secunia":"47687","created_at":"2014-07-15T17:17:12.779Z","updated_at":"2014-07-15T17:17:12.779Z"}]}},{"accept-signups":{"vulnerabilities":[{"id":88551,"title":"Accept Signups 0.1 - XSS","exploitdb":"15808","created_at":"2014-07-15T17:17:12.824Z","updated_at":"2014-07-15T17:17:12.824Z"}]}},{"events-manager-extended":{"vulnerabilities":[{"id":88552,"title":"Events Manager Extended - Persistent XSS Vulnerability","exploitdb":"14923","created_at":"2014-07-15T17:17:12.870Z","updated_at":"2014-07-15T17:17:12.870Z"}]}},{"nextgen-smooth-gallery":{"vulnerabilities":[{"id":88553,"title":"NextGEN Smooth Gallery - Blind SQL Injection Vulnerability","exploitdb":"14541","created_at":"2014-07-15T17:17:12.915Z","updated_at":"2014-07-15T17:17:12.915Z"},{"id":88554,"title":"NextGen Smooth Gallery - XSS","url":"http://packetstormsecurity.com/files/123074/","created_at":"2014-07-15T17:17:12.959Z","updated_at":"2014-07-15T17:17:12.959Z"}]}},{"mylinksdump":{"vulnerabilities":[{"id":88555,"title":"myLDlinker - SQL Injection Vulnerability","exploitdb":"14441","created_at":"2014-07-15T17:17:13.004Z","updated_at":"2014-07-15T17:17:13.004Z"}]}},{"firestats":{"vulnerabilities":[{"id":88556,"title":"Firestats - Remote Configuration File Download","exploitdb":"14308","created_at":"2014-07-15T17:17:13.049Z","updated_at":"2014-07-15T17:17:13.049Z"}]}},{"simple-press":{"vulnerabilities":[{"id":88557,"title":"Simple Press - SQL Injection Vulnerability","exploitdb":"14198","created_at":"2014-07-15T17:17:13.096Z","updated_at":"2014-07-15T17:17:13.096Z"}]}},{"cimy-counter":{"vulnerabilities":[{"id":88558,"title":"Cimy Counter - Vulnerabilities","exploitdb":"14057","created_at":"2014-07-15T17:17:13.140Z","updated_at":"2014-07-15T17:17:13.140Z"}]}},{"nextgen-gallery":{"vulnerabilities":[{"id":88559,"title":"NextGEN Gallery \u0026 2.0.66 - Arbitrary File Upload (the user must have upload privileges)","url":"http://packetstormsecurity.com/files/127340/wpnextgen2063-shell.txt","created_at":"2014-07-15T17:17:13.185Z","updated_at":"2014-07-15T17:17:13.185Z","fixed_in":"2.0.66"},{"id":88560,"title":"NextGEN Gallery 2.0.0 - Directory Traversal","url":"http://seclists.org/fulldisclosure/2014/Feb/171,https://security.dxw.com/advisories/directory-traversal-in-nextgen-gallery-2-0-0/","osvdb":"103473","created_at":"2014-07-15T17:17:13.229Z","updated_at":"2014-07-15T17:17:13.229Z","fixed_in":"2.0.7"},{"id":88561,"title":"NextGEN Gallery - SWF Vulnerable to XSS","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","secunia":"51271","created_at":"2014-07-15T17:17:13.274Z","updated_at":"2014-07-15T17:17:13.274Z","fixed_in":"1.9.8"},{"id":88562,"title":"NextGEN Gallery - swfupload.swf Multiple Cross Site Scripting Vulnerabilities","url":"http://www.securityfocus.com/bid/60433","created_at":"2014-07-15T17:17:13.318Z","updated_at":"2014-07-15T17:17:13.318Z"},{"id":88563,"title":"NextGEN Gallery 1.9.12 - Arbitrary File Upload","url":"http://wordpress.org/plugins/nextgen-gallery/changelog/","osvdb":"94232","cve":"2013-3684","created_at":"2014-07-15T17:17:13.363Z","updated_at":"2014-07-15T17:17:13.363Z","fixed_in":"1.9.13"},{"id":88564,"title":"NextGEN Gallery 1.9.11 - xml/json.php Crafted Request Parsing Path Disclosure","osvdb":"90242","cve":"2013-0291","secunia":"52137","created_at":"2014-07-15T17:17:13.407Z","updated_at":"2014-07-15T17:17:13.407Z"},{"id":88565,"title":"NextGEN Gallery 1.9.5 - gallerypath Parameter Stored XSS","osvdb":"97690","created_at":"2014-07-15T17:17:13.452Z","updated_at":"2014-07-15T17:17:13.452Z"},{"id":88566,"title":"NextGEN Gallery \u003c= 1.9.0 - admin/manage-galleries.php paged Parameter XSS","osvdb":"78363","secunia":"47588","created_at":"2014-07-15T17:17:13.498Z","updated_at":"2014-07-15T17:17:13.498Z","fixed_in":"1.9.1"},{"id":88567,"title":"NextGEN Gallery \u003c= 1.9.0 - admin/manage-images.php paged Parameter XSS","osvdb":"78364","secunia":"47588","created_at":"2014-07-15T17:17:13.546Z","updated_at":"2014-07-15T17:17:13.546Z","fixed_in":"1.9.1"},{"id":88568,"title":"NextGEN Gallery \u003c= 1.9.0 - admin/manage.php Multiple Parameter XSS","osvdb":"78365","secunia":"47588","created_at":"2014-07-15T17:17:13.591Z","updated_at":"2014-07-15T17:17:13.591Z","fixed_in":"1.9.1"},{"id":88569,"title":"NextGEN Gallery \u003c= 1.8.3 - wp-admin/admin.php search Parameter XSS","osvdb":"76576","secunia":"46602","created_at":"2014-07-15T17:17:13.636Z","updated_at":"2014-07-15T17:17:13.636Z","fixed_in":"1.8.4"},{"id":88570,"title":"NextGEN Gallery \u003c= 1.8.3 - Tag Deletion CSRF","osvdb":"76577","secunia":"46602","created_at":"2014-07-15T17:17:13.681Z","updated_at":"2014-07-15T17:17:13.681Z","fixed_in":"1.8.4"},{"id":88571,"title":"NextGEN Gallery \u003c= 1.7.3 - xml/ajax.php Path Disclosure","osvdb":"72023","created_at":"2014-07-15T17:17:13.725Z","updated_at":"2014-07-15T17:17:13.725Z","fixed_in":"1.7.4"},{"id":88572,"title":"NextGEN Gallery \u003c= 1.5.1 - xml/media-rss.php mode Parameter XSS","url":"http://www.securityfocus.com/bid/39250","osvdb":"63574","secunia":"39341","exploitdb":"12098","created_at":"2014-07-15T17:17:13.771Z","updated_at":"2014-07-15T17:17:13.771Z","fixed_in":"1.5.2"}]}},{"cpl":{"vulnerabilities":[{"id":88573,"title":"Copperleaf Photolog - SQL injection","exploitdb":"11458","created_at":"2014-07-15T17:17:13.816Z","updated_at":"2014-07-15T17:17:13.816Z"}]}},{"events-calendar":{"vulnerabilities":[{"id":88574,"title":"Events Calendar - SQL Injection Vulnerability","osvdb":"95677","exploitdb":"10929","created_at":"2014-07-15T17:17:13.861Z","updated_at":"2014-07-15T17:17:13.861Z","fixed_in":"6.7.10"},{"id":88575,"title":"Events Calendar - wp-admin/admin.php EC_id Parameter XSS","osvdb":"74705","created_at":"2014-07-15T17:17:13.906Z","updated_at":"2014-07-15T17:17:13.906Z","fixed_in":"6.7.12a"}]}},{"ImageManager":{"vulnerabilities":[{"id":88576,"title":"Image Manager - Shell Upload Vulnerability","exploitdb":"10325","created_at":"2014-07-15T17:17:13.950Z","updated_at":"2014-07-15T17:17:13.950Z"}]}},{"wp-cumulus":{"vulnerabilities":[{"id":88577,"title":"WP-Cumulus \u003c= 1.20 - Vulnerabilities","exploitdb":"10228","created_at":"2014-07-15T17:17:13.999Z","updated_at":"2014-07-15T17:17:13.999Z"},{"id":88578,"title":"WP-Cumulus - Cross Site Scripting Vulnerabily","url":"http://seclists.org/fulldisclosure/2011/Nov/340","created_at":"2014-07-15T17:17:14.044Z","updated_at":"2014-07-15T17:17:14.044Z","fixed_in":"1.23"}]}},{"wp-syntax":{"vulnerabilities":[{"id":88579,"title":"WP-Syntax \u003c 0.9.10 - Remote Command Execution","exploitdb":"9431","created_at":"2014-07-15T17:17:14.090Z","updated_at":"2014-07-15T17:17:14.090Z","fixed_in":"0.9.10"}]}},{"my-category-order":{"vulnerabilities":[{"id":88580,"title":"My Category Order \u003c= 2.8 - SQL Injection Vulnerability","exploitdb":"9150","created_at":"2014-07-15T17:17:14.137Z","updated_at":"2014-07-15T17:17:14.137Z"}]}},{"related-sites":{"vulnerabilities":[{"id":88581,"title":"Related Sites 2.1 - Blind SQL Injection Vulnerability","exploitdb":"9054","created_at":"2014-07-15T17:17:14.186Z","updated_at":"2014-07-15T17:17:14.186Z"}]}},{"dm-albums":{"vulnerabilities":[{"id":88218,"title":"SWF Vulnerable to XSS Bundled in Many WordPress Plugins","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","created_at":"2014-07-15T17:16:54.883Z","updated_at":"2014-07-15T17:16:54.883Z"},{"id":88582,"title":"DM Albums 1.9.2 - Remote File Disclosure Vulnerability","exploitdb":"9048","created_at":"2014-07-15T17:17:14.290Z","updated_at":"2014-07-15T17:17:14.290Z"},{"id":88583,"title":"DM Albums 1.9.2 - Remote File Inclusion Vuln","exploitdb":"9043","created_at":"2014-07-15T17:17:14.335Z","updated_at":"2014-07-15T17:17:14.335Z"}]}},{"photoracer":{"vulnerabilities":[{"id":88584,"title":"Photoracer 1.0 - (id) SQL Injection Vulnerability","exploitdb":"8961","created_at":"2014-07-15T17:17:14.379Z","updated_at":"2014-07-15T17:17:14.379Z"},{"id":88585,"title":"Photoracer \u003c= 1.0 - SQL Injection Vulnerability","exploitdb":"17720","created_at":"2014-07-15T17:17:14.424Z","updated_at":"2014-07-15T17:17:14.424Z"},{"id":88586,"title":"Photoracer \u003c= 1.0 - Multiple Vulnerabilities","exploitdb":"17731","created_at":"2014-07-15T17:17:14.470Z","updated_at":"2014-07-15T17:17:14.470Z"}]}},{"wp-lytebox":{"vulnerabilities":[{"id":88587,"title":"Lytebox - Local File Inclusion Vulnerability","exploitdb":"8791","created_at":"2014-07-15T17:17:14.517Z","updated_at":"2014-07-15T17:17:14.517Z"}]}},{"fmoblog":{"vulnerabilities":[{"id":88588,"title":"fMoblog 2.1 - (id) SQL Injection Vulnerability","exploitdb":"8229","created_at":"2014-07-15T17:17:14.562Z","updated_at":"2014-07-15T17:17:14.562Z"}]}},{"page-flip-image-gallery":{"vulnerabilities":[{"id":88589,"title":"Page Flip Image Gallery \u003c= 0.2.2 - Remote FD Vuln","url":"http://www.securityfocus.com/bid/32966,http://xforce.iss.net/xforce/xfdb/47568","osvdb":"50902","cve":"2008-5752","secunia":"33274","exploitdb":"7543","created_at":"2014-07-15T17:17:14.618Z","updated_at":"2014-07-15T17:17:14.618Z"}]}},{"wp-shopping-cart":{"vulnerabilities":[{"id":88590,"title":"e-Commerce \u003c= 3.4 - Arbitrary File Upload Exploit","exploitdb":"6867","created_at":"2014-07-15T17:17:14.665Z","updated_at":"2014-07-15T17:17:14.665Z"}]}},{"downloads-manager":{"vulnerabilities":[{"id":88591,"title":"Download Manager 0.2 - Arbitrary File Upload Exploit","exploitdb":"6127","created_at":"2014-07-15T17:17:14.711Z","updated_at":"2014-07-15T17:17:14.711Z"}]}},{"wpSS":{"vulnerabilities":[{"id":88592,"title":"Spreadsheet \u003c= 0.6 - SQL Injection Vulnerability","exploitdb":"5486","created_at":"2014-07-15T17:17:14.758Z","updated_at":"2014-07-15T17:17:14.758Z"}]}},{"wp-download":{"vulnerabilities":[{"id":88593,"title":"Download - (dl_id) SQL Injection Vulnerability","exploitdb":"5326","created_at":"2014-07-15T17:17:14.806Z","updated_at":"2014-07-15T17:17:14.806Z"}]}},{"sniplets":{"vulnerabilities":[{"id":88594,"title":"Sniplets 1.1.2 - (RFI/XSS/RCE) Multiple Vulnerabilities","exploitdb":"5194","created_at":"2014-07-15T17:17:14.850Z","updated_at":"2014-07-15T17:17:14.850Z"}]}},{"wp-photo-album":{"vulnerabilities":[{"id":88595,"title":"Photo album - Remote SQL Injection Vulnerability","exploitdb":"5135","created_at":"2014-07-15T17:17:14.895Z","updated_at":"2014-07-15T17:17:14.895Z"}]}},{"sf-forum":{"vulnerabilities":[{"id":88596,"title":"Simple Forum 2.0-2.1 - SQL Injection Vulnerability","exploitdb":"5126","created_at":"2014-07-15T17:17:14.941Z","updated_at":"2014-07-15T17:17:14.941Z"},{"id":88597,"title":"Simple Forum 1.10-1.11 - SQL Injection Vulnerability","exploitdb":"5127","created_at":"2014-07-15T17:17:14.987Z","updated_at":"2014-07-15T17:17:14.987Z"}]}},{"st_newsletter":{"vulnerabilities":[{"id":88598,"title":"st_newsletter - Remote SQL Injection Vulnerability","exploitdb":"5053","created_at":"2014-07-15T17:17:15.034Z","updated_at":"2014-07-15T17:17:15.034Z"},{"id":88599,"title":"st_newsletter - (stnl_iframe.php) SQL Injection Vulnerability","exploitdb":"6777","created_at":"2014-07-15T17:17:15.084Z","updated_at":"2014-07-15T17:17:15.084Z"}]}},{"wordspew":{"vulnerabilities":[{"id":88600,"title":"Wordspew - Remote SQL Injection Vulnerability","exploitdb":"5039","created_at":"2014-07-15T17:17:15.133Z","updated_at":"2014-07-15T17:17:15.133Z"}]}},{"dmsguestbook":{"vulnerabilities":[{"id":88601,"title":"dmsguestbook 1.7.0 - Multiple Remote Vulnerabilities","exploitdb":"5035","created_at":"2014-07-15T17:17:15.179Z","updated_at":"2014-07-15T17:17:15.179Z"}]}},{"wassup":{"vulnerabilities":[{"id":88602,"title":"WassUp 1.4.3 - (spy.php to_date) SQL Injection Exploit","exploitdb":"5017","created_at":"2014-07-15T17:17:15.224Z","updated_at":"2014-07-15T17:17:15.224Z"}]}},{"wp-adserve":{"vulnerabilities":[{"id":88603,"title":"Adserve 0.2 - adclick.php SQL Injection Exploit","exploitdb":"5013","created_at":"2014-07-15T17:17:15.270Z","updated_at":"2014-07-15T17:17:15.270Z"}]}},{"fgallery":{"vulnerabilities":[{"id":88604,"title":"fGallery 2.4.1 - fimrss.php SQL Injection Vulnerability","exploitdb":"4993","created_at":"2014-07-15T17:17:15.317Z","updated_at":"2014-07-15T17:17:15.317Z"}]}},{"wp-cal":{"vulnerabilities":[{"id":88605,"title":"WP-Cal 0.3 - editevent.php SQL Injection Vulnerability","exploitdb":"4992","created_at":"2014-07-15T17:17:15.362Z","updated_at":"2014-07-15T17:17:15.362Z"}]}},{"wpforum":{"vulnerabilities":[{"id":88606,"title":"plugin WP-Forum 1.7.4 - Remote SQL Injection Vulnerability","exploitdb":"4939","created_at":"2014-07-15T17:17:15.408Z","updated_at":"2014-07-15T17:17:15.408Z"},{"id":88607,"title":"plugin WP-Forum 1.7.8 - Remote SQL Injection Vulnerability","exploitdb":"7738","created_at":"2014-07-15T17:17:15.453Z","updated_at":"2014-07-15T17:17:15.453Z"}]}},{"wp-filemanager":{"vulnerabilities":[{"id":88608,"title":"wp-FileManager 1.2 - Remote Upload Vulnerability","exploitdb":"4844","created_at":"2014-07-15T17:17:15.498Z","updated_at":"2014-07-15T17:17:15.498Z"},{"id":88609,"title":"wp-FileManager 1.3.0 - File Download Vulnerability","osvdb":"93446","secunia":"53421","exploitdb":"25440","created_at":"2014-07-15T17:17:15.546Z","updated_at":"2014-07-15T17:17:15.546Z","fixed_in":"1.4.0"}]}},{"pictpress":{"vulnerabilities":[{"id":88610,"title":"PictPress \u003c= 0.91 - Remote File Disclosure Vulnerability","exploitdb":"4695","created_at":"2014-07-15T17:17:15.594Z","updated_at":"2014-07-15T17:17:15.594Z"}]}},{"backupwordpress":{"vulnerabilities":[{"id":88611,"title":"BackUp \u003c= 0.4.2b - RFI Vulnerability","exploitdb":"4593","created_at":"2014-07-15T17:17:15.640Z","updated_at":"2014-07-15T17:17:15.640Z","fixed_in":"0.4.3"}]}},{"myflash":{"vulnerabilities":[{"id":88612,"title":"Myflash \u003c= 1.00 - (wppath) RFI Vulnerability","exploitdb":"3828","created_at":"2014-07-15T17:17:15.687Z","updated_at":"2014-07-15T17:17:15.687Z"},{"id":88613,"title":"Myflash - myextractXML.php path Parameter Arbitrary File Access","url":"http://packetstormsecurity.com/files/118400/","osvdb":"88260","created_at":"2014-07-15T17:17:15.736Z","updated_at":"2014-07-15T17:17:15.736Z"}]}},{"wordtube":{"vulnerabilities":[{"id":88614,"title":"plugin wordTube \u003c= 1.43 - (wpPATH) RFI Vulnerability","exploitdb":"3825","created_at":"2014-07-15T17:17:15.781Z","updated_at":"2014-07-15T17:17:15.781Z"}]}},{"wp-table":{"vulnerabilities":[{"id":88615,"title":"plugin wp-Table \u003c= 1.43 - (inc_dir) RFI Vulnerability","exploitdb":"3824","created_at":"2014-07-15T17:17:15.827Z","updated_at":"2014-07-15T17:17:15.827Z"}]}},{"mygallery":{"vulnerabilities":[{"id":88616,"title":"myGallery \u003c= 1.4b4 - Remote File Inclusion Vulnerability","exploitdb":"3814","created_at":"2014-07-15T17:17:15.873Z","updated_at":"2014-07-15T17:17:15.873Z"}]}},{"sendit":{"vulnerabilities":[{"id":88617,"title":"SendIt \u003c= 1.5.9 - Blind SQL Injection Vulnerability","exploitdb":"17716","created_at":"2014-07-15T17:17:15.921Z","updated_at":"2014-07-15T17:17:15.921Z"}]}},{"js-appointment":{"vulnerabilities":[{"id":88618,"title":"Js-appointment \u003c= 1.5 - SQL Injection Vulnerability","exploitdb":"17724","created_at":"2014-07-15T17:17:15.968Z","updated_at":"2014-07-15T17:17:15.968Z"}]}},{"mm-forms-community":{"vulnerabilities":[{"id":88619,"title":"MM Forms Community \u003c= 1.2.3 - SQL Injection Vulnerability","exploitdb":"17725","created_at":"2014-07-15T17:17:16.016Z","updated_at":"2014-07-15T17:17:16.016Z"},{"id":88620,"title":"MM Forms Community 2.2.6 - Arbitrary File Upload","exploitdb":"18997","created_at":"2014-07-15T17:17:16.061Z","updated_at":"2014-07-15T17:17:16.061Z"}]}},{"super-captcha":{"vulnerabilities":[{"id":88621,"title":"Super CAPTCHA \u003c= 2.2.4 - SQL Injection Vulnerability","exploitdb":"17728","created_at":"2014-07-15T17:17:16.110Z","updated_at":"2014-07-15T17:17:16.110Z"}]}},{"collision-testimonials":{"vulnerabilities":[{"id":88622,"title":"Collision Testimonials \u003c= 3.0 - SQL Injection Vulnerability","exploitdb":"17729","created_at":"2014-07-15T17:17:16.155Z","updated_at":"2014-07-15T17:17:16.155Z"}]}},{"oqey-headers":{"vulnerabilities":[{"id":88623,"title":"Oqey Headers \u003c= 0.3 - SQL Injection Vulnerability","exploitdb":"17730","created_at":"2014-07-15T17:17:16.202Z","updated_at":"2014-07-15T17:17:16.202Z"}]}},{"fbpromotions":{"vulnerabilities":[{"id":88624,"title":"Facebook Promotions \u003c= 1.3.3 - SQL Injection Vulnerability","exploitdb":"17737","created_at":"2014-07-15T17:17:16.250Z","updated_at":"2014-07-15T17:17:16.250Z"}]}},{"evarisk":{"vulnerabilities":[{"id":88625,"title":"Evarisk 5.1.5.4 - include/lib/actionsCorrectives/activite/uploadPhotoApres.php File Upload PHP Code Execution","url":"http://packetstormsecurity.com/files/113638/","osvdb":"82960","secunia":"49521","created_at":"2014-07-15T17:17:16.299Z","updated_at":"2014-07-15T17:17:16.299Z"},{"id":88626,"title":"Evarisk \u003c= 5.1.3.6 - SQL Injection Vulnerability","exploitdb":"17738","created_at":"2014-07-15T17:17:16.345Z","updated_at":"2014-07-15T17:17:16.345Z"}]}},{"profiles":{"vulnerabilities":[{"id":88627,"title":"Profiles \u003c= 2.0RC1 - SQL Injection Vulnerability","exploitdb":"17739","created_at":"2014-07-15T17:17:16.396Z","updated_at":"2014-07-15T17:17:16.396Z"}]}},{"mystat":{"vulnerabilities":[{"id":88628,"title":"mySTAT \u003c= 2.6 - SQL Injection Vulnerability","exploitdb":"17740","created_at":"2014-07-15T17:17:16.446Z","updated_at":"2014-07-15T17:17:16.446Z"}]}},{"sh-slideshow":{"vulnerabilities":[{"id":88629,"title":"SH Slideshow \u003c= 3.1.4 - SQL Injection Vulnerability","exploitdb":"17748","created_at":"2014-07-15T17:17:16.491Z","updated_at":"2014-07-15T17:17:16.491Z"}]}},{"copyright-licensing-tools":{"vulnerabilities":[{"id":88630,"title":"iCopyright(R) Article Tools \u003c= 1.1.4 - SQL Injection Vulnerability","exploitdb":"17749","created_at":"2014-07-15T17:17:16.549Z","updated_at":"2014-07-15T17:17:16.549Z"}]}},{"advertizer":{"vulnerabilities":[{"id":88631,"title":"Advertizer \u003c= 1.0 - SQL Injection Vulnerability","exploitdb":"17750","created_at":"2014-07-15T17:17:16.594Z","updated_at":"2014-07-15T17:17:16.594Z"}]}},{"event-registration":{"vulnerabilities":[{"id":88632,"title":"Event Registration \u003c= 5.44 - SQL Injection Vulnerability","exploitdb":"17814","created_at":"2014-07-15T17:17:16.639Z","updated_at":"2014-07-15T17:17:16.639Z"},{"id":88633,"title":"Event Registration \u003c= 5.43 - SQL Injection Vulnerability","exploitdb":"17751","created_at":"2014-07-15T17:17:16.683Z","updated_at":"2014-07-15T17:17:16.683Z"},{"id":88634,"title":"Event Registration 5.32 - SQL Injection Vulnerability","exploitdb":"15513","created_at":"2014-07-15T17:17:16.731Z","updated_at":"2014-07-15T17:17:16.731Z"}]}},{"crawlrate-tracker":{"vulnerabilities":[{"id":88635,"title":"Craw Rate Tracker \u003c= 2.0.2 - SQL Injection Vulnerability","exploitdb":"17755","created_at":"2014-07-15T17:17:16.778Z","updated_at":"2014-07-15T17:17:16.778Z"}]}},{"wp-audio-gallery-playlist":{"vulnerabilities":[{"id":88636,"title":"wp audio gallery playlist \u003c= 0.12 - SQL Injection Vulnerability","exploitdb":"17756","created_at":"2014-07-15T17:17:16.823Z","updated_at":"2014-07-15T17:17:16.823Z"}]}},{"yolink-search":{"vulnerabilities":[{"id":88637,"title":"yolink Search 2.5 - \"s\" Cross-Site Scripting Vulnerability","url":"http://www.securityfocus.com/bid/57665","osvdb":"89756","secunia":"52030","created_at":"2014-07-15T17:17:16.868Z","updated_at":"2014-07-15T17:17:16.868Z","fixed_in":"2.6"},{"id":88638,"title":"yolink Search \u003c= 1.1.4 - includes/bulkcrawl.php Multiple Parameter SQL Injection","osvdb":"74832","secunia":"45801","exploitdb":"17757","created_at":"2014-07-15T17:17:16.917Z","updated_at":"2014-07-15T17:17:16.917Z"}]}},{"pure-html":{"vulnerabilities":[{"id":88639,"title":"PureHTML \u003c= 1.0.0 - SQL Injection Vulnerability","exploitdb":"17758","created_at":"2014-07-15T17:17:16.965Z","updated_at":"2014-07-15T17:17:16.965Z"}]}},{"couponer":{"vulnerabilities":[{"id":88640,"title":"Couponer \u003c= 1.2 - SQL Injection Vulnerability","exploitdb":"17759","created_at":"2014-07-15T17:17:17.013Z","updated_at":"2014-07-15T17:17:17.013Z"}]}},{"grapefile":{"vulnerabilities":[{"id":88641,"title":"grapefile \u003c= 1.1 - Arbitrary File Upload","exploitdb":"17760","created_at":"2014-07-15T17:17:17.057Z","updated_at":"2014-07-15T17:17:17.057Z"}]}},{"image-gallery-with-slideshow":{"vulnerabilities":[{"id":88642,"title":"image-gallery-with-slideshow \u003c= 1.5 - Arbitrary File Upload / SQL Injection","exploitdb":"17761","created_at":"2014-07-15T17:17:17.101Z","updated_at":"2014-07-15T17:17:17.101Z"}]}},{"wordpress-donation-plugin-with-goals-and-paypal-ipn-by-nonprofitcmsorg":{"vulnerabilities":[{"id":88643,"title":"Donation \u003c= 1.0 - SQL Injection Vulnerability","exploitdb":"17763","created_at":"2014-07-15T17:17:17.147Z","updated_at":"2014-07-15T17:17:17.147Z"}]}},{"wp-bannerize":{"vulnerabilities":[{"id":88644,"title":"WP Bannerize \u003c= 2.8.6 - SQL Injection Vulnerability","osvdb":"74835","secunia":"45811","exploitdb":"17764","created_at":"2014-07-15T17:17:17.192Z","updated_at":"2014-07-15T17:17:17.192Z","fixed_in":"2.8.7"},{"id":88645,"title":"WP Bannerize \u003c= 2.8.7 - SQL Injection Vulnerability","osvdb":"76658","secunia":"46236","exploitdb":"17906","created_at":"2014-07-15T17:17:17.248Z","updated_at":"2014-07-15T17:17:17.248Z","fixed_in":"2.8.8"}]}},{"search-autocomplete":{"vulnerabilities":[{"id":88646,"title":"SearchAutocomplete \u003c= 1.0.8 - SQL Injection Vulnerability","exploitdb":"17767","created_at":"2014-07-15T17:17:17.298Z","updated_at":"2014-07-15T17:17:17.298Z"}]}},{"videowhisper-video-presentation":{"vulnerabilities":[{"id":88647,"title":"VideoWhisper Video Presentation \u003c= 1.1 - SQL Injection Vulnerability","exploitdb":"17771","created_at":"2014-07-15T17:17:17.344Z","updated_at":"2014-07-15T17:17:17.344Z"},{"id":88648,"title":"VideoWhisper Video Presentation 3.17 - 'vw_upload.php' Arbitrary File Upload Vulnerability","url":"http://www.securityfocus.com/bid/53851","created_at":"2014-07-15T17:17:17.393Z","updated_at":"2014-07-15T17:17:17.393Z"}]}},{"facebook-opengraph-meta-plugin":{"vulnerabilities":[{"id":88649,"title":"Facebook Opengraph Meta \u003c= 1.0 - SQL Injection Vulnerability","exploitdb":"17773","created_at":"2014-07-15T17:17:17.443Z","updated_at":"2014-07-15T17:17:17.443Z"}]}},{"zotpress":{"vulnerabilities":[{"id":88650,"title":"Zotpress \u003c= 4.4 - SQL Injection Vulnerability","exploitdb":"17778","created_at":"2014-07-15T17:17:17.493Z","updated_at":"2014-07-15T17:17:17.493Z"}]}},{"oqey-gallery":{"vulnerabilities":[{"id":88651,"title":"oQey Gallery \u003c= 0.4.8 - SQL Injection Vulnerability","exploitdb":"17779","created_at":"2014-07-15T17:17:17.545Z","updated_at":"2014-07-15T17:17:17.545Z"}]}},{"tweet-old-post":{"vulnerabilities":[{"id":88652,"title":"Tweet Old Post \u003c= 3.2.5 - SQL Injection Vulnerability","exploitdb":"17789","created_at":"2014-07-15T17:17:17.591Z","updated_at":"2014-07-15T17:17:17.591Z"}]}},{"post-highlights":{"vulnerabilities":[{"id":88653,"title":"post highlights \u003c= 2.2 - SQL Injection Vulnerability","exploitdb":"17790","created_at":"2014-07-15T17:17:17.635Z","updated_at":"2014-07-15T17:17:17.635Z"}]}},{"knr-author-list-widget":{"vulnerabilities":[{"id":88654,"title":"KNR Author List Widget \u003c= 2.0.0 - SQL Injection Vulnerability","exploitdb":"17791","created_at":"2014-07-15T17:17:17.681Z","updated_at":"2014-07-15T17:17:17.681Z"}]}},{"scormcloud":{"vulnerabilities":[{"id":88655,"title":"SCORM Cloud \u003c= 1.0.6.6 - SQL Injection Vulnerability","exploitdb":"17793","created_at":"2014-07-15T17:17:17.726Z","updated_at":"2014-07-15T17:17:17.726Z"}]}},{"eventify":{"vulnerabilities":[{"id":88656,"title":"Eventify - Simple Events \u003c= 1.7.f - SQL Injection Vulnerability","exploitdb":"17794","created_at":"2014-07-15T17:17:17.773Z","updated_at":"2014-07-15T17:17:17.773Z"}]}},{"paid-downloads":{"vulnerabilities":[{"id":88657,"title":"Paid Downloads \u003c= 2.01 - SQL Injection Vulnerability","exploitdb":"17797","created_at":"2014-07-15T17:17:17.822Z","updated_at":"2014-07-15T17:17:17.822Z"}]}},{"community-events":{"vulnerabilities":[{"id":88658,"title":"Community Events \u003c= 1.2.1 - SQL Injection Vulnerability","exploitdb":"17798","created_at":"2014-07-15T17:17:17.869Z","updated_at":"2014-07-15T17:17:17.869Z"}]}},{"1-flash-gallery":{"vulnerabilities":[{"id":88659,"title":"1-flash-gallery \u003c= 1.9.0 - XSS in ZeroClipboard.swf","url":"http://1337day.com/exploit/20396","created_at":"2014-07-15T17:17:17.922Z","updated_at":"2014-07-15T17:17:17.922Z"},{"id":88660,"title":"1 Flash Gallery - Arbiraty File Upload Exploit (MSF)","exploitdb":"17801","created_at":"2014-07-15T17:17:17.970Z","updated_at":"2014-07-15T17:17:17.970Z"}]}},{"wp-filebase":{"vulnerabilities":[{"id":88661,"title":"WP-Filebase Download Manager 0.3.0.02 - class/Admin.php GetFileHash Function Remote Command Execution","url":"http://www.securityfocus.com/bid/66341","osvdb":"105039","secunia":"57456","created_at":"2014-07-15T17:17:18.016Z","updated_at":"2014-07-15T17:17:18.016Z","fixed_in":"0.3.0.03"},{"id":88662,"title":"WP-Filebase 0.2.9.24- Unspecified Vulnerabilities","url":"http://xforce.iss.net/xforce/xfdb/80034","osvdb":"87294","secunia":"51269","created_at":"2014-07-15T17:17:18.061Z","updated_at":"2014-07-15T17:17:18.061Z","fixed_in":"0.2.9.25"},{"id":88663,"title":"WP-Filebase Download Manager \u003c= 0.2.9 - wpfb-ajax.php base Parameter SQL Injection","osvdb":"75308","secunia":"45931","exploitdb":"17808","created_at":"2014-07-15T17:17:18.106Z","updated_at":"2014-07-15T17:17:18.106Z"}]}},{"a-to-z-category-listing":{"vulnerabilities":[{"id":88664,"title":"A to Z Category Listing \u003c= 1.3 - SQL Injection Vulnerability","exploitdb":"17809","created_at":"2014-07-15T17:17:18.156Z","updated_at":"2014-07-15T17:17:18.156Z"}]}},{"wp-e-commerce":{"vulnerabilities":[{"id":88665,"title":"WP e-Commerce 3.8.6 - wpsc-cart_widget.php cart_messages Parameter XSS","osvdb":"74295","secunia":"45513","created_at":"2014-07-15T17:17:18.209Z","updated_at":"2014-07-15T17:17:18.209Z","fixed_in":"3.8.8"},{"id":88666,"title":"WP e-Commerce \u003c= 3.8.6 - SQL Injection Vulnerability","exploitdb":"17832","created_at":"2014-07-15T17:17:18.260Z","updated_at":"2014-07-15T17:17:18.260Z"},{"id":88667,"title":"WP-e-Commerce 3.8.9.5 - Cross Site Scripting Vulnerability","url":"http://1337day.com/exploit/20517","created_at":"2014-07-15T17:17:18.306Z","updated_at":"2014-07-15T17:17:18.306Z"},{"id":88668,"title":"WP-e-Commerce 3.8.9.5 - display-sales-logs.php c Parameter Remote Code Execution","url":"http://packetstormsecurity.com/files/124921/","osvdb":"102484","created_at":"2014-07-15T17:17:18.356Z","updated_at":"2014-07-15T17:17:18.356Z"},{"id":88669,"title":"WP-e-Commerce 3.8.9.5 - misc.functions.php image_name Parameter Local File Inclusion","url":"http://packetstormsecurity.com/files/124921/","osvdb":"102485","created_at":"2014-07-15T17:17:18.402Z","updated_at":"2014-07-15T17:17:18.402Z"},{"id":88670,"title":"WP-e-Commerce 3.8.9.5 - ajax.php wpsc_action Parameter Remote Code Execution","url":"http://packetstormsecurity.com/files/124921/","osvdb":"102486","created_at":"2014-07-15T17:17:18.447Z","updated_at":"2014-07-15T17:17:18.447Z"},{"id":88671,"title":"WP-e-Commerce 3.8.9.5 - save-data.functions.php GIF File Upload","url":"http://packetstormsecurity.com/files/124921/","osvdb":"102497","created_at":"2014-07-15T17:17:18.503Z","updated_at":"2014-07-15T17:17:18.503Z"}]}},{"filedownload":{"vulnerabilities":[{"id":88672,"title":"Filedownload 0.1 - (download.php) Remote File Disclosure Vulnerability","exploitdb":"17858","created_at":"2014-07-15T17:17:18.555Z","updated_at":"2014-07-15T17:17:18.555Z"}]}},{"thecartpress":{"vulnerabilities":[{"id":88673,"title":"TheCartPress \u003c= 1.6 - Cross Site Sripting","url":"http://packetstormsecurity.com/files/108272/","created_at":"2014-07-15T17:17:18.604Z","updated_at":"2014-07-15T17:17:18.604Z"},{"id":88674,"title":"TheCartPress 1.1.1 - Remote File Inclusion","exploitdb":"17860","created_at":"2014-07-15T17:17:18.652Z","updated_at":"2014-07-15T17:17:18.652Z"}]}},{"wpeasystats":{"vulnerabilities":[{"id":88675,"title":"WPEasyStats 1.8 - Remote File Inclusion","exploitdb":"17862","created_at":"2014-07-15T17:17:18.700Z","updated_at":"2014-07-15T17:17:18.700Z"}]}},{"annonces":{"vulnerabilities":[{"id":88676,"title":"Annonces 1.2.0.1 - admin/theme.php File Upload PHP Code Execution","url":"http://packetstormsecurity.com/files/113637/","osvdb":"82948","secunia":"49488","created_at":"2014-07-15T17:17:18.748Z","updated_at":"2014-07-15T17:17:18.748Z"}]}},{"livesig":{"vulnerabilities":[{"id":88677,"title":"Livesig 0.4 - Remote File Inclusion","exploitdb":"17864","created_at":"2014-07-15T17:17:18.794Z","updated_at":"2014-07-15T17:17:18.794Z"}]}},{"disclosure-policy-plugin":{"vulnerabilities":[{"id":88678,"title":"Disclosure Policy 1.0 - Remote File Inclusion","exploitdb":"17865","created_at":"2014-07-15T17:17:18.839Z","updated_at":"2014-07-15T17:17:18.839Z"}]}},{"mailz":{"vulnerabilities":[{"id":88679,"title":"Mailing List 1.3.2 - Remote File Inclusion","exploitdb":"17866","created_at":"2014-07-15T17:17:18.887Z","updated_at":"2014-07-15T17:17:18.887Z"},{"id":88680,"title":"Mailing List - Arbitrary file download","exploitdb":"18276","created_at":"2014-07-15T17:17:18.934Z","updated_at":"2014-07-15T17:17:18.934Z","fixed_in":"1.4.1"}]}},{"g-web-shop":{"vulnerabilities":[{"id":88681,"title":"Zingiri Web Shop 2.2.0 - Remote File Inclusion","exploitdb":"17867","created_at":"2014-07-15T17:17:18.982Z","updated_at":"2014-07-15T17:17:18.982Z"},{"id":88682,"title":"Zingiri Web Shop \u003c= 2.2.3 - Remote Code Execution","exploitdb":"18111","created_at":"2014-07-15T17:17:19.032Z","updated_at":"2014-07-15T17:17:19.032Z"}]}},{"mini-mail-dashboard-widget":{"vulnerabilities":[{"id":88683,"title":"Mini Mail Dashboard Widget 1.36 - wp-mini-mail.php abspath Parameter Remote File Inclusion","osvdb":"75402","secunia":"45953","exploitdb":"17868","created_at":"2014-07-15T17:17:19.079Z","updated_at":"2014-07-15T17:17:19.079Z","fixed_in":"1.37"},{"id":88684,"title":"Mini Mail Dashboard Widget 1.42 - Message Body XSS","osvdb":"85135","exploitdb":"20358","created_at":"2014-07-15T17:17:19.126Z","updated_at":"2014-07-15T17:17:19.126Z","fixed_in":"1.43"}]}},{"relocate-upload":{"vulnerabilities":[{"id":88685,"title":"Relocate Upload 0.14 - Remote File Inclusion","exploitdb":"17869","created_at":"2014-07-15T17:17:19.172Z","updated_at":"2014-07-15T17:17:19.172Z"}]}},{"category-grid-view-gallery":{"vulnerabilities":[{"id":88686,"title":"Category Grid View Gallery 0.1.1 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.218Z","updated_at":"2014-07-15T17:17:19.218Z"},{"id":88687,"title":"Category Grid View Gallery 2.3.1 - CatGridPost.php ID Parameter XSS","url":"http://packetstormsecurity.com/files/122259/","osvdb":"94805","cve":"2013-4117","secunia":"54035","created_at":"2014-07-15T17:17:19.265Z","updated_at":"2014-07-15T17:17:19.265Z","fixed_in":"2.3.3"}]}},{"auto-attachments":{"vulnerabilities":[{"id":88688,"title":"Auto Attachments 0.2.9 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.311Z","updated_at":"2014-07-15T17:17:19.311Z"}]}},{"wp-marketplace":{"vulnerabilities":[{"id":88689,"title":"WP Marketplace 1.1.0 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.357Z","updated_at":"2014-07-15T17:17:19.357Z"}]}},{"dp-thumbnail":{"vulnerabilities":[{"id":88690,"title":"DP Thumbnail 1.0 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.402Z","updated_at":"2014-07-15T17:17:19.402Z"}]}},{"vk-gallery":{"vulnerabilities":[{"id":88691,"title":"Vk Gallery 1.1.0 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.449Z","updated_at":"2014-07-15T17:17:19.449Z"}]}},{"rekt-slideshow":{"vulnerabilities":[{"id":88692,"title":"Rekt Slideshow 1.0.5 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.497Z","updated_at":"2014-07-15T17:17:19.497Z"}]}},{"cac-featured-content":{"vulnerabilities":[{"id":88693,"title":"CAC Featured Content 0.8 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.545Z","updated_at":"2014-07-15T17:17:19.545Z"}]}},{"rent-a-car":{"vulnerabilities":[{"id":88694,"title":"Rent A Car 1.0 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.589Z","updated_at":"2014-07-15T17:17:19.589Z"}]}},{"lisl-last-image-slider":{"vulnerabilities":[{"id":88695,"title":"LISL Last Image Slider 1.0 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.635Z","updated_at":"2014-07-15T17:17:19.635Z"}]}},{"islidex":{"vulnerabilities":[{"id":88696,"title":"Islidex 2.7 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.680Z","updated_at":"2014-07-15T17:17:19.680Z"}]}},{"kino-gallery":{"vulnerabilities":[{"id":88697,"title":"Kino Gallery 1.0 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.725Z","updated_at":"2014-07-15T17:17:19.725Z"}]}},{"cms-pack-cache":{"vulnerabilities":[{"id":88698,"title":"Cms Pack 1.3 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.770Z","updated_at":"2014-07-15T17:17:19.770Z"}]}},{"a-gallery":{"vulnerabilities":[{"id":88699,"title":"A Gallery 0.9 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.815Z","updated_at":"2014-07-15T17:17:19.815Z"}]}},{"category-list-portfolio-page":{"vulnerabilities":[{"id":88700,"title":"Category List Portfolio Page 0.9 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.861Z","updated_at":"2014-07-15T17:17:19.861Z"}]}},{"really-easy-slider":{"vulnerabilities":[{"id":88701,"title":"Really Easy Slider 0.1 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.907Z","updated_at":"2014-07-15T17:17:19.907Z"}]}},{"verve-meta-boxes":{"vulnerabilities":[{"id":88702,"title":"Verve Meta Boxes 1.2.8 - Shell Upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:19.955Z","updated_at":"2014-07-15T17:17:19.955Z"}]}},{"user-avatar":{"vulnerabilities":[{"id":88703,"title":"User Avatar 1.3.7 - shell upload vulnerability","exploitdb":"17872","created_at":"2014-07-15T17:17:20.000Z","updated_at":"2014-07-15T17:17:20.000Z"}]}},{"extend-wordpress":{"vulnerabilities":[{"id":88704,"title":"Extend 1.3.7 - Shell Upload vulnerability","osvdb":"75638","cve":"2011-4106","exploitdb":"17872","created_at":"2014-07-15T17:17:20.046Z","updated_at":"2014-07-15T17:17:20.046Z"}]}},{"adrotate":{"vulnerabilities":[{"id":88705,"title":"AdRotate \u003c= 3.9.4 - clicktracker.php track Parameter SQL Injection","url":"http://packetstormsecurity.com/files/125330/","osvdb":"103578","cve":"2014-1854","secunia":"57079","exploitdb":"31834","created_at":"2014-07-15T17:17:20.094Z","updated_at":"2014-07-15T17:17:20.094Z","fixed_in":"3.9.5"},{"id":88706,"title":"AdRotate \u003c= 3.6.6 - SQL Injection Vulnerability","osvdb":"77507","cve":"2011-4671","secunia":"46814","exploitdb":"18114","created_at":"2014-07-15T17:17:20.140Z","updated_at":"2014-07-15T17:17:20.140Z","fixed_in":"3.6.8"},{"id":88707,"title":"AdRotate \u003c= 3.6.5 - SQL Injection Vulnerability","url":"http://unconciousmind.blogspot.com/2011/09/wordpress-adrotate-plugin-365-sql.html","osvdb":"77507","cve":"2011-4671","exploitdb":"17888","created_at":"2014-07-15T17:17:20.186Z","updated_at":"2014-07-15T17:17:20.186Z","fixed_in":"3.6.8"}]}},{"wp-spamfree":{"vulnerabilities":[{"id":88708,"title":"WP-SpamFree 3.2.1 - Spam SQL Injection Vulnerability","exploitdb":"17970","created_at":"2014-07-15T17:17:20.233Z","updated_at":"2014-07-15T17:17:20.233Z"}]}},{"gd-star-rating":{"vulnerabilities":[{"id":88709,"title":"GD Star Rating 1.9.22 - gd-star-rating-stats.php s Parameter SQL Injection","url":"http://packetstormsecurity.com/files/125932/,http://seclists.org/fulldisclosure/2014/Mar/399,https://security.dxw.com/advisories/xss-csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/","osvdb":"105085","created_at":"2014-07-15T17:17:20.280Z","updated_at":"2014-07-15T17:17:20.280Z"},{"id":88710,"title":"GD Star Rating 1.9.22 - gd-star-rating-stats.php Setting Manipulation CSRF","url":"http://packetstormsecurity.com/files/125932/,http://seclists.org/fulldisclosure/2014/Mar/399,https://security.dxw.com/advisories/xss-csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/","osvdb":"105086","secunia":"57667","created_at":"2014-07-15T17:17:20.328Z","updated_at":"2014-07-15T17:17:20.328Z"},{"id":88711,"title":"GD Star Rating 1.9.18 - Export Security Bypass Security Issue","osvdb":"105086","secunia":"49850","created_at":"2014-07-15T17:17:20.376Z","updated_at":"2014-07-15T17:17:20.376Z","fixed_in":"1.9.19"},{"id":88712,"title":"GD Star Rating \u003c= 1.9.16 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/112702/","created_at":"2014-07-15T17:17:20.423Z","updated_at":"2014-07-15T17:17:20.423Z"},{"id":88713,"title":"GD Star Rating \u003c= 1.9.10 - gd-star-rating/export.php de Parameter SQL Injection","osvdb":"83466","exploitdb":"17973","created_at":"2014-07-15T17:17:20.479Z","updated_at":"2014-07-15T17:17:20.479Z"},{"id":88714,"title":"GD Star Rating 1.9.7 - gd-star-rating/widgets/widget_top.php wpfn Parameter XSS","url":"http://seclists.org/bugtraq/2011/Feb/219","osvdb":"71060","secunia":"43403","created_at":"2014-07-15T17:17:20.526Z","updated_at":"2014-07-15T17:17:20.526Z"}]}},{"contact-form-wordpress":{"vulnerabilities":[{"id":88715,"title":"Contact Form \u003c= 2.7.5 - SQL Injection","exploitdb":"17980","created_at":"2014-07-15T17:17:20.571Z","updated_at":"2014-07-15T17:17:20.571Z"}]}},{"wp-photo-album-plus":{"vulnerabilities":[{"id":88716,"title":"WP Photo Album Plus \u003c= 4.1.1 - SQL Injection","exploitdb":"17983","created_at":"2014-07-15T17:17:20.615Z","updated_at":"2014-07-15T17:17:20.615Z"},{"id":88717,"title":"WP Photo Album Plus \u003c= 4.8.12 - wp-photo-album-plus.php wppa-searchstring XSS","osvdb":"88851","secunia":"51669,51679","created_at":"2014-07-15T17:17:20.663Z","updated_at":"2014-07-15T17:17:20.663Z"},{"id":88718,"title":"WP Photo Album Plus - Full Path Disclosure","url":"http://1337day.com/exploit/20125","created_at":"2014-07-15T17:17:20.708Z","updated_at":"2014-07-15T17:17:20.708Z","fixed_in":"4.9.1"},{"id":88719,"title":"WP Photo Album Plus - index.php wppa-tag Parameter XSS","osvdb":"89165","secunia":"51829","created_at":"2014-07-15T17:17:20.755Z","updated_at":"2014-07-15T17:17:20.755Z","fixed_in":"4.9.3"},{"id":88720,"title":"WP Photo Album Plus - \"commentid\" Cross-Site Scripting Vulnerability","osvdb":"93033","cve":"2013-3254","secunia":"53105","created_at":"2014-07-15T17:17:20.802Z","updated_at":"2014-07-15T17:17:20.802Z","fixed_in":"5.0.3"},{"id":88721,"title":"WP Photo Album Plus - wp-admin/admin.php edit_id Parameter XSS","osvdb":"94465","secunia":"53915","created_at":"2014-07-15T17:17:20.847Z","updated_at":"2014-07-15T17:17:20.847Z","fixed_in":"5.0.11"}]}},{"backwpup":{"vulnerabilities":[{"id":88722,"title":"BackWPUp 2.1.4 - Code Execution","exploitdb":"17987","created_at":"2014-07-15T17:17:20.895Z","updated_at":"2014-07-15T17:17:20.895Z"},{"id":88723,"title":"plugin BackWPup 1.5.2, 1.6.1, 1.7.1 - Remote and Local Code Execution Vulnerability","osvdb":"71481","created_at":"2014-07-15T17:17:20.941Z","updated_at":"2014-07-15T17:17:20.941Z"},{"id":88724,"title":"BackWPup 3.0.12 - wp-admin/admin.php tab Parameter XSS","url":"https://www.htbridge.com/advisory/HTB23161,http://packetstormsecurity.com/files/122916/","osvdb":"96505","cve":"2013-4626","secunia":"54515","created_at":"2014-07-15T17:17:20.988Z","updated_at":"2014-07-15T17:17:20.988Z","fixed_in":"3.0.13"}]}},{"portable-phpmyadmin":{"vulnerabilities":[{"id":88725,"title":"portable-phpMyAdmin - Authentication Bypass","osvdb":"88391","cve":"2012-5469","secunia":"51520","exploitdb":"23356","created_at":"2014-07-15T17:17:21.043Z","updated_at":"2014-07-15T17:17:21.043Z","fixed_in":"1.3.1"},{"id":88726,"title":"Portable phpMyAdmin - /pma/phpinfo.php Direct Request System Information Disclosure","url":"http://seclists.org/oss-sec/2013/q4/138","osvdb":"98766","created_at":"2014-07-15T17:17:21.087Z","updated_at":"2014-07-15T17:17:21.087Z"},{"id":88727,"title":"Portable phpMyAdmin 1.4.1 - Multiple Script Direct Request Authentication Bypass","url":"http://seclists.org/oss-sec/2013/q4/138","osvdb":"98767","cve":"2013-4454","secunia":"55270","created_at":"2014-07-15T17:17:21.135Z","updated_at":"2014-07-15T17:17:21.135Z"}]}},{"super-refer-a-friend":{"vulnerabilities":[{"id":88728,"title":"super-refer-a-friend - Full Path Disclosure","url":"http://1337day.com/exploit/20126","created_at":"2014-07-15T17:17:21.180Z","updated_at":"2014-07-15T17:17:21.180Z","fixed_in":"1.0"}]}},{"w3-total-cache":{"vulnerabilities":[{"id":88729,"title":"W3 Total Cache - Username and Hash Extract","url":"http://seclists.org/fulldisclosure/2012/Dec/242,https://github.com/FireFart/W3TotalCacheExploit","osvdb":"92742,92741","cve":"2012-6079,2012-6078","created_at":"2014-07-15T17:17:21.224Z","updated_at":"2014-07-15T17:17:21.224Z","metasploit":"auxiliary/gather/wp_w3_total_cache_hash_extract","fixed_in":"0.9.2.5"},{"id":88730,"title":"W3 Total Cache - Remote Code Execution","url":"http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/,http://wordpress.org/support/topic/pwn3d,http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html","osvdb":"92652","cve":"2013-2010","secunia":"53052","exploitdb":"25137","created_at":"2014-07-15T17:17:21.274Z","updated_at":"2014-07-15T17:17:21.274Z","metasploit":"exploits/unix/webapp/php_wordpress_total_cache","fixed_in":"0.9.2.9"}]}},{"wp-super-cache":{"vulnerabilities":[{"id":88731,"title":"WP-Super-Cache 1.3 - Remote Code Execution","url":"http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/,http://wordpress.org/support/topic/pwn3d,http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html","created_at":"2014-07-15T17:17:21.320Z","updated_at":"2014-07-15T17:17:21.320Z","fixed_in":"1.3.1"},{"id":88732,"title":"WP Super Cache 1.3 - trunk/wp-cache.php wp_nonce_url Function URI XSS","osvdb":"92832","cve":"2013-2008","created_at":"2014-07-15T17:17:21.365Z","updated_at":"2014-07-15T17:17:21.365Z","fixed_in":"1.3.1"},{"id":88733,"title":"WP Super Cache 1.3 - trunk/plugins/wptouch.php URI XSS","osvdb":"92831","cve":"2013-2008","created_at":"2014-07-15T17:17:21.411Z","updated_at":"2014-07-15T17:17:21.411Z","fixed_in":"1.3.1"},{"id":88734,"title":"WP Super Cache 1.3 - trunk/plugins/searchengine.php URI XSS","osvdb":"92830","cve":"2013-2008","created_at":"2014-07-15T17:17:21.457Z","updated_at":"2014-07-15T17:17:21.457Z","fixed_in":"1.3.1"},{"id":88735,"title":"WP Super Cache 1.3 - trunk/plugins/domain-mapping.php URI XSS","osvdb":"92829","cve":"2013-2008","created_at":"2014-07-15T17:17:21.505Z","updated_at":"2014-07-15T17:17:21.505Z","fixed_in":"1.3.1"},{"id":88736,"title":"WP Super Cache 1.3 - trunk/plugins/badbehaviour.php URI XSS","osvdb":"92828","cve":"2013-2008","created_at":"2014-07-15T17:17:21.557Z","updated_at":"2014-07-15T17:17:21.557Z","fixed_in":"1.3.1"},{"id":88737,"title":"WP Super Cache 1.3 - trunk/plugins/awaitingmoderation.php URI XSS","osvdb":"92827","cve":"2013-2008","created_at":"2014-07-15T17:17:21.602Z","updated_at":"2014-07-15T17:17:21.602Z","fixed_in":"1.3.1"}]}},{"ripe-hd-player":{"vulnerabilities":[{"id":88738,"title":"ripe-hd-player 1.0 - ripe-hd-player/config.php id Parameter SQL Injection","url":"http://xforce.iss.net/xforce/xfdb/81415","osvdb":"89437","exploitdb":"24229","created_at":"2014-07-15T17:17:21.650Z","updated_at":"2014-07-15T17:17:21.650Z"},{"id":88739,"title":"ripe-hd-player 1.0 - Multiple Script Direct Request Path Disclosure","url":"http://www.securityfocus.com/bid/57473,http://xforce.iss.net/xforce/xfdb/81414","osvdb":"89438","exploitdb":"24229","created_at":"2014-07-15T17:17:21.694Z","updated_at":"2014-07-15T17:17:21.694Z"}]}},{"floating-tweets":{"vulnerabilities":[{"id":88740,"title":"floating-tweets - persistent XSS","url":"http://packetstormsecurity.com/files/119499/,http://websecurity.com.ua/6023/","created_at":"2014-07-15T17:17:21.741Z","updated_at":"2014-07-15T17:17:21.741Z"},{"id":88741,"title":"floating-tweets - directory traversal","url":"http://packetstormsecurity.com/files/119499/,http://websecurity.com.ua/6023/","created_at":"2014-07-15T17:17:21.788Z","updated_at":"2014-07-15T17:17:21.788Z"}]}},{"ipfeuilledechou":{"vulnerabilities":[{"id":88742,"title":"ipfeuilledechou - SQL Injection Vulnerability","url":"http://www.exploit4arab.com/exploits/377,http://1337day.com/exploit/20206","created_at":"2014-07-15T17:17:21.835Z","updated_at":"2014-07-15T17:17:21.835Z"}]}},{"simple-login-log":{"vulnerabilities":[{"id":88743,"title":"Simple Login Log - XSS","secunia":"51780","created_at":"2014-07-15T17:17:21.884Z","updated_at":"2014-07-15T17:17:21.884Z","fixed_in":"0.9.4"},{"id":88744,"title":"Simple Login Log - SQL Injection","secunia":"51780","created_at":"2014-07-15T17:17:21.932Z","updated_at":"2014-07-15T17:17:21.932Z","fixed_in":"0.9.4"}]}},{"wp-slimstat":{"vulnerabilities":[{"id":88745,"title":"WP SlimStat 3.5.5 - Overview URI Stored XSS","osvdb":"104428","secunia":"57305","created_at":"2014-07-15T17:17:21.985Z","updated_at":"2014-07-15T17:17:21.985Z","fixed_in":"3.5.6"},{"id":88746,"title":"WP SlimStat 2.8.4 - wp-content/plugins/wp-slimstat/admin/view/panel1.php s Parameter XSS","osvdb":"89052","secunia":"51721","created_at":"2014-07-15T17:17:22.035Z","updated_at":"2014-07-15T17:17:22.035Z","fixed_in":"2.8.5"}]}},{"wp-slimstat-ex":{"vulnerabilities":[{"id":88747,"title":"SlimStat-Ex - Open Flash Chart Arbitrary File Creation Vulnerability","url":"http://packetstormsecurity.com/files/123494/","secunia":"55160","created_at":"2014-07-15T17:17:22.094Z","updated_at":"2014-07-15T17:17:22.094Z"}]}},{"browser-rejector":{"vulnerabilities":[{"id":88748,"title":"Browser Rejector - Remote and Local File Inclusion","osvdb":"89053","secunia":"51739","created_at":"2014-07-15T17:17:22.141Z","updated_at":"2014-07-15T17:17:22.141Z","fixed_in":"2.11"}]}},{"wp-file-uploader":{"vulnerabilities":[{"id":88749,"title":"File Uploader - PHP File Upload Vulnerability","url":"http://la.usch.io/2013/01/21/wordpress-file-uploader-plugin-php-file-upload-vulnerability/","created_at":"2014-07-15T17:17:22.186Z","updated_at":"2014-07-15T17:17:22.186Z"}]}},{"cardoza-wordpress-poll":{"vulnerabilities":[{"id":88750,"title":"Cardoza WordPress poll 34.05 - Multiple External Function Remote Poll Manipulation","url":"http://seclists.org/bugtraq/2013/Jan/86,http://packetstormsecurity.com/files/119736/","osvdb":"89443","cve":"2013-1401","secunia":"51925","created_at":"2014-07-15T17:17:22.231Z","updated_at":"2014-07-15T17:17:22.231Z","fixed_in":"34.06"},{"id":88751,"title":"Cardoza WordPress poll - CWPPoll.js Multiple Method pollid Parameter SQL Injection","url":"http://packetstormsecurity.com/files/119736/,http://www.girlinthemiddle.net/2013/01/multiple-sql-injection-vulnerabilities.html,http://seclists.org/bugtraq/2013/Jan/86","osvdb":"89444","cve":"2013-1400","created_at":"2014-07-15T17:17:22.278Z","updated_at":"2014-07-15T17:17:22.278Z"},{"id":88752,"title":"Cardoza WordPress poll - Multiple SQL Injection Vulnerabilities","secunia":"50910","created_at":"2014-07-15T17:17:22.326Z","updated_at":"2014-07-15T17:17:22.326Z","fixed_in":"33.6"}]}},{"devformatter":{"vulnerabilities":[{"id":88753,"title":"Developer Formatter 2013.0.1.40 - devformatter.php Multiple Action CSRF","url":"http://packetstormsecurity.com/files/119731/,http://seclists.org/bugtraq/2013/Jan/91,http://1337day.com/exploit/20210","osvdb":"89475","secunia":"51912","exploitdb":"24294","created_at":"2014-07-15T17:17:22.380Z","updated_at":"2014-07-15T17:17:22.380Z","fixed_in":"2013.0.1.41"},{"id":88754,"title":"Developer Formatter 2013.0.1.40 - devformatter.php Multiple Field XSS","url":"http://seclists.org/bugtraq/2013/Jan/91","osvdb":"89474","created_at":"2014-07-15T17:17:22.425Z","updated_at":"2014-07-15T17:17:22.425Z","fixed_in":"2013.0.1.41"}]}},{"dvs-custom-notification":{"vulnerabilities":[{"id":88755,"title":"DVS Custom Notification - Cross-Site Request Forgery Vulnerability","osvdb":"89441","cve":"2012-4921","secunia":"51531","created_at":"2014-07-15T17:17:22.469Z","updated_at":"2014-07-15T17:17:22.469Z","fixed_in":"1.0.1"}]}},{"events-manager":{"vulnerabilities":[{"id":88756,"title":"Events Manager 5.5.1 - Multiple Unspecified XSS Vulnerabilities","osvdb":"98198","secunia":"55182","created_at":"2014-07-15T17:17:22.515Z","updated_at":"2014-07-15T17:17:22.515Z","fixed_in":"5.5.2"},{"id":88757,"title":"Events Manager 5.3.8 - Event Search Form em_search Parameter XSS","url":"http://www.securityfocus.com/bid/60078","osvdb":"93556","secunia":"53478","created_at":"2014-07-15T17:17:22.562Z","updated_at":"2014-07-15T17:17:22.562Z","fixed_in":"5.3.9"},{"id":88758,"title":"Events Manager 5.3.8 - wp-admin/edit.php author Parameter XSS","url":"http://www.securityfocus.com/bid/60078","osvdb":"93557","secunia":"53478","created_at":"2014-07-15T17:17:22.609Z","updated_at":"2014-07-15T17:17:22.609Z","fixed_in":"5.3.9"},{"id":88759,"title":"Events Manager 5.3.8 - Event Editing redirect_to Parameter XSS","url":"http://www.securityfocus.com/bid/60078","osvdb":"93558","secunia":"53478","created_at":"2014-07-15T17:17:22.656Z","updated_at":"2014-07-15T17:17:22.656Z","fixed_in":"5.3.9"},{"id":88760,"title":"Events Manager 5.3.5 - wp-admin/admin-ajax.php dbem_phone Parameter XSS","osvdb":"90913","secunia":"52475","created_at":"2014-07-15T17:17:22.703Z","updated_at":"2014-07-15T17:17:22.703Z","fixed_in":"5.3.6"},{"id":88761,"title":"Events Manager 5.3.5 - index.php event_owner_name Parameter XSS","osvdb":"90914","secunia":"52475","created_at":"2014-07-15T17:17:22.751Z","updated_at":"2014-07-15T17:17:22.751Z","fixed_in":"5.3.6"},{"id":88762,"title":"Events Manager 5.3.5 - wp-admin/post.php Multiple Parameter XSS","osvdb":"90915","secunia":"52475","created_at":"2014-07-15T17:17:22.796Z","updated_at":"2014-07-15T17:17:22.796Z","fixed_in":"5.3.6"},{"id":88763,"title":"Events Manager 5.3.3 - templates/forms/bookingform/booking-fields.php Multiple Parameter XSS","url":"http://packetstormsecurity.com/files/120688/,http://www.securityfocus.com/bid/57477","osvdb":"89488","cve":"2013-1407","secunia":"51869","created_at":"2014-07-15T17:17:22.842Z","updated_at":"2014-07-15T17:17:22.842Z","fixed_in":"5.3.4"},{"id":88764,"title":"Events Manager 5.3.3 - templates/templates/events-search.php Multiple Parameter XSS","url":"http://packetstormsecurity.com/files/120688/,http://www.securityfocus.com/bid/57477","osvdb":"89487","cve":"2013-1407","secunia":"51869","created_at":"2014-07-15T17:17:22.890Z","updated_at":"2014-07-15T17:17:22.890Z","fixed_in":"5.3.4"},{"id":88765,"title":"Events Manager 5.3.3 - XSS classes/em-bookings-table.php wp_nonce Parameter XSS","url":"http://packetstormsecurity.com/files/120688/,http://www.securityfocus.com/bid/57477","osvdb":"89486","cve":"2013-1407","secunia":"51869","created_at":"2014-07-15T17:17:22.935Z","updated_at":"2014-07-15T17:17:22.935Z","fixed_in":"5.3.4"}]}},{"solvemedia":{"vulnerabilities":[{"id":88766,"title":"SolveMedia 1.1.0 - plugins.php API Key Manipulation CSRF","url":"http://1337day.com/exploit/20222","osvdb":"89585","secunia":"51927","exploitdb":"24364","created_at":"2014-07-15T17:17:22.980Z","updated_at":"2014-07-15T17:17:22.980Z","fixed_in":"1.1.1"},{"id":88767,"title":"SolveMedia 1.1.0 - solvemedia.admin.inc Admin Options Page CSRF","osvdb":"106320","created_at":"2014-07-15T17:17:23.025Z","updated_at":"2014-07-15T17:17:23.025Z","fixed_in":"1.1.1"}]}},{"usc-e-shop":{"vulnerabilities":[{"id":88768,"title":"Welcart e-Commerce 1.3.12 - wp-admin/admin-ajax.php Multiple Parameter DOM-Based XSS","url":"http://packetstormsecurity.com/files/125513/,http://www.securityfocus.com/bid/65954","osvdb":"103956","secunia":"57222","created_at":"2014-07-15T17:17:23.071Z","updated_at":"2014-07-15T17:17:23.071Z"},{"id":88769,"title":"Welcart e-Commerce 1.3.12 - purchase_limit Parameter DOM-based XSS","url":"http://packetstormsecurity.com/files/125513/,http://www.securityfocus.com/bid/65954","osvdb":"103955","created_at":"2014-07-15T17:17:23.116Z","updated_at":"2014-07-15T17:17:23.116Z"},{"id":88770,"title":"Welcart e-Commerce 1.3.12 - wp-admin/admin.php Multiple Parameter SQL Injection","url":"http://packetstormsecurity.com/files/125513/,http://www.securityfocus.com/bid/65954","osvdb":"103954","created_at":"2014-07-15T17:17:23.165Z","updated_at":"2014-07-15T17:17:23.165Z"},{"id":88771,"title":"Welcart e-Commerce - wp-admin/admin.php Multiple Parameter SQL Injection","url":"http://packetstormsecurity.com/files/125513/,http://www.securityfocus.com/bid/65954","osvdb":"103954","created_at":"2014-07-15T17:17:23.211Z","updated_at":"2014-07-15T17:17:23.211Z"},{"id":88772,"title":"Welcart e-Commerce - Cross-Site Scripting and Request Forgery Vulnerabilities","secunia":"51581","created_at":"2014-07-15T17:17:23.257Z","updated_at":"2014-07-15T17:17:23.257Z"}]}},{"knews":{"vulnerabilities":[{"id":88773,"title":"Knews 1.2.5 - Multilingual Newsletters Cross-Site Request Forgery Vulnerability","url":"http://www.securityfocus.com/bid/56926,http://xforce.iss.net/xforce/xfdb/80661","osvdb":"88427","secunia":"51543","created_at":"2014-07-15T17:17:23.306Z","updated_at":"2014-07-15T17:17:23.306Z","fixed_in":"1.2.6"},{"id":88774,"title":"Knews 1.2.5 - Unspecified XSS","osvdb":"88426","created_at":"2014-07-15T17:17:23.351Z","updated_at":"2014-07-15T17:17:23.351Z","fixed_in":"1.2.6"},{"id":88775,"title":"Knews 1.1.0 - wysiwyg/fontpicker/index.php ff Parameter XSS","osvdb":"83643","secunia":"49825","created_at":"2014-07-15T17:17:23.398Z","updated_at":"2014-07-15T17:17:23.398Z","fixed_in":"1.1.1"}]}},{"video-lead-form":{"vulnerabilities":[{"id":88776,"title":"Video Lead Form - \"errMsg\" Cross-Site Scripting Vulnerability","secunia":"51419","created_at":"2014-07-15T17:17:23.445Z","updated_at":"2014-07-15T17:17:23.445Z"}]}},{"sagepay-direct-for-woocommerce-payment-gateway":{"vulnerabilities":[{"id":88777,"title":"WooCommerce SagePay Direct Payment Gateway 0.1.6.6 - pages/3DRedirect.php Multiple Parameter Reflected XSS","osvdb":"102882","secunia":"56801","created_at":"2014-07-15T17:17:23.494Z","updated_at":"2014-07-15T17:17:23.494Z","fixed_in":"0.1.6.7"},{"id":88778,"title":"WooCommerce SagePay Direct Payment Gateway 0.1.6.6 - pages/3DCallBack.php Multiple Parameter Reflected XSS","osvdb":"102746","secunia":"56801","created_at":"2014-07-15T17:17:23.546Z","updated_at":"2014-07-15T17:17:23.546Z","fixed_in":"0.1.6.7"},{"id":88779,"title":"WooCommerce SagePay Direct Payment Gateway 0.1.6.6 - pages/3DComplete.php Multiple Parameter Reflected XSS","osvdb":"102747","secunia":"56801","created_at":"2014-07-15T17:17:23.598Z","updated_at":"2014-07-15T17:17:23.598Z","fixed_in":"0.1.6.7"}]}},{"woocommerce-predictive-search":{"vulnerabilities":[{"id":88780,"title":"WooCommerce Predictive Search - index.php rs Parameter XSS","url":"http://www.securityfocus.com/bid/56703","osvdb":"87890","secunia":"51385","created_at":"2014-07-15T17:17:23.645Z","updated_at":"2014-07-15T17:17:23.645Z","fixed_in":"1.0.6"}]}},{"woocommerce":{"vulnerabilities":[{"id":88781,"title":"WooCommerce 2.0.17 - hide-wc-extensions-message Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/123684/,http://www.securityfocus.com/bid/63228","osvdb":"98754","created_at":"2014-07-15T17:17:23.691Z","updated_at":"2014-07-15T17:17:23.691Z","fixed_in":"2.0.17"},{"id":88782,"title":"WooCommerce 2.0.12 - index.php calc_shipping_state Parameter XSS","url":"http://packetstormsecurity.com/files/122465/","osvdb":"95480","secunia":"53930","created_at":"2014-07-15T17:17:23.736Z","updated_at":"2014-07-15T17:17:23.736Z","fixed_in":"2.0.13"}]}},{"wp-e-commerce-predictive-search":{"vulnerabilities":[{"id":88783,"title":"WP e-Commerce Predictive Search - \"rs\" Cross-Site Scripting Vulnerability","secunia":"51384","created_at":"2014-07-15T17:17:23.781Z","updated_at":"2014-07-15T17:17:23.781Z"}]}},{"wp-tiger":{"vulnerabilities":[{"id":88784,"title":"vTiger - CRM Lead Capture Unspecified Vulnerability","secunia":"51305","created_at":"2014-07-15T17:17:23.825Z","updated_at":"2014-07-15T17:17:23.825Z","fixed_in":"1.1.0"}]}},{"wp-postviews":{"vulnerabilities":[{"id":88785,"title":"WP-PostViews - \"search_input\" Cross-Site Scripting Vulnerability","secunia":"50982","created_at":"2014-07-15T17:17:23.870Z","updated_at":"2014-07-15T17:17:23.870Z"},{"id":88786,"title":"WP-PostViews 1.62 - Setting Manipulation CSRF","osvdb":"93096","cve":"2013-3252","secunia":"53127","created_at":"2014-07-15T17:17:23.919Z","updated_at":"2014-07-15T17:17:23.919Z","fixed_in":"1.63"}]}},{"dx-contribute":{"vulnerabilities":[{"id":88787,"title":"DX-Contribute - Cross-Site Request Forgery Vulnerability","secunia":"51082","created_at":"2014-07-15T17:17:23.965Z","updated_at":"2014-07-15T17:17:23.965Z"}]}},{"wysija-newsletters":{"vulnerabilities":[{"id":88788,"title":"MailPoet (Wysija Newsletters) - Remote File Upload","url":"http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html","created_at":"2014-07-15T17:17:24.011Z","updated_at":"2014-07-15T17:17:24.011Z","metasploit":"exploit/unix/webapp/wp_wysija_newsletters_upload","fixed_in":"2.6.8"},{"id":88789,"title":"Wysija Newsletters 2.2 - SQL Injection Vulnerability","url":"https://www.htbridge.com/advisory/HTB23140,http://packetstormsecurity.com/files/120089/,http://seclists.org/bugtraq/2013/Feb/29,http://cxsecurity.com/issue/WLB-2013020039","osvdb":"89924","cve":"2013-1408","created_at":"2014-07-15T17:17:24.057Z","updated_at":"2014-07-15T17:17:24.057Z","fixed_in":"2.2.1"},{"id":88790,"title":"Wysija Newsletters - swfupload Cross-Site Scripting Vulnerability","url":"http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html","secunia":"51249","created_at":"2014-07-15T17:17:24.121Z","updated_at":"2014-07-15T17:17:24.121Z","fixed_in":"2.1.7"}]}},{"hitasoft_player":{"vulnerabilities":[{"id":88791,"title":"Hitasoft FLV Player - \"id\" SQL Injection Vulnerability","secunia":"51179","created_at":"2014-07-15T17:17:24.173Z","updated_at":"2014-07-15T17:17:24.173Z"}]}},{"spider-calendar":{"vulnerabilities":[{"id":88792,"title":"Spider Calendar 1.3.0 - Multiple Vulnerabilities","osvdb":"93584","secunia":"53481","exploitdb":"25723","created_at":"2014-07-15T17:17:24.220Z","updated_at":"2014-07-15T17:17:24.220Z"},{"id":88793,"title":"Spider Calendar 1.1.0 - \"many_sp_calendar\" Cross-Site Scripting Vulnerability","osvdb":"86604","secunia":"50981","created_at":"2014-07-15T17:17:24.266Z","updated_at":"2014-07-15T17:17:24.266Z","fixed_in":"1.1.1"},{"id":88794,"title":"Spider Calendar 1.0.1 - front_end/spidercalendarbig.php date Parameter XSS","url":"http://packetstormsecurity.org/files/117078/","osvdb":"85897","secunia":"50812","exploitdb":"21715","created_at":"2014-07-15T17:17:24.322Z","updated_at":"2014-07-15T17:17:24.322Z","fixed_in":"1.1.3"},{"id":88795,"title":"Spider Calendar 1.0.1 - spidercalendarbig_seemore.php calendar_id Parameter SQL Injection","url":"http://packetstormsecurity.org/files/117078/","osvdb":"85898","secunia":"50812","exploitdb":"21715","created_at":"2014-07-15T17:17:24.367Z","updated_at":"2014-07-15T17:17:24.367Z","fixed_in":"1.1.3"}]}},{"dynamic-font-replacement-4wp":{"vulnerabilities":[{"id":88796,"title":"Dynamic Font Replacement 1.3 - SQL Injection Vulnerability","url":"http://1337day.com/exploit/20239","created_at":"2014-07-15T17:17:24.412Z","updated_at":"2014-07-15T17:17:24.412Z"}]}},{"form":{"vulnerabilities":[{"id":88797,"title":"Zingiri Form Builder - \"error\" Cross-Site Scripting Vulnerability","secunia":"50983","created_at":"2014-07-15T17:17:24.459Z","updated_at":"2014-07-15T17:17:24.459Z","fixed_in":"1.2.1"}]}},{"white-label-cms":{"vulnerabilities":[{"id":88798,"title":"White Label CMS - Cross-Site Request Forgery Vulnerability","secunia":"50487","created_at":"2014-07-15T17:17:24.504Z","updated_at":"2014-07-15T17:17:24.504Z","fixed_in":"1.5.1"}]}},{"download-shortcode":{"vulnerabilities":[{"id":88799,"title":"Download Shortcode - \"file\" Arbitrary File Disclosure Vulnerability","secunia":"50924","created_at":"2014-07-15T17:17:24.552Z","updated_at":"2014-07-15T17:17:24.552Z","fixed_in":"0.2.1"}]}},{"eshop-magic":{"vulnerabilities":[{"id":88800,"title":"eShop Magic 0.1 - eshop-magic/download.php file Parameter Traversal Arbitrary File Access","url":"http://xforce.iss.net/xforce/xfdb/79222","osvdb":"86155","secunia":"50933","created_at":"2014-07-15T17:17:24.597Z","updated_at":"2014-07-15T17:17:24.597Z","fixed_in":"0.2"}]}},{"pinterest-pin-it-button":{"vulnerabilities":[{"id":88801,"title":"Pinterest \"Pin It\" Button Lite 1.3.1 - Multiple Unspecified Vulnerabilities","osvdb":"85956","secunia":"50868","created_at":"2014-07-15T17:17:24.642Z","updated_at":"2014-07-15T17:17:24.642Z","fixed_in":"1.4.0"}]}},{"css-plus":{"vulnerabilities":[{"id":88802,"title":"CSS Plus 1.3.1 - Unspecified Vulnerabilities","osvdb":"85875","secunia":"50793","created_at":"2014-07-15T17:17:24.686Z","updated_at":"2014-07-15T17:17:24.686Z","fixed_in":"1.3.2"}]}},{"multisite-plugin-manager":{"vulnerabilities":[{"id":88803,"title":"Multisite plugin Manager 3.1.1 - Two Cross-Site Scripting Vulnerabilities","osvdb":"85818","secunia":"50762","created_at":"2014-07-15T17:17:24.731Z","updated_at":"2014-07-15T17:17:24.731Z","fixed_in":"3.1.2"}]}},{"abc-test":{"vulnerabilities":[{"id":88804,"title":"ABC Test - \"id\" Cross-Site Scripting Vulnerability","url":"http://scott-herbert.com/?p=142","osvdb":"85773","secunia":"50608","created_at":"2014-07-15T17:17:24.777Z","updated_at":"2014-07-15T17:17:24.777Z"}]}},{"token-manager":{"vulnerabilities":[{"id":88805,"title":"Token Manager 1.0.2 - \"tid\" Cross-Site Scripting Vulnerabilities","osvdb":"85738","secunia":"50722","created_at":"2014-07-15T17:17:24.826Z","updated_at":"2014-07-15T17:17:24.826Z"}]}},{"sexy-add-template":{"vulnerabilities":[{"id":88806,"title":"Sexy Add Template 1.0 - PHP Code Execution CSRF","osvdb":"85730","secunia":"50709","created_at":"2014-07-15T17:17:24.872Z","updated_at":"2014-07-15T17:17:24.872Z"}]}},{"notices":{"vulnerabilities":[{"id":88807,"title":"Notices Ticker 5.0 - Cross-Site Request Forgery Vulnerability","url":"http://packetstormsecurity.org/files/116774/","osvdb":"85729","secunia":"50717","created_at":"2014-07-15T17:17:24.917Z","updated_at":"2014-07-15T17:17:24.917Z"}]}},{"mf-gig-calendar":{"vulnerabilities":[{"id":88808,"title":"MF Gig Calendar 0.9.4.1 - URL Cross-Site Scripting Vulnerability","url":"http://packetstormsecurity.org/files/116713/","osvdb":"85682","cve":"2012-4242","secunia":"50571","created_at":"2014-07-15T17:17:24.963Z","updated_at":"2014-07-15T17:17:24.963Z"}]}},{"wp-topbar":{"vulnerabilities":[{"id":88809,"title":"WP-TopBar 4.02 - wp-topbar.php wptbbartext Parameter XSS","osvdb":"85659","secunia":"50693","exploitdb":"21393","created_at":"2014-07-15T17:17:25.012Z","updated_at":"2014-07-15T17:17:25.012Z","fixed_in":"4.03"},{"id":88810,"title":"WP-TopBar 4.02 - TopBar Message Manipulation CSRF","osvdb":"85660","secunia":"50693","exploitdb":"21393","created_at":"2014-07-15T17:17:25.057Z","updated_at":"2014-07-15T17:17:25.057Z","fixed_in":"4.03"},{"id":88811,"title":"wp-topbar \u003c= 3.04 - XSS in ZeroClipboard.swf","url":"http://1337day.com/exploit/20396","created_at":"2014-07-15T17:17:25.108Z","updated_at":"2014-07-15T17:17:25.108Z"}]}},{"webplayer":{"vulnerabilities":[{"id":88812,"title":"HD Webplayer - Two SQL Injection Vulnerabilities","osvdb":"87832","secunia":"50466","created_at":"2014-07-15T17:17:25.155Z","updated_at":"2014-07-15T17:17:25.155Z"}]}},{"cloudsafe365-for-wp":{"vulnerabilities":[{"id":88813,"title":"Cloudsafe365 - Multiple Vulnerabilities","secunia":"50392","created_at":"2014-07-15T17:17:25.202Z","updated_at":"2014-07-15T17:17:25.202Z","fixed_in":"1.47"}]}},{"vitamin":{"vulnerabilities":[{"id":88814,"title":"Vitamin 1.0 - add_headers.php path Parameter Traversal Arbitrary File Access","osvdb":"84463","secunia":"50176","created_at":"2014-07-15T17:17:25.246Z","updated_at":"2014-07-15T17:17:25.246Z","fixed_in":"1.1"},{"id":88815,"title":"Vitamin 1.0 - minify.php path Parameter Traversal Arbitrary File Access","osvdb":"84464","secunia":"50176","created_at":"2014-07-15T17:17:25.293Z","updated_at":"2014-07-15T17:17:25.293Z","fixed_in":"1.1"}]}},{"featured-post-with-thumbnail":{"vulnerabilities":[{"id":88816,"title":"Featured Post with thumbnail 1.4 - Unspecified timthumb Vulnerability","osvdb":"84460","secunia":"50161","created_at":"2014-07-15T17:17:25.339Z","updated_at":"2014-07-15T17:17:25.339Z","fixed_in":"1.5"}]}},{"wp-effective-lead-management":{"vulnerabilities":[{"id":88817,"title":"WP Lead Management 3.0.0 - Script Insertion Vulnerabilities","osvdb":"84462","secunia":"50166","exploitdb":"20270","created_at":"2014-07-15T17:17:25.387Z","updated_at":"2014-07-15T17:17:25.387Z"}]}},{"xve-various-embed":{"vulnerabilities":[{"id":88818,"title":"XVE Various Embed - JW Player Multiple Cross-Site Scripting Vulnerabilities","secunia":"50173","created_at":"2014-07-15T17:17:25.433Z","updated_at":"2014-07-15T17:17:25.433Z","fixed_in":"1.0.4"}]}},{"g-lock-double-opt-in-manager":{"vulnerabilities":[{"id":88819,"title":"G-Lock Double Opt-in Manager - Two Security Bypass Vulnerabilities","url":"http://packetstormsecurity.org/files/115173/","osvdb":"84434","secunia":"50100","created_at":"2014-07-15T17:17:25.482Z","updated_at":"2014-07-15T17:17:25.482Z"}]}},{"kau-boys-backend-localization":{"vulnerabilities":[{"id":88820,"title":"Backend Localization 1.6.1 - options-general.php kau-boys_backend_localization_language Parameter XSS","osvdb":"84418","secunia":"50099","created_at":"2014-07-15T17:17:25.533Z","updated_at":"2014-07-15T17:17:25.533Z","fixed_in":"2.0"},{"id":88821,"title":"Backend Localization 1.6.1 - wp-login.php kau-boys_backend_localization_language Parameter XSS","osvdb":"84419","secunia":"50099","created_at":"2014-07-15T17:17:25.578Z","updated_at":"2014-07-15T17:17:25.578Z","fixed_in":"2.0"}]}},{"flexi-quote-rotator":{"vulnerabilities":[{"id":88822,"title":"Flexi Quote Rotator - Cross-Site Request Forgery and SQL Injection Vulnerabilities","secunia":"49910","created_at":"2014-07-15T17:17:25.623Z","updated_at":"2014-07-15T17:17:25.623Z","fixed_in":"0.9.2"}]}},{"gotmls":{"vulnerabilities":[{"id":88823,"title":"Get Off Malicious Scripts - Cross-Site Scripting Vulnerability","secunia":"50030","created_at":"2014-07-15T17:17:25.670Z","updated_at":"2014-07-15T17:17:25.670Z","fixed_in":"1.2.07.20"}]}},{"cimy-user-extra-fields":{"vulnerabilities":[{"id":88824,"title":"Cimy User Extra Fields - Arbitrary File Upload Vulnerability","secunia":"49975","created_at":"2014-07-15T17:17:25.716Z","updated_at":"2014-07-15T17:17:25.716Z","fixed_in":"2.3.9"}]}},{"nmedia-user-file-uploader":{"vulnerabilities":[{"id":88825,"title":"Nmedia Users File Uploader - Arbitrary File Upload Vulnerability","secunia":"49996","created_at":"2014-07-15T17:17:25.760Z","updated_at":"2014-07-15T17:17:25.760Z","fixed_in":"2.0"}]}},{"wp-explorer-gallery":{"vulnerabilities":[{"id":88826,"title":"wp-explorer-gallery - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/20251","created_at":"2014-07-15T17:17:25.804Z","updated_at":"2014-07-15T17:17:25.804Z"}]}},{"accordion":{"vulnerabilities":[{"id":88827,"title":"accordion - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/20254","created_at":"2014-07-15T17:17:25.848Z","updated_at":"2014-07-15T17:17:25.848Z"}]}},{"wp-catpro":{"vulnerabilities":[{"id":88828,"title":"wp-catpro - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/20256","created_at":"2014-07-15T17:17:25.893Z","updated_at":"2014-07-15T17:17:25.893Z"}]}},{"RLSWordPressSearch":{"vulnerabilities":[{"id":88829,"title":"RLSWordPressSearch - register.php agentid Parameter SQL Injection","url":"http://packetstormsecurity.com/files/119938/","osvdb":"89824","created_at":"2014-07-15T17:17:25.942Z","updated_at":"2014-07-15T17:17:25.942Z"}]}},{"wordpress-simple-shout-box":{"vulnerabilities":[{"id":88830,"title":"wordpress-simple-shout-box - SQL Injection","url":"http://cxsecurity.com/issue/WLB-2013010235","created_at":"2014-07-15T17:17:25.991Z","updated_at":"2014-07-15T17:17:25.991Z"}]}},{"portfolio-slideshow-pro":{"vulnerabilities":[{"id":88831,"title":"portfolio-slideshow-pro v3 - SQL Injection","url":"http://cxsecurity.com/issue/WLB-2013010236","created_at":"2014-07-15T17:17:26.038Z","updated_at":"2014-07-15T17:17:26.038Z"}]}},{"simple-history":{"vulnerabilities":[{"id":88832,"title":"Simple History - RSS Feed \"rss_secret\" Disclosure Weakness","url":"http://www.securityfocus.com/bid/57628","osvdb":"89640","secunia":"51998","created_at":"2014-07-15T17:17:26.085Z","updated_at":"2014-07-15T17:17:26.085Z","fixed_in":"1.0.8"}]}},{"p1m-media-manager":{"vulnerabilities":[{"id":88833,"title":"p1m media manager - SQL Injection Vulnerability","url":"http://1337day.com/exploit/20270","created_at":"2014-07-15T17:17:26.134Z","updated_at":"2014-07-15T17:17:26.134Z"}]}},{"wp-table-reloaded":{"vulnerabilities":[{"id":88834,"title":"wp-table-reloaded \u003c= 1.9.3 - zeroclipboard.swf id Parameter XSS","url":"http://packetstormsecurity.com/files/119968/,http://seclists.org/bugtraq/2013/Feb/28,http://www.securityfocus.com/bid/57664","osvdb":"89754","cve":"2013-1463","secunia":"52027","created_at":"2014-07-15T17:17:26.179Z","updated_at":"2014-07-15T17:17:26.179Z","fixed_in":"1.9.4"}]}},{"wordpress-gallery":{"vulnerabilities":[{"id":88835,"title":"Gallery - \"load\" Remote File Inclusion Vulnerability","url":"http://www.securityfocus.com/bid/57650","osvdb":"89753","cve":"2012-4919","secunia":"51347","created_at":"2014-07-15T17:17:26.239Z","updated_at":"2014-07-15T17:17:26.239Z"}]}},{"forumconverter":{"vulnerabilities":[{"id":88836,"title":"ForumConverter - SQL Injection Vulnerability","url":"http://1337day.com/exploit/20275","created_at":"2014-07-15T17:17:26.284Z","updated_at":"2014-07-15T17:17:26.284Z"}]}},{"newsletter":{"vulnerabilities":[{"id":88837,"title":"Newsletter - SQL Injection Vulnerability","url":"http://1337day.com/exploit/20287","created_at":"2014-07-15T17:17:26.330Z","updated_at":"2014-07-15T17:17:26.330Z","fixed_in":"3.0.9"},{"id":88838,"title":"Newsletter 3.2.6 - \"alert\" Cross-Site Scripting Vulnerability","url":"http://packetstormsecurity.com/files/121634/,http://www.securityfocus.com/bid/59856,http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5141.php","osvdb":"93421","secunia":"53398","created_at":"2014-07-15T17:17:26.375Z","updated_at":"2014-07-15T17:17:26.375Z","fixed_in":"3.2.7"}]}},{"commentluv":{"vulnerabilities":[{"id":88839,"title":"CommentLuv 2.92.3 - Cross Site Scripting Vulnerability","url":"https://www.htbridge.com/advisory/HTB23138,http://packetstormsecurity.com/files/120090/,http://seclists.org/bugtraq/2013/Feb/30,http://cxsecurity.com/issue/WLB-2013020040","osvdb":"89925","cve":"2013-1409","secunia":"52092","created_at":"2014-07-15T17:17:26.420Z","updated_at":"2014-07-15T17:17:26.420Z","fixed_in":"2.92.4"}]}},{"wp-forum":{"vulnerabilities":[{"id":88840,"title":"wp-forum - SQL Injection","url":"http://cxsecurity.com/issue/WLB-2013020035","created_at":"2014-07-15T17:17:26.468Z","updated_at":"2014-07-15T17:17:26.468Z"}]}},{"wp-ecommerce-shop-styling":{"vulnerabilities":[{"id":88841,"title":"WP ecommerce Shop Styling 1.7.2 - generate-pdf.php dompdf Parameter Remote File Inclusion","osvdb":"89921","cve":"2013-0724","secunia":"51707","created_at":"2014-07-15T17:17:26.517Z","updated_at":"2014-07-15T17:17:26.517Z","fixed_in":"1.8"}]}},{"audio-player":{"vulnerabilities":[{"id":88842,"title":"Audio Player - player.swf playerID Parameter XSS","url":"http://packetstormsecurity.com/files/120129/,http://seclists.org/bugtraq/2013/Feb/35","osvdb":"89963","cve":"2013-1464","secunia":"52083","created_at":"2014-07-15T17:17:26.565Z","updated_at":"2014-07-15T17:17:26.565Z","fixed_in":"2.0.4.6"}]}},{"ckeditor-for-wordpress":{"vulnerabilities":[{"id":88843,"title":"CKEditor 4.0 - Arbitrary File Upload Exploit","url":"http://1337day.com/exploit/20318","created_at":"2014-07-15T17:17:26.612Z","updated_at":"2014-07-15T17:17:26.612Z"}]}},{"myftp-ftp-like-plugin-for-wordpress":{"vulnerabilities":[{"id":88844,"title":"myftp-ftp-like-plugin-for-wordpress v2 - SQL Injection","url":"http://cxsecurity.com/issue/WLB-2013020061","created_at":"2014-07-15T17:17:26.659Z","updated_at":"2014-07-15T17:17:26.659Z"}]}},{"password-protected":{"vulnerabilities":[{"id":88845,"title":"Password Protected 1.4 - Login Process redirect_to Parameter Arbitrary Site Redirect","osvdb":"90559","created_at":"2014-07-15T17:17:26.705Z","updated_at":"2014-07-15T17:17:26.705Z"}]}},{"contact-form-plugin":{"vulnerabilities":[{"id":88846,"title":"Contact Form 3.34 - contact_form.php cntctfrm_contact_message Parameter XSS","osvdb":"90502","secunia":"52179","created_at":"2014-07-15T17:17:26.753Z","updated_at":"2014-07-15T17:17:26.753Z","fixed_in":"3.35"},{"id":88847,"title":"Contact Form 3.36 - contact_form.php cntctfrm_contact_email Parameter XSS","osvdb":"90503","secunia":"52250","created_at":"2014-07-15T17:17:26.797Z","updated_at":"2014-07-15T17:17:26.797Z"}]}},{"smart-flv":{"vulnerabilities":[{"id":88848,"title":"smart-flv - jwplayer.swf XSS","url":"http://www.openwall.com/lists/oss-security/2013/02/24/7,http://packetstormsecurity.com/files/115100/","osvdb":"90606","cve":"2013-1765","created_at":"2014-07-15T17:17:26.844Z","updated_at":"2014-07-15T17:17:26.844Z"}]}},{"GoogleAlertandtwitterplugin":{"vulnerabilities":[{"id":88849,"title":"Google Alert And Twitter 3.1.5 - XSS Exploit, SQL Injection","url":"http://1337day.com/exploit/20433","created_at":"2014-07-15T17:17:26.890Z","updated_at":"2014-07-15T17:17:26.890Z"}]}},{"php-shell":{"vulnerabilities":[{"id":88850,"title":"PHP Shell Plugin","url":"https://github.com/wpscanteam/wpscan/issues/138,http://plugins.svn.wordpress.org/php-shell/trunk/shell.php","created_at":"2014-07-15T17:17:26.938Z","updated_at":"2014-07-15T17:17:26.938Z"}]}},{"marekkis-watermark":{"vulnerabilities":[{"id":88851,"title":"Marekkis Watermark 0.9.2 - wp-admin/options-general.php pfad Parameter XSS","url":"http://packetstormsecurity.com/files/120378/,http://seclists.org/bugtraq/2013/Feb/83","osvdb":"90362","cve":"2013-1758","secunia":"52227","created_at":"2014-07-15T17:17:26.987Z","updated_at":"2014-07-15T17:17:26.987Z"}]}},{"responsive-logo-slideshow":{"vulnerabilities":[{"id":88852,"title":"Responsive Logo Slideshow - URL and Image Field XSS","url":"http://packetstormsecurity.com/files/120379/,http://seclists.org/bugtraq/2013/Feb/84","osvdb":"90406","cve":"2013-1759","created_at":"2014-07-15T17:17:27.034Z","updated_at":"2014-07-15T17:17:27.034Z"}]}},{"zopim-live-chat":{"vulnerabilities":[{"id":88853,"title":"zopim-live-chat \u003c= 1.2.5 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","osvdb":"90374","cve":"2013-1808","created_at":"2014-07-15T17:17:27.080Z","updated_at":"2014-07-15T17:17:27.080Z"}]}},{"ed2k-link-selector":{"vulnerabilities":[{"id":88854,"title":"ed2k-link-selector \u003c= 1.1.7 - XSS in ZeroClipboard","url":"http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.125Z","updated_at":"2014-07-15T17:17:27.125Z"}]}},{"wppygments":{"vulnerabilities":[{"id":88855,"title":"wppygments \u003c= 0.3.2 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","osvdb":"90374","cve":"2013-1808","created_at":"2014-07-15T17:17:27.170Z","updated_at":"2014-07-15T17:17:27.170Z"}]}},{"copy-in-clipboard":{"vulnerabilities":[{"id":88856,"title":"copy-in-clipboard \u003c= 0.8 - XSS in ZeroClipboard","url":"http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.215Z","updated_at":"2014-07-15T17:17:27.215Z"}]}},{"search-and-share":{"vulnerabilities":[{"id":88857,"title":"search-and-share 0.9.3 - SearchAndShare.php Direct Request Path Disclosure","url":"http://packetstormsecurity.com/files/121595/,http://seclists.org/fulldisclosure/2013/May/49","osvdb":"93260","created_at":"2014-07-15T17:17:27.260Z","updated_at":"2014-07-15T17:17:27.260Z"},{"id":88858,"title":"search-and-share \u003c= 0.9.3 - XSS in ZeroClipboard","url":"http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.305Z","updated_at":"2014-07-15T17:17:27.305Z"}]}},{"placester":{"vulnerabilities":[{"id":88859,"title":"placester \u003c= 0.3.12 - XSS in ZeroClipboard","url":"http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.350Z","updated_at":"2014-07-15T17:17:27.350Z"}]}},{"drp-coupon":{"vulnerabilities":[{"id":88860,"title":"drp-coupon \u003c= 2.1 - XSS in ZeroClipboard","url":"http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.395Z","updated_at":"2014-07-15T17:17:27.395Z"}]}},{"coupon-code-plugin":{"vulnerabilities":[{"id":88861,"title":"coupon-code-plugin \u003c= 2.1 - XSS in ZeroClipboard","url":"http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.451Z","updated_at":"2014-07-15T17:17:27.451Z"}]}},{"q2w3-inc-manager":{"vulnerabilities":[{"id":88862,"title":"q2w3-inc-manager \u003c= 2.3.1 - XSS in ZeroClipboard","url":"http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.501Z","updated_at":"2014-07-15T17:17:27.501Z"}]}},{"scorerender":{"vulnerabilities":[{"id":88863,"title":"scorerender \u003c= 0.3.4 - XSS in ZeroClipboard","url":"http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.552Z","updated_at":"2014-07-15T17:17:27.552Z"}]}},{"wp-link-to-us":{"vulnerabilities":[{"id":88864,"title":"wp-link-to-us \u003c= 2.0 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.598Z","updated_at":"2014-07-15T17:17:27.598Z"}]}},{"buckets":{"vulnerabilities":[{"id":88865,"title":"buckets \u003c= 0.1.9.2 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.645Z","updated_at":"2014-07-15T17:17:27.645Z"}]}},{"java-trackback":{"vulnerabilities":[{"id":88866,"title":"java-trackback \u003c= 0.2 - XSS in ZeroClipboard","url":"http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.690Z","updated_at":"2014-07-15T17:17:27.690Z"}]}},{"slidedeck2":{"vulnerabilities":[{"id":88867,"title":"slidedeck2 2.3.3 - Unspecified File Inclusion","osvdb":"105132","created_at":"2014-07-15T17:17:27.735Z","updated_at":"2014-07-15T17:17:27.735Z","fixed_in":"2.3.5"},{"id":88868,"title":"slidedeck2 \u003c= 2.1.20130228 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.780Z","updated_at":"2014-07-15T17:17:27.780Z"}]}},{"wp-clone-by-wp-academy":{"vulnerabilities":[{"id":88869,"title":"wp-clone-by-wp-academy \u003c= 2.1.1 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.825Z","updated_at":"2014-07-15T17:17:27.825Z"}]}},{"tiny-url":{"vulnerabilities":[{"id":88870,"title":"tiny-url \u003c= 1.3.2 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.870Z","updated_at":"2014-07-15T17:17:27.870Z"}]}},{"thethe-layout-grid":{"vulnerabilities":[{"id":88871,"title":"thethe-layout-grid \u003c= 1.0.0 - XSS in ZeroClipboard.","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.919Z","updated_at":"2014-07-15T17:17:27.919Z"}]}},{"paypal-digital-goods-monetization-powered-by-cleeng":{"vulnerabilities":[{"id":88872,"title":"paypal-digital-goods-monetization-powered-by-cleeng \u003c= 2.2.13 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:27.972Z","updated_at":"2014-07-15T17:17:27.972Z"}]}},{"mobileview":{"vulnerabilities":[{"id":88873,"title":"mobileview \u003c= 1.0.7 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:28.019Z","updated_at":"2014-07-15T17:17:28.019Z"}]}},{"jaspreetchahals-coupons-lite":{"vulnerabilities":[{"id":88874,"title":"jaspreetchahals-coupons-lite \u003c= 2.1 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:28.065Z","updated_at":"2014-07-15T17:17:28.065Z"}]}},{"geshi-source-colorer":{"vulnerabilities":[{"id":88875,"title":"geshi-source-colorer \u003c= 0.13 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:28.119Z","updated_at":"2014-07-15T17:17:28.119Z"}]}},{"click-to-copy-grab-box":{"vulnerabilities":[{"id":88876,"title":"click-to-copy-grab-box \u003c= 0.1.1 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:28.167Z","updated_at":"2014-07-15T17:17:28.167Z"}]}},{"cleeng":{"vulnerabilities":[{"id":88877,"title":"cleeng \u003c= 2.3.2 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:28.214Z","updated_at":"2014-07-15T17:17:28.214Z"}]}},{"bp-code-snippets":{"vulnerabilities":[{"id":88878,"title":"bp-code-snippets \u003c= 2.0 - XSS in ZeroClipboard","url":"http://www.openwall.com/lists/oss-security/2013/03/10/2,http://1337day.com/exploit/20396","cve":"2013-1808","created_at":"2014-07-15T17:17:28.260Z","updated_at":"2014-07-15T17:17:28.260Z"}]}},{"snazzy-archives":{"vulnerabilities":[{"id":88879,"title":"snazzy-archives \u003c= 1.7.1 - swf/tagcloud.swf tagcloud Parameter XSS","url":"http://www.openwall.com/lists/oss-security/2013/03/10/3","osvdb":"91127","cve":"2009-4168","secunia":"52527","created_at":"2014-07-15T17:17:28.307Z","updated_at":"2014-07-15T17:17:28.307Z","fixed_in":"1.7.2"}]}},{"vkontakte-api":{"vulnerabilities":[{"id":88880,"title":"vkontakte-api - vkontakte-api/swf/tagcloud.swf tagcloud Parameter XSS","url":"http://seclists.org/oss-sec/2013/q1/616,http://www.openwall.com/lists/oss-security/2013/03/11/1","osvdb":"91128","cve":"2009-4168","secunia":"52539","created_at":"2014-07-15T17:17:28.354Z","updated_at":"2014-07-15T17:17:28.354Z"}]}},{"terillion-reviews":{"vulnerabilities":[{"id":88881,"title":"Terillion Reviews \u003c 1.2 - Profile Id Field XSS","url":"http://packetstormsecurity.com/files/120730/,http://www.securityfocus.com/bid/58415,http://xforce.iss.net/xforce/xfdb/82727","osvdb":"91123","cve":"2013-2501","created_at":"2014-07-15T17:17:28.399Z","updated_at":"2014-07-15T17:17:28.399Z"}]}},{"o2s-gallery":{"vulnerabilities":[{"id":88882,"title":"o2s-gallery - Cross Site Scripting Vulnerability","url":"http://1337day.com/exploit/20516","created_at":"2014-07-15T17:17:28.445Z","updated_at":"2014-07-15T17:17:28.445Z"}]}},{"bp-gallery":{"vulnerabilities":[{"id":88883,"title":"bp-gallery 1.2.5 - Cross Site Scripting Vulnerability","url":"http://1337day.com/exploit/20518","created_at":"2014-07-15T17:17:28.493Z","updated_at":"2014-07-15T17:17:28.493Z"}]}},{"simply-poll":{"vulnerabilities":[{"id":88884,"title":"Simply Poll 1.4.1 - wp-admin/admin.php question Parameter XSS","url":"http://packetstormsecurity.com/files/120833/","osvdb":"91446","exploitdb":"24850","created_at":"2014-07-15T17:17:28.539Z","updated_at":"2014-07-15T17:17:28.539Z"},{"id":88885,"title":"Simply Poll 1.4.1 - wp-admin/admin.php Poll Manipulation CSRF","url":"http://packetstormsecurity.com/files/120833/","osvdb":"91447","secunia":"52681","exploitdb":"24850","created_at":"2014-07-15T17:17:28.588Z","updated_at":"2014-07-15T17:17:28.588Z"}]}},{"occasions":{"vulnerabilities":[{"id":88886,"title":"Occasions 1.0.4 - Manipulation CSRF","url":"http://packetstormsecurity.com/files/120871/","osvdb":"91489","secunia":"52651","exploitdb":"24858","created_at":"2014-07-15T17:17:28.636Z","updated_at":"2014-07-15T17:17:28.636Z"},{"id":88887,"title":"Occasions 1.0.4 - occasions/occasions.php occ_content1 Parameter XSS","url":"http://packetstormsecurity.com/files/120871/","osvdb":"91490","exploitdb":"24858","created_at":"2014-07-15T17:17:28.682Z","updated_at":"2014-07-15T17:17:28.682Z"}]}},{"mathjax-latex":{"vulnerabilities":[{"id":88888,"title":"Mathjax Latex 1.1 - Setting Manipulation CSRF","url":"http://packetstormsecurity.com/files/120931/,http://1337day.com/exploit/20566","osvdb":"91737","exploitdb":"24889","created_at":"2014-07-15T17:17:28.730Z","updated_at":"2014-07-15T17:17:28.730Z","fixed_in":"1.2"}]}},{"wp-banners-lite":{"vulnerabilities":[{"id":88889,"title":"WP-Banners-Lite 1.4.0 - XSS vulnerability","url":"http://packetstormsecurity.com/files/120928/,http://seclists.org/fulldisclosure/2013/Mar/209,http://threatpost.com/en_us/blogs/xss-flaw-wordpress-plugin-allows-injection-malicious-code-032513","created_at":"2014-07-15T17:17:28.775Z","updated_at":"2014-07-15T17:17:28.775Z"}]}},{"backupbuddy":{"vulnerabilities":[{"id":88890,"title":"Backupbuddy - importbuddy.php Direct Request Remote Backup File Disclosure","url":"http://packetstormsecurity.com/files/120923/,http://seclists.org/fulldisclosure/2013/Mar/206","osvdb":"91631","cve":"2013-2741","created_at":"2014-07-15T17:17:28.820Z","updated_at":"2014-07-15T17:17:28.820Z"},{"id":88891,"title":"Backupbuddy - importbuddy.php step Parameter Manipulation Authentication Bypass","url":"http://packetstormsecurity.com/files/120923/,http://seclists.org/fulldisclosure/2013/Mar/206","osvdb":"91890","cve":"2013-2743","created_at":"2014-07-15T17:17:28.865Z","updated_at":"2014-07-15T17:17:28.865Z"},{"id":88892,"title":"Backupbuddy - importbuddy.php step Parameter Remote PHP Information Disclosure","url":"http://packetstormsecurity.com/files/120923/,http://seclists.org/fulldisclosure/2013/Mar/206,http://archives.neohapsis.com/archives/fulldisclosure/2013-03/0205.html","osvdb":"91891","cve":"2013-2744","created_at":"2014-07-15T17:17:28.910Z","updated_at":"2014-07-15T17:17:28.910Z"},{"id":88893,"title":"Backupbuddy - importbuddy.php Restore Operation Persistence Weakness","url":"http://packetstormsecurity.com/files/120923/,http://seclists.org/fulldisclosure/2013/Mar/206","osvdb":"91892","cve":"2013-2742","created_at":"2014-07-15T17:17:28.956Z","updated_at":"2014-07-15T17:17:28.956Z"}]}},{"wp-funeral-press":{"vulnerabilities":[{"id":88894,"title":"FuneralPress 1.1.6 - Persistent XSS","url":"http://seclists.org/fulldisclosure/2013/Mar/282","osvdb":"91868","cve":"2013-3529","exploitdb":"24914","created_at":"2014-07-15T17:17:29.001Z","updated_at":"2014-07-15T17:17:29.001Z"}]}},{"chikuncount":{"vulnerabilities":[{"id":88895,"title":"chikuncount - ofc_upload_image.php Arbitrary File Upload Vulnerability","exploitdb":"24492","created_at":"2014-07-15T17:17:29.046Z","updated_at":"2014-07-15T17:17:29.046Z","metasploit":"exploit/unix/webapp/open_flash_chart_upload_exec"}]}},{"open-flash-chart-core-wordpress-plugin":{"vulnerabilities":[{"id":88896,"title":"open-flash-chart-core - ofc_upload_image.php Arbitrary File Upload Vulnerability","cve":"2009-4140","secunia":"37903","exploitdb":"24492","created_at":"2014-07-15T17:17:29.091Z","updated_at":"2014-07-15T17:17:29.091Z","metasploit":"exploit/unix/webapp/open_flash_chart_upload_exec","fixed_in":"0.5"}]}},{"spamtask":{"vulnerabilities":[{"id":88897,"title":"spamtask - ofc_upload_image.php Arbitrary File Upload Vulnerability","exploitdb":"24492","created_at":"2014-07-15T17:17:29.138Z","updated_at":"2014-07-15T17:17:29.138Z","metasploit":"exploit/unix/webapp/open_flash_chart_upload_exec"}]}},{"php-analytics":{"vulnerabilities":[{"id":88898,"title":"php-analytics - ofc_upload_image.php Arbitrary File Upload Vulnerability","exploitdb":"24492","created_at":"2014-07-15T17:17:29.184Z","updated_at":"2014-07-15T17:17:29.184Z","metasploit":"exploit/unix/webapp/open_flash_chart_upload_exec"}]}},{"seo-spy-google-wordpress-plugin":{"vulnerabilities":[{"id":88899,"title":"seo-spy-google - ofc_upload_image.php Arbitrary File Upload Vulnerability","exploitdb":"24492","created_at":"2014-07-15T17:17:29.230Z","updated_at":"2014-07-15T17:17:29.230Z","metasploit":"exploit/unix/webapp/open_flash_chart_upload_exec"}]}},{"wp-seo-spy-google":{"vulnerabilities":[{"id":88900,"title":"wp-seo-spy-google - ofc_upload_image.php Arbitrary File Upload Vulnerability","exploitdb":"24492","created_at":"2014-07-15T17:17:29.278Z","updated_at":"2014-07-15T17:17:29.278Z","metasploit":"exploit/unix/webapp/open_flash_chart_upload_exec"}]}},{"podpress":{"vulnerabilities":[{"id":88901,"title":"podPress 8.8.10.13 - players/1pixelout/1pixelout_player.swf playerID Parameter XSS","url":"http://packetstormsecurity.com/files/121011/","osvdb":"91129","cve":"2013-2714","secunia":"52544","created_at":"2014-07-15T17:17:29.324Z","updated_at":"2014-07-15T17:17:29.324Z","fixed_in":"8.8.10.17"}]}},{"fbsurveypro":{"vulnerabilities":[{"id":88902,"title":"fbsurveypro - XSS Vulnerability","url":"http://1337day.com/exploit/20623","created_at":"2014-07-15T17:17:29.372Z","updated_at":"2014-07-15T17:17:29.372Z"}]}},{"timelineoptinpro":{"vulnerabilities":[{"id":88903,"title":"timelineoptinpro - XSS Vulnerability","url":"http://1337day.com/exploit/20620","created_at":"2014-07-15T17:17:29.424Z","updated_at":"2014-07-15T17:17:29.424Z"}]}},{"kioskprox":{"vulnerabilities":[{"id":88904,"title":"kioskprox - XSS Vulnerability","url":"http://1337day.com/exploit/20624","created_at":"2014-07-15T17:17:29.474Z","updated_at":"2014-07-15T17:17:29.474Z"}]}},{"bigcontact":{"vulnerabilities":[{"id":88905,"title":"bigcontact - SQLI","url":"http://plugins.trac.wordpress.org/changeset/689798","created_at":"2014-07-15T17:17:29.533Z","updated_at":"2014-07-15T17:17:29.533Z","fixed_in":"1.4.7"}]}},{"drawblog":{"vulnerabilities":[{"id":88906,"title":"drawblog - CSRF","url":"http://plugins.trac.wordpress.org/changeset/691178","created_at":"2014-07-15T17:17:29.582Z","updated_at":"2014-07-15T17:17:29.582Z","fixed_in":"0.81"}]}},{"social-media-widget":{"vulnerabilities":[{"id":88907,"title":"Social Media Widget - malicious code","url":"https://plugins.trac.wordpress.org/changeset?reponame=\u0026old=691839@social-media-widget/trunk\u0026new=693941@social-media-widget/trunk,http://slashdot.org/submission/2592777/top-wordpress-widget-sold-off-turned-into-seo-spambot","created_at":"2014-07-15T17:17:29.633Z","updated_at":"2014-07-15T17:17:29.633Z","fixed_in":"4.0.2"},{"id":88908,"title":"Social Media Widget 4.0 - social-widget.php MITM Weakness Arbitrary Code Injection","url":"http://seclists.org/oss-sec/2013/q2/10","osvdb":"92312","cve":"2013-1949","secunia":"53020","created_at":"2014-07-15T17:17:29.681Z","updated_at":"2014-07-15T17:17:29.681Z","fixed_in":"4.0.1"}]}},{"facebook-members":{"vulnerabilities":[{"id":88909,"title":"facebook-members 5.0.4 - Setting Manipulation CSRF","osvdb":"92642","cve":"2013-2703","secunia":"52962","created_at":"2014-07-15T17:17:29.734Z","updated_at":"2014-07-15T17:17:29.734Z","fixed_in":"5.0.5"}]}},{"foursquare-checkins":{"vulnerabilities":[{"id":88910,"title":"foursquare-checkins - CSRF","osvdb":"92641","cve":"2013-2709","secunia":"53151","created_at":"2014-07-15T17:17:29.790Z","updated_at":"2014-07-15T17:17:29.790Z","fixed_in":"1.3"}]}},{"formidable":{"vulnerabilities":[{"id":88911,"title":"Formidable Forms 1.06.03 - ofc_upload_image.php Shell Upload Remote Code Execution","url":"http://www.securityfocus.com/bid/67390,http://packetstormsecurity.com/files/126583/","osvdb":"106985","created_at":"2014-07-15T17:17:29.845Z","updated_at":"2014-07-15T17:17:29.845Z"},{"id":88912,"title":"formidable Pro - Unspecified Vulnerabilities","secunia":"53121","created_at":"2014-07-15T17:17:29.902Z","updated_at":"2014-07-15T17:17:29.902Z","fixed_in":"1.06.09"}]}},{"all-in-one-webmaster":{"vulnerabilities":[{"id":88913,"title":"All in one webmaster 8.2.3 - Script Insertion CSRF","osvdb":"92640","cve":"2013-2696","secunia":"52877","created_at":"2014-07-15T17:17:29.956Z","updated_at":"2014-07-15T17:17:29.956Z","fixed_in":"8.2.4"}]}},{"background-music":{"vulnerabilities":[{"id":88914,"title":"background-music 1.0 - jPlayer.swf XSS","secunia":"53057","created_at":"2014-07-15T17:17:30.018Z","updated_at":"2014-07-15T17:17:30.018Z"}]}},{"haiku-minimalist-audio-player":{"vulnerabilities":[{"id":88915,"title":"haiku-minimalist-audio-player \u003c= 1.1.0 - jPlayer.swf XSS","secunia":"51336","created_at":"2014-07-15T17:17:30.086Z","updated_at":"2014-07-15T17:17:30.086Z","fixed_in":"1.1.0"}]}},{"jammer":{"vulnerabilities":[{"id":88916,"title":"jammer \u003c= 0.2 - jPlayer.swf XSS","secunia":"53106","created_at":"2014-07-15T17:17:30.146Z","updated_at":"2014-07-15T17:17:30.146Z"}]}},{"syntaxhighlighter":{"vulnerabilities":[{"id":88917,"title":"SyntaxHighlighter Evolved 3.1.9 - Unspecified XSS","osvdb":"106587","created_at":"2014-07-15T17:17:30.203Z","updated_at":"2014-07-15T17:17:30.203Z","fixed_in":"3.1.10"},{"id":88918,"title":"SyntaxHighlighter Evolved 3.1.5 - clipboard.swf Unspecified XSS","osvdb":"92848","secunia":"53235","created_at":"2014-07-15T17:17:30.256Z","updated_at":"2014-07-15T17:17:30.256Z","fixed_in":"3.1.6"}]}},{"top-10":{"vulnerabilities":[{"id":88919,"title":"top-10 1.9.2 - Setting Manipulation CSRF","osvdb":"92849","secunia":"53205","created_at":"2014-07-15T17:17:30.313Z","updated_at":"2014-07-15T17:17:30.313Z","fixed_in":"1.9.3"}]}},{"easy-adsense-lite":{"vulnerabilities":[{"id":88920,"title":"Easy AdSense Lite 6.06 - Setting Manipulation CSRF","osvdb":"92910","cve":"2013-2702","secunia":"52953","created_at":"2014-07-15T17:17:30.360Z","updated_at":"2014-07-15T17:17:30.360Z","fixed_in":"6.10"}]}},{"uk-cookie":{"vulnerabilities":[{"id":88921,"title":"uk-cookie - XSS","url":"http://seclists.org/bugtraq/2012/Nov/50","osvdb":"87561","cve":"2012-5856","created_at":"2014-07-15T17:17:30.407Z","updated_at":"2014-07-15T17:17:30.407Z"},{"id":88922,"title":"uk-cookie - CSRF","url":"http://www.openwall.com/lists/oss-security/2013/06/06/10","osvdb":"94032","cve":"2013-2180","created_at":"2014-07-15T17:17:30.470Z","updated_at":"2014-07-15T17:17:30.470Z"}]}},{"wp-cleanfix":{"vulnerabilities":[{"id":88923,"title":"wp-cleanfix - Remote Command Execution, CSRF and XSS","url":"https://github.com/wpscanteam/wpscan/issues/186,http://wordpress.org/support/topic/plugin-wp-cleanfix-remote-code-execution-warning","osvdb":"93450,93468","cve":"2013-2108,2013-2109","secunia":"53395","created_at":"2014-07-15T17:17:30.523Z","updated_at":"2014-07-15T17:17:30.523Z","fixed_in":"3.0.2"}]}},{"mail-on-update":{"vulnerabilities":[{"id":88924,"title":"Mail On Update 5.1.0 - Email Option Manipulation CSRF","url":"http://www.openwall.com/lists/oss-security/2013/05/16/8","osvdb":"93452","secunia":"53449","created_at":"2014-07-15T17:17:30.570Z","updated_at":"2014-07-15T17:17:30.570Z","fixed_in":"5.2.0"}]}},{"advanced-xml-reader":{"vulnerabilities":[{"id":88925,"title":"Advanced XML Reader 0.3.4 - XML External Entity (XXE) Injection","url":"http://packetstormsecurity.com/files/121492/","created_at":"2014-07-15T17:17:30.616Z","updated_at":"2014-07-15T17:17:30.616Z"},{"id":88926,"title":"Advanced XML Reader 0.1.1 - XML External Entity (XXE) Data Parsing Arbitrary File Disclosure","url":"http://seclists.org/bugtraq/2013/May/5","osvdb":"92904","created_at":"2014-07-15T17:17:30.665Z","updated_at":"2014-07-15T17:17:30.665Z"}]}},{"related-posts-by-zemanta":{"vulnerabilities":[{"id":88927,"title":"Related Posts by Zemanta 1.3.1 - Cross-Site Request Forgery Vulnerability","osvdb":"93364","cve":"2013-3477","secunia":"53321","created_at":"2014-07-15T17:17:30.716Z","updated_at":"2014-07-15T17:17:30.716Z","fixed_in":"1.3.2"}]}},{"wordpress-23-related-posts-plugin":{"vulnerabilities":[{"id":88928,"title":"WordPress Related Posts 2.6.1 - Cross-Site Request Forgery Vulnerability","osvdb":"93362","cve":"2013-3476","secunia":"53279","created_at":"2014-07-15T17:17:30.772Z","updated_at":"2014-07-15T17:17:30.772Z","fixed_in":"2.7.2"}]}},{"related-posts":{"vulnerabilities":[{"id":88929,"title":"Related Posts 2.7.1 - Cross-Site Request Forgery Vulnerability","url":"http://www.securityfocus.com/bid/59836","osvdb":"93363","cve":"2013-3257","secunia":"53122","created_at":"2014-07-15T17:17:30.831Z","updated_at":"2014-07-15T17:17:30.831Z","fixed_in":"2.7.2"}]}},{"wp-print-friendly":{"vulnerabilities":[{"id":88930,"title":"WP Print Friendly 3.3.7 - wp-admin/options.php printfriendly_option custom_image Parameter XSS","url":"http://packetstormsecurity.com/files/125420/","osvdb":"103874","created_at":"2014-07-15T17:17:30.889Z","updated_at":"2014-07-15T17:17:30.889Z","fixed_in":"0.5.3"},{"id":88931,"title":"WP Print Friendly \u003c= 0.5.2 - Security Bypass Vulnerability","osvdb":"93243","secunia":"53371","created_at":"2014-07-15T17:17:30.946Z","updated_at":"2014-07-15T17:17:30.946Z","fixed_in":"0.5.3"}]}},{"contextual-related-posts":{"vulnerabilities":[{"id":88932,"title":"Contextual Related Posts 1.8.10.1 - contextual-related-posts.php Multiple Parameter SQL Injection","url":"http://www.securityfocus.com/bid/67853","osvdb":"104655","cve":"2014-3937","created_at":"2014-07-15T17:17:30.999Z","updated_at":"2014-07-15T17:17:30.999Z","fixed_in":"1.8.10.2"},{"id":88933,"title":"Contextual Related Posts 1.8.6 - Cross-Site Request Forgery Vulnerability","osvdb":"93088","cve":"2013-2710","secunia":"52960","created_at":"2014-07-15T17:17:31.049Z","updated_at":"2014-07-15T17:17:31.049Z","fixed_in":"1.8.7"}]}},{"calendar":{"vulnerabilities":[{"id":88934,"title":"Calendar 1.3.2 - Entry Addition CSRF","osvdb":"93025","cve":"2013-2698","secunia":"52841","created_at":"2014-07-15T17:17:31.097Z","updated_at":"2014-07-15T17:17:31.097Z","fixed_in":"1.3.3"}]}},{"feedweb":{"vulnerabilities":[{"id":88935,"title":"Feedweb 2.4 - feedweb_settings.php _wp_http_referer Parameter DOM-based XSS","url":"http://www.securityfocus.com/bid/65800","osvdb":"103788","secunia":"57108","created_at":"2014-07-15T17:17:31.147Z","updated_at":"2014-07-15T17:17:31.147Z"},{"id":88936,"title":"Feedweb 1.8.8 - widget_remove.php wp_post_id Parameter XSS","url":"http://www.securityfocus.com/bid/58771","osvdb":"91951","cve":"2013-3720","secunia":"52855","created_at":"2014-07-15T17:17:31.195Z","updated_at":"2014-07-15T17:17:31.195Z","fixed_in":"1.9"}]}},{"wp-print":{"vulnerabilities":[{"id":88937,"title":"WP-Print 2.51 - Setting Manipulation CSRF","url":"http://www.securityfocus.com/bid/58900","osvdb":"92053","cve":"2013-2693","secunia":"52878","created_at":"2014-07-15T17:17:31.254Z","updated_at":"2014-07-15T17:17:31.254Z","fixed_in":"2.52"}]}},{"trafficanalyzer":{"vulnerabilities":[{"id":88938,"title":"Traffic Analyzer 3.3.2 - js/ta_loaded.js.php aoid Parameter XSS","url":"http://packetstormsecurity.com/files/121167/","osvdb":"92197","cve":"2013-3526","secunia":"52929","created_at":"2014-07-15T17:17:31.317Z","updated_at":"2014-07-15T17:17:31.317Z"}]}},{"wp-download-manager":{"vulnerabilities":[{"id":88939,"title":"WP-DownloadManager 1.60 - Script Insertion CSRF","url":"http://www.securityfocus.com/bid/58937","osvdb":"92119","cve":"2013-2697","secunia":"52863","created_at":"2014-07-15T17:17:31.376Z","updated_at":"2014-07-15T17:17:31.376Z","fixed_in":"1.61"}]}},{"digg-digg":{"vulnerabilities":[{"id":88940,"title":"Digg Digg 5.3.4 - Setting Manipulation CSRF","url":"http://www.securityfocus.com/bid/60046,http://xforce.iss.net/xforce/xfdb/84418","osvdb":"93544","cve":"2013-3258","secunia":"53120","created_at":"2014-07-15T17:17:31.430Z","updated_at":"2014-07-15T17:17:31.430Z","fixed_in":"5.3.5"}]}},{"ssquiz":{"vulnerabilities":[{"id":88941,"title":"SS Quiz - Multiple Unspecified Vulnerabilities","url":"http://wordpress.org/plugins/ssquiz/changelog/","osvdb":"93531","secunia":"53378","created_at":"2014-07-15T17:17:31.481Z","updated_at":"2014-07-15T17:17:31.481Z","fixed_in":"2.0"}]}},{"funcaptcha":{"vulnerabilities":[{"id":88942,"title":"FunCaptcha 0.3.2- Setting Manipulation CSRF","url":"http://wordpress.org/extend/plugins/funcaptcha/changelog/","osvdb":"92272","secunia":"53021","created_at":"2014-07-15T17:17:31.543Z","updated_at":"2014-07-15T17:17:31.543Z","fixed_in":"0.3.3"},{"id":88943,"title":"FunCaptcha 0.4.3 - wp_funcaptcha_admin_activate.php URI XSS","osvdb":"100392","secunia":"55863","created_at":"2014-07-15T17:17:31.598Z","updated_at":"2014-07-15T17:17:31.598Z","fixed_in":"0.4.4"}]}},{"xili-language":{"vulnerabilities":[{"id":88944,"title":"xili-language - index.php lang Parameter XSS","osvdb":"93233","secunia":"53364","created_at":"2014-07-15T17:17:31.647Z","updated_at":"2014-07-15T17:17:31.647Z","fixed_in":"2.8.6"}]}},{"wordpress-seo":{"vulnerabilities":[{"id":88945,"title":"WordPress SEO - Security issue which allowed any user to reset settings","url":"http://wordpress.org/plugins/wordpress-seo/changelog/","created_at":"2014-07-15T17:17:31.698Z","updated_at":"2014-07-15T17:17:31.698Z","fixed_in":"1.4.5"},{"id":88946,"title":"WordPress SEO 1.14.15 - index.php s Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/123028/","osvdb":"97885","created_at":"2014-07-15T17:17:31.752Z","updated_at":"2014-07-15T17:17:31.752Z"},{"id":88947,"title":"WordPress SEO 1.4.6 - Reset Settings Feature Access Restriction Bypass","osvdb":"92147","secunia":"52949","created_at":"2014-07-15T17:17:31.804Z","updated_at":"2014-07-15T17:17:31.804Z"}]}},{"underconstruction":{"vulnerabilities":[{"id":88948,"title":"Under Construction 1.09 - Authenticated Single Page Viewing Unspecified Issue","osvdb":"102507","created_at":"2014-07-15T17:17:31.856Z","updated_at":"2014-07-15T17:17:31.856Z","fixed_in":"1.10"},{"id":88949,"title":"Under Construction 1.08 - Setting Manipulation CSRF","url":"http://wordpress.org/plugins/underconstruction/changelog/","osvdb":"93857","cve":"2013-2699","secunia":"52881","created_at":"2014-07-15T17:17:31.904Z","updated_at":"2014-07-15T17:17:31.904Z","fixed_in":"1.09"}]}},{"adif-log-search-widget":{"vulnerabilities":[{"id":88950,"title":"ADIF Log Search Widget - XSS Arbitrary Vulnerability","url":"http://packetstormsecurity.com/files/121777/","osvdb":"93721","secunia":"53599","created_at":"2014-07-15T17:17:31.950Z","updated_at":"2014-07-15T17:17:31.950Z"}]}},{"exploit-scanner":{"vulnerabilities":[{"id":88951,"title":"Exploit Scanner - FPD and Security bypass vulnerabilities","url":"http://seclists.org/fulldisclosure/2013/May/216","osvdb":"93799","created_at":"2014-07-15T17:17:32.002Z","updated_at":"2014-07-15T17:17:32.002Z"}]}},{"ga-universal":{"vulnerabilities":[{"id":88952,"title":"GA Universal 1.0 - Setting Manipulation CSRF","url":"http://wordpress.org/plugins/ga-universal/changelog/","osvdb":"92237","secunia":"52976","created_at":"2014-07-15T17:17:32.065Z","updated_at":"2014-07-15T17:17:32.065Z","fixed_in":"1.0.1"}]}},{"export-to-text":{"vulnerabilities":[{"id":88953,"title":"Export to text - Remote File Inclusion Vulnerability","osvdb":"93715","secunia":"51348","created_at":"2014-07-15T17:17:32.120Z","updated_at":"2014-07-15T17:17:32.120Z","fixed_in":"2.3"}]}},{"qtranslate":{"vulnerabilities":[{"id":88954,"title":"qTranslate 2.5.34 - Setting Manipulation CSRF","osvdb":"93873","cve":"2013-3251","secunia":"53126","created_at":"2014-07-15T17:17:32.166Z","updated_at":"2014-07-15T17:17:32.166Z"}]}},{"image-slider-with-description":{"vulnerabilities":[{"id":88955,"title":"Image slider with description - Unspecified Vulnerability","osvdb":"93691","secunia":"53588","created_at":"2014-07-15T17:17:32.215Z","updated_at":"2014-07-15T17:17:32.215Z","fixed_in":"7.0"}]}},{"user-role-editor":{"vulnerabilities":[{"id":88956,"title":"User Role Editor - Cross-Site Request Forgery Vulnerability","osvdb":"93699","secunia":"53593","exploitdb":"25721","created_at":"2014-07-15T17:17:32.289Z","updated_at":"2014-07-15T17:17:32.289Z","fixed_in":"3.14"}]}},{"eelv-newsletter":{"vulnerabilities":[{"id":88957,"title":"EELV Newsletter 3.4.3 - lettreinfo.php Unspecified XSS","osvdb":"104875","created_at":"2014-07-15T17:17:32.348Z","updated_at":"2014-07-15T17:17:32.348Z","fixed_in":"3.5.0"},{"id":88958,"title":"EELV Newsletter - Cross-Site Scripting Vulnerability","osvdb":"93685","secunia":"53546","created_at":"2014-07-15T17:17:32.405Z","updated_at":"2014-07-15T17:17:32.405Z","fixed_in":"3.3.1"}]}},{"frontier-post":{"vulnerabilities":[{"id":88959,"title":"Frontier Post - Publishing Posts Security Bypass","osvdb":"93639","secunia":"53474","created_at":"2014-07-15T17:17:32.456Z","updated_at":"2014-07-15T17:17:32.456Z"}]}},{"spider-catalog":{"vulnerabilities":[{"id":88960,"title":"Spider Catalog - Cross-Site Scripting and SQL Injection Vulnerabilities","osvdb":"93591,93593,93594,93595,93596,93597,93598","secunia":"53491","created_at":"2014-07-15T17:17:32.506Z","updated_at":"2014-07-15T17:17:32.506Z"}]}},{"spider-event-calendar":{"vulnerabilities":[{"id":88961,"title":"Spider Event Calendar - Security Bypass, Cross-Site Scripting and SQLi Vulnerabilities","osvdb":"93582,93583,93584,93585,93586,93587,93588","secunia":"53481","created_at":"2014-07-15T17:17:32.556Z","updated_at":"2014-07-15T17:17:32.556Z"}]}},{"antivirus":{"vulnerabilities":[{"id":88962,"title":"AntiVirus 1.0 - PHP Backdoor Detection Bypass","url":"http://packetstormsecurity.com/files/121833/,http://seclists.org/fulldisclosure/2013/Jun/0","osvdb":"95134","created_at":"2014-07-15T17:17:32.604Z","updated_at":"2014-07-15T17:17:32.604Z"},{"id":88963,"title":"AntiVirus 1.0 - uninstall.php Direct Request Path Disclosure","url":"http://packetstormsecurity.com/files/121833/,http://seclists.org/fulldisclosure/2013/Jun/0","osvdb":"95135","created_at":"2014-07-15T17:17:32.658Z","updated_at":"2014-07-15T17:17:32.658Z","fixed_in":"1.1"}]}},{"wp-maintenance-mode":{"vulnerabilities":[{"id":88964,"title":"WP Maintenance Mode 1.8.7 - Setting Manipulation CSRF","osvdb":"94450","cve":"2013-3250","secunia":"53125","created_at":"2014-07-15T17:17:32.708Z","updated_at":"2014-07-15T17:17:32.708Z","fixed_in":"1.8.8"}]}},{"ultimate-auction":{"vulnerabilities":[{"id":88965,"title":"Ultimate Auction 1.0 - CSRF Vulnerability","osvdb":"94407","exploitdb":"26240","created_at":"2014-07-15T17:17:32.760Z","updated_at":"2014-07-15T17:17:32.760Z"}]}},{"mapsmarker":{"vulnerabilities":[{"id":88966,"title":"Leaflet Maps Marker - Multiple security issues","url":"http://www.mapsmarker.com/2012/06/06/leaflet-maps-marker-v2-4-is-available/","secunia":"49845","created_at":"2014-07-15T17:17:32.808Z","updated_at":"2014-07-15T17:17:32.808Z","fixed_in":"2.4"},{"id":88967,"title":"Leaflet Maps Marker - Tag Multiple Parameter SQL Injection","url":"http://www.mapsmarker.com/2013/05/24/v3-5-4-with-lots-of-translation-updates-bugfixes-is-available/","osvdb":"94388","secunia":"53855","created_at":"2014-07-15T17:17:32.859Z","updated_at":"2014-07-15T17:17:32.859Z","fixed_in":"3.5.4"}]}},{"leaflet-maps-marker-pro":{"vulnerabilities":[{"id":88968,"title":"Leaflet Maps Marker Pro - SQLI, XSS, Shell Upload, file delete","url":"http://www.mapsmarker.com/2014/03/26/pro-v1-5-8-with-wordpress-3-9-compatibility-improvements-based-on-a-security-audit-by-the-city-of-vienna-is-available/","created_at":"2014-07-15T17:17:32.910Z","updated_at":"2014-07-15T17:17:32.910Z","fixed_in":"1.5.8"}]}},{"xorbin-analog-flash-clock":{"vulnerabilities":[{"id":88969,"title":"Xorbin Analog Flash Clock 1.0 - Flash-based XSS","url":"http://packetstormsecurity.com/files/122222/","cve":"2013-4692","created_at":"2014-07-15T17:17:32.959Z","updated_at":"2014-07-15T17:17:32.959Z"}]}},{"xorbin-digital-flash-clock":{"vulnerabilities":[{"id":88970,"title":"Xorbin Digital Flash Clock 1.0 - Flash-based XSS","url":"http://packetstormsecurity.com/files/122223/","cve":"2013-4693","created_at":"2014-07-15T17:17:33.006Z","updated_at":"2014-07-15T17:17:33.006Z"}]}},{"dropdown-menu-widget":{"vulnerabilities":[{"id":88971,"title":"Dropdown Menu Widget 1.9.1 - Script Insertion CSRF","osvdb":"94771","cve":"2013-2704","secunia":"52958","created_at":"2014-07-15T17:17:33.056Z","updated_at":"2014-07-15T17:17:33.056Z"}]}},{"buddypress-extended-friendship-request":{"vulnerabilities":[{"id":88972,"title":"BuddyPress Extended Friendship Request - wp-admin/admin-ajax.php friendship_request_message Parameter XSS","osvdb":"94807","cve":"2013-4944","secunia":"54048","created_at":"2014-07-15T17:17:33.105Z","updated_at":"2014-07-15T17:17:33.105Z","fixed_in":"1.0.2"}]}},{"wp-private-messages":{"vulnerabilities":[{"id":88973,"title":"wp-private-messages - /wp-admin/profile.php msgid Parameter SQL Injection","osvdb":"94702","created_at":"2014-07-15T17:17:33.154Z","updated_at":"2014-07-15T17:17:33.154Z"}]}},{"stream-video-player":{"vulnerabilities":[{"id":88974,"title":"Stream Video Player \u003c= 1.4.0 - Setting Manipulation CSRF","osvdb":"94466","cve":"2013-2706","secunia":"52954","created_at":"2014-07-15T17:17:33.204Z","updated_at":"2014-07-15T17:17:33.204Z"}]}},{"duplicator":{"vulnerabilities":[{"id":88975,"title":"Duplicator - installer.cleanup.php package Parameter XSS","url":"http://packetstormsecurity.com/files/122535/","osvdb":"95627","cve":"2013-4625","created_at":"2014-07-15T17:17:33.258Z","updated_at":"2014-07-15T17:17:33.258Z","fixed_in":"0.4.5"}]}},{"citizen-space":{"vulnerabilities":[{"id":88976,"title":"Citizen Space 1.0 - Script Insertion CSRF","osvdb":"95570","secunia":"54256","created_at":"2014-07-15T17:17:33.307Z","updated_at":"2014-07-15T17:17:33.307Z","fixed_in":"1.1"}]}},{"spicy-blogroll":{"vulnerabilities":[{"id":88977,"title":"Spicy Blogroll - spicy-blogroll-ajax.php Multiple Parameter Remote File Inclusion","url":"http://packetstormsecurity.com/files/122396/","osvdb":"95557","exploitdb":"26804","created_at":"2014-07-15T17:17:33.353Z","updated_at":"2014-07-15T17:17:33.353Z"}]}},{"pie-register":{"vulnerabilities":[{"id":88978,"title":"Pie Register - wp-login.php Multiple Parameter XSS","url":"http://www.securityfocus.com/bid/61140,http://xforce.iss.net/xforce/xfdb/85604","osvdb":"95160","cve":"2013-4954","secunia":"54123","created_at":"2014-07-15T17:17:33.401Z","updated_at":"2014-07-15T17:17:33.401Z","fixed_in":"1.31"}]}},{"xhanch-my-twitter":{"vulnerabilities":[{"id":88979,"title":"Xhanch my Twitter - CSRF in admin/setting.php","osvdb":"96027","cve":"2013-3253","secunia":"53133","created_at":"2014-07-15T17:17:33.461Z","updated_at":"2014-07-15T17:17:33.461Z","fixed_in":"2.7.7"}]}},{"sexybookmarks":{"vulnerabilities":[{"id":88980,"title":"SexyBookmarks - Setting Manipulation CSRF","osvdb":"95908","cve":"2013-3256","secunia":"53138","created_at":"2014-07-15T17:17:33.529Z","updated_at":"2014-07-15T17:17:33.529Z","fixed_in":"6.1.5.0"}]}},{"hms-testimonials":{"vulnerabilities":[{"id":88981,"title":"HMS Testimonials 2.0.10 - CSRF","url":"http://wordpress.org/plugins/hms-testimonials/changelog/,http://packetstormsecurity.com/files/122761/","osvdb":"96107,96108,96109,96110,96111","cve":"2013-4240","secunia":"54402","exploitdb":"27531","created_at":"2014-07-15T17:17:33.578Z","updated_at":"2014-07-15T17:17:33.578Z","fixed_in":"2.0.11"},{"id":88982,"title":"HMS Testimonials 2.0.10 - XSS","url":"http://wordpress.org/plugins/hms-testimonials/changelog/,http://packetstormsecurity.com/files/122761/","osvdb":"96107,96108,96109,96110,96111","cve":"2013-4241","secunia":"54402","exploitdb":"27531","created_at":"2014-07-15T17:17:33.627Z","updated_at":"2014-07-15T17:17:33.627Z","fixed_in":"2.0.11"}]}},{"indianic-testimonial":{"vulnerabilities":[{"id":88983,"title":"IndiaNIC Testimonial 2.2 - Setting Manipulation CSRF","url":"http://packetstormsecurity.com/files/123036/,http://seclists.org/fulldisclosure/2013/Sep/5","osvdb":"96792","cve":"2013-5672","exploitdb":"28054","created_at":"2014-07-15T17:17:33.681Z","updated_at":"2014-07-15T17:17:33.681Z"},{"id":88984,"title":"IndiaNIC Testimonial 2.2 - testimonial.php custom_query Parameter SQL Injection","url":"http://packetstormsecurity.com/files/123036/,http://seclists.org/fulldisclosure/2013/Sep/5","osvdb":"96793","cve":"2013-5673","exploitdb":"28054","created_at":"2014-07-15T17:17:33.738Z","updated_at":"2014-07-15T17:17:33.738Z"},{"id":88985,"title":"IndiaNIC Testimonial 2.2 - iNIC_testimonial_save Action Multiple Parameter XSS","url":"http://packetstormsecurity.com/files/123036/,http://seclists.org/fulldisclosure/2013/Sep/5","osvdb":"96795","exploitdb":"28054","created_at":"2014-07-15T17:17:33.791Z","updated_at":"2014-07-15T17:17:33.791Z"}]}},{"usernoise":{"vulnerabilities":[{"id":88986,"title":"Usernoise 3.7.8 - Feedback Submission summary Field XSS","url":"http://packetstormsecurity.com/files/122701/","osvdb":"96000","exploitdb":"27403","created_at":"2014-07-15T17:17:33.844Z","updated_at":"2014-07-15T17:17:33.844Z","fixed_in":"3.7.9"}]}},{"platinum-seo-pack":{"vulnerabilities":[{"id":88987,"title":"platinum_seo_pack.php - s Parameter Reflected XSS","osvdb":"97263","cve":"2013-5918","created_at":"2014-07-15T17:17:33.896Z","updated_at":"2014-07-15T17:17:33.896Z","fixed_in":"1.3.8"}]}},{"design-approval-system":{"vulnerabilities":[{"id":88988,"title":"Design Approval System 3.6 - XSS Vulnerability","url":"http://seclists.org/bugtraq/2013/Sep/54,http://packetstormsecurity.com/files/123227/","osvdb":"97192,97279","cve":"2013-5711","secunia":"54704","created_at":"2014-07-15T17:17:33.944Z","updated_at":"2014-07-15T17:17:33.944Z","fixed_in":"3.7"}]}},{"event-easy-calendar":{"vulnerabilities":[{"id":88989,"title":"Event Easy Calendar 1.0.0 - Multiple Administrator Action CSRF","url":"http://packetstormsecurity.com/files/123132/","osvdb":"97042","created_at":"2014-07-15T17:17:34.002Z","updated_at":"2014-07-15T17:17:34.002Z"},{"id":88990,"title":"Event Easy Calendar 1.0.0 - Multiple Unspecified XSS","url":"http://packetstormsecurity.com/files/123132/","osvdb":"97041","created_at":"2014-07-15T17:17:34.058Z","updated_at":"2014-07-15T17:17:34.058Z"}]}},{"bradesco-gateway":{"vulnerabilities":[{"id":88991,"title":"Bradesco - falha.php URI Reflected XSS","url":"http://packetstormsecurity.com/files/123356/","osvdb":"97624","cve":"2013-5916","created_at":"2014-07-15T17:17:34.109Z","updated_at":"2014-07-15T17:17:34.109Z"}]}},{"social-hashtags":{"vulnerabilities":[{"id":88992,"title":"Social Hashtags 2.0.0 - New Post Title Field Stored XSS","url":"http://packetstormsecurity.com/files/123485/","osvdb":"98027","created_at":"2014-07-15T17:17:34.157Z","updated_at":"2014-07-15T17:17:34.157Z"}]}},{"simple-flickr-display":{"vulnerabilities":[{"id":88993,"title":"Simple Flickr Display - Username Field Stored XSS","osvdb":"97991","created_at":"2014-07-15T17:17:34.207Z","updated_at":"2014-07-15T17:17:34.207Z"}]}},{"lazy-seo":{"vulnerabilities":[{"id":88994,"title":"Lazy SEO 1.1.9 - lazyseo.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/123349/,http://xforce.iss.net/xforce/xfdb/87384","osvdb":"97662","cve":"2013-5961","exploitdb":"28452","created_at":"2014-07-15T17:17:34.253Z","updated_at":"2014-07-15T17:17:34.253Z"}]}},{"seo-watcher":{"vulnerabilities":[{"id":88995,"title":"SEO Watcher - Open Flash Chart Arbitrary File Creation Vulnerability","url":"http://packetstormsecurity.com/files/123493/","secunia":"55162","created_at":"2014-07-15T17:17:34.303Z","updated_at":"2014-07-15T17:17:34.303Z"}]}},{"all-in-one-seo-pack":{"vulnerabilities":[{"id":88996,"title":"All in One SEO Pack \u003c= 2.1.5 - aioseop_functions.php new_meta Parameter XSS","url":"http://blog.sucuri.net/2014/05/vulnerability-found-in-the-all-in-one-seo-pack-wordpress-plugin.html","osvdb":"107640","created_at":"2014-07-15T17:17:34.364Z","updated_at":"2014-07-15T17:17:34.364Z","fixed_in":"2.1.6"},{"id":88997,"title":"All in One SEO Pack \u003c= 2.1.5 - Unspecified Privilege Escalation","url":"http://blog.sucuri.net/2014/05/vulnerability-found-in-the-all-in-one-seo-pack-wordpress-plugin.html","osvdb":"107641","created_at":"2014-07-15T17:17:34.412Z","updated_at":"2014-07-15T17:17:34.412Z","fixed_in":"2.1.6"},{"id":88998,"title":"All in One SEO Pack \u003c= 2.0.3 - XSS Vulnerability","url":"http://archives.neohapsis.com/archives/bugtraq/2013-10/0006.html,http://packetstormsecurity.com/files/123490/,http://www.securityfocus.com/bid/62784,http://seclists.org/bugtraq/2013/Oct/8","osvdb":"98023","cve":"2013-5988","secunia":"55133","created_at":"2014-07-15T17:17:34.465Z","updated_at":"2014-07-15T17:17:34.465Z","fixed_in":"2.0.3.1"}]}},{"simple-dropbox-upload-form":{"vulnerabilities":[{"id":88999,"title":"Simple Dropbox Upload - Arbitrary File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123235/,http://xforce.iss.net/xforce/xfdb/87166","osvdb":"97457","cve":"2013-5963","secunia":"54856","created_at":"2014-07-15T17:17:34.511Z","updated_at":"2014-07-15T17:17:34.511Z","fixed_in":"1.8.8.1"}]}},{"wp-ultimate-email-marketer":{"vulnerabilities":[{"id":89000,"title":"WP Ultimate Email Marketer - Multiple Vulnerabilities","url":"http://www.securityfocus.com/bid/62621","osvdb":"97648,97649,97650,97651,97652,97653,97654,97655,97656","cve":"2013-3263,2013-3264","secunia":"53170","created_at":"2014-07-15T17:17:34.558Z","updated_at":"2014-07-15T17:17:34.558Z"}]}},{"wp-miniaudioplayer":{"vulnerabilities":[{"id":89001,"title":"mb.miniAudioPlayer 1.4.2 - TinyMCE Popup Unspecified Issue","osvdb":"101718","created_at":"2014-07-15T17:17:34.607Z","updated_at":"2014-07-15T17:17:34.607Z","fixed_in":"1.4.3"},{"id":89002,"title":"miniAudioPlayer 1.3.8 - maplayertinymce.php Multiple Parameter XSS","url":"http://packetstormsecurity.com/files/123372/,http://www.securityfocus.com/bid/62629","osvdb":"97768","secunia":"54979","created_at":"2014-07-15T17:17:34.657Z","updated_at":"2014-07-15T17:17:34.657Z"}]}},{"simple-custom-website-data":{"vulnerabilities":[{"id":89003,"title":"Custom Website Data 1.2 - Record Deletion CSRF","osvdb":"101642","secunia":"54823","created_at":"2014-07-15T17:17:34.703Z","updated_at":"2014-07-15T17:17:34.703Z","fixed_in":"1.3"},{"id":89004,"title":"Custom Website Data 1.0 - wp-admin/admin.php ref Parameter XSS","url":"http://www.securityfocus.com/bid/62624","osvdb":"97668","secunia":"54865","created_at":"2014-07-15T17:17:34.751Z","updated_at":"2014-07-15T17:17:34.751Z","fixed_in":"1.1"}]}},{"complete-gallery-manager":{"vulnerabilities":[{"id":89005,"title":"Complete Gallery Manager 3.3.3 - Arbitrary File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123303/,http://xforce.iss.net/xforce/xfdb/87172","osvdb":"97481","cve":"2013-5962","secunia":"54894","exploitdb":"28377","created_at":"2014-07-15T17:17:34.796Z","updated_at":"2014-07-15T17:17:34.796Z","fixed_in":"3.3.4"}]}},{"lbg_zoominoutslider":{"vulnerabilities":[{"id":89006,"title":"LBG Zoominoutslider - add_banner.php name Parameter Stored XSS","url":"http://packetstormsecurity.com/files/123367/","osvdb":"97887","secunia":"54983","created_at":"2014-07-15T17:17:34.842Z","updated_at":"2014-07-15T17:17:34.842Z"},{"id":89007,"title":"LBG Zoominoutslider - settings_form.php Multiple Parameter Stored XSS","url":"http://packetstormsecurity.com/files/123914/,http://seclists.org/fulldisclosure/2013/Nov/30","osvdb":"99339","created_at":"2014-07-15T17:17:34.888Z","updated_at":"2014-07-15T17:17:34.888Z"},{"id":89008,"title":"LBG Zoominoutslider - add_playlist_record.php Multiple Parameter Stored XSS","url":"http://packetstormsecurity.com/files/123914/,http://seclists.org/fulldisclosure/2013/Nov/30","osvdb":"99340","created_at":"2014-07-15T17:17:34.936Z","updated_at":"2014-07-15T17:17:34.936Z"},{"id":89009,"title":"LBG Zoominoutslider - add_banner.php Unspecified XSS","url":"http://packetstormsecurity.com/files/123367/","osvdb":"99320","created_at":"2014-07-15T17:17:34.984Z","updated_at":"2014-07-15T17:17:34.984Z"},{"id":89010,"title":"LBG Zoominoutslider - Multiple Script Direct Request Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Nov/30","osvdb":"99341","created_at":"2014-07-15T17:17:35.043Z","updated_at":"2014-07-15T17:17:35.043Z"}]}},{"woopra":{"vulnerabilities":[{"id":89011,"title":"Woopra - Remote Code Execution","url":"http://packetstormsecurity.com/files/123525/","created_at":"2014-07-15T17:17:35.111Z","updated_at":"2014-07-15T17:17:35.111Z"}]}},{"fgallery_plus":{"vulnerabilities":[{"id":89012,"title":"fGallery_Plus - fim_rss.php album Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/123347/,http://seclists.org/bugtraq/2013/Sep/105,http://seclists.org/bugtraq/2013/Sep/107,http://seclists.org/bugtraq/2013/Sep/108","osvdb":"97625","created_at":"2014-07-15T17:17:35.172Z","updated_at":"2014-07-15T17:17:35.172Z"}]}},{"nospampti":{"vulnerabilities":[{"id":89013,"title":"NOSpamPTI 2.1 - wp-comments-post.php comment_post_ID Parameter SQL Injection","url":"http://packetstormsecurity.com/files/123331/","osvdb":"97528","cve":"2013-5917","exploitdb":"28485","created_at":"2014-07-15T17:17:35.238Z","updated_at":"2014-07-15T17:17:35.238Z"}]}},{"comment-attachment":{"vulnerabilities":[{"id":89014,"title":"Comment Attachment 1.0 - XSS Vulnerability","url":"http://packetstormsecurity.com/files/123327/,http://www.securityfocus.com/bid/62438","osvdb":"97600","cve":"2013-6010","created_at":"2014-07-15T17:17:35.285Z","updated_at":"2014-07-15T17:17:35.285Z"}]}},{"mukioplayer-for-wordpress":{"vulnerabilities":[{"id":89015,"title":"Mukioplayer 1.6 - SQL Injection","url":"http://packetstormsecurity.com/files/123231/","osvdb":"97609","created_at":"2014-07-15T17:17:35.333Z","updated_at":"2014-07-15T17:17:35.333Z"}]}},{"encrypted-blog":{"vulnerabilities":[{"id":89016,"title":"Encrypted Blog 0.0.6.2 - encrypt_blog_form.php redirect_to Parameter Arbitrary Site Redirect","url":"http://packetstormsecurity.com/files/122992/","osvdb":"97881","created_at":"2014-07-15T17:17:35.380Z","updated_at":"2014-07-15T17:17:35.380Z"},{"id":89017,"title":"Encrypted Blog 0.0.6.2 - encrypt_blog_form.php redirect_to Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/122992/","osvdb":"97882","created_at":"2014-07-15T17:17:35.429Z","updated_at":"2014-07-15T17:17:35.429Z"}]}},{"wp-simple-login-registration-plugin":{"vulnerabilities":[{"id":89018,"title":"Simple Login Registration 1.0.1 - XSS","url":"http://packetstormsecurity.com/files/122963/","osvdb":"96660","secunia":"54583","created_at":"2014-07-15T17:17:35.475Z","updated_at":"2014-07-15T17:17:35.475Z"}]}},{"post-gallery":{"vulnerabilities":[{"id":89019,"title":"Post Gallery - XSS","url":"http://packetstormsecurity.com/files/122957/","created_at":"2014-07-15T17:17:35.546Z","updated_at":"2014-07-15T17:17:35.546Z"}]}},{"proplayer":{"vulnerabilities":[{"id":89020,"title":"ProPlayer 4.7.9.1 - SQL Injection","osvdb":"93564","exploitdb":"25605","created_at":"2014-07-15T17:17:35.620Z","updated_at":"2014-07-15T17:17:35.620Z"}]}},{"booking":{"vulnerabilities":[{"id":89021,"title":"Booking Calendar 4.1.4 - CSRF Vulnerability","url":"http://packetstormsecurity.com/files/122691/,http://wpbookingcalendar.com/","osvdb":"96088","secunia":"54461","exploitdb":"27399","created_at":"2014-07-15T17:17:35.687Z","updated_at":"2014-07-15T17:17:35.687Z","fixed_in":"4.1.6"}]}},{"thinkit-wp-contact-form":{"vulnerabilities":[{"id":89022,"title":"ThinkIT \u003c= 0.3 - wp-admin/admin.php Contact Form Deletion CSRF","url":"http://packetstormsecurity.com/files/122898/","osvdb":"96514","secunia":"54592","exploitdb":"27751","created_at":"2014-07-15T17:17:35.748Z","updated_at":"2014-07-15T17:17:35.748Z"},{"id":89023,"title":"ThinkIT \u003c= 0.2 - wp-admin/admin.php toitcf_current_id Parameter XSS","url":"http://packetstormsecurity.com/files/122898/","osvdb":"96515","secunia":"54592","exploitdb":"27751","created_at":"2014-07-15T17:17:35.800Z","updated_at":"2014-07-15T17:17:35.800Z","fixed_in":"0.3"}]}},{"quick-contact-form":{"vulnerabilities":[{"id":89024,"title":"Quick Contact Form 6.2 - Unspecified XSS","osvdb":"101782","created_at":"2014-07-15T17:17:35.849Z","updated_at":"2014-07-15T17:17:35.849Z","fixed_in":"6.3"},{"id":89025,"title":"Quick Contact Form 6.0 - Persistent XSS","url":"http://packetstormsecurity.com/files/123549/,http://quick-plugins.com/quick-contact-form/","osvdb":"98279","secunia":"55172","exploitdb":"28808","created_at":"2014-07-15T17:17:35.896Z","updated_at":"2014-07-15T17:17:35.896Z","fixed_in":"6.1"}]}},{"quick-paypal-payments":{"vulnerabilities":[{"id":89026,"title":"Quick Paypal Payments 3.0 - Payment Sending Multiple Parameter XSS","url":"http://packetstormsecurity.com/files/123662/","osvdb":"98715","secunia":"55292","created_at":"2014-07-15T17:17:35.948Z","updated_at":"2014-07-15T17:17:35.948Z"}]}},{"email-newsletter":{"vulnerabilities":[{"id":89027,"title":"Email Newsletter 8.0 - 'option' Parameter Information Disclosure Vulnerability","url":"http://www.securityfocus.com/bid/53850","created_at":"2014-07-15T17:17:35.997Z","updated_at":"2014-07-15T17:17:35.997Z"}]}},{"faqs-manager":{"vulnerabilities":[{"id":89028,"title":"IndiaNIC FAQs Manager 1.0 - Blind SQL Injection","url":"http://packetstormsecurity.com/files/120911/","osvdb":"91623","exploitdb":"24868","created_at":"2014-07-15T17:17:36.045Z","updated_at":"2014-07-15T17:17:36.045Z"},{"id":89029,"title":"IndiaNIC FAQs Manager 1.0 - Ask Question Form question Parameter XSS","url":"http://packetstormsecurity.com/files/120910/","osvdb":"91624","secunia":"52780","exploitdb":"24867","created_at":"2014-07-15T17:17:36.092Z","updated_at":"2014-07-15T17:17:36.092Z"},{"id":89030,"title":"IndiaNIC FAQs Manager 1.0 - CAPTCHA Value Disclosure","url":"http://packetstormsecurity.com/files/120910/","osvdb":"91625","exploitdb":"24867","created_at":"2014-07-15T17:17:36.139Z","updated_at":"2014-07-15T17:17:36.139Z"},{"id":89031,"title":"IndiaNIC FAQs Manager 1.0 - FAQ Setting Manipulation CSRF","url":"http://packetstormsecurity.com/files/120910/","osvdb":"91626","secunia":"52780","exploitdb":"24867","created_at":"2014-07-15T17:17:36.187Z","updated_at":"2014-07-15T17:17:36.187Z"}]}},{"booking-system":{"vulnerabilities":[{"id":89032,"title":"Booking System - events_facualty_list.php eid Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/122289/","osvdb":"96740","created_at":"2014-07-15T17:17:36.237Z","updated_at":"2014-07-15T17:17:36.237Z"},{"id":89033,"title":"Booking System 1.2 - dopbs-backend-forms.php booking_form_id Parameter SQL injection","url":"http://www.securityfocus.com/archive/1/532168","osvdb":"107204","cve":"2014-3210","created_at":"2014-07-15T17:17:36.283Z","updated_at":"2014-07-15T17:17:36.283Z","fixed_in":"1.3"}]}},{"js-restaurant":{"vulnerabilities":[{"id":89034,"title":"JS Restaurant - popup.php restuarant_id Parameter SQL Injection","url":"http://packetstormsecurity.com/files/122316/","osvdb":"96743","created_at":"2014-07-15T17:17:36.329Z","updated_at":"2014-07-15T17:17:36.329Z"}]}},{"FlagEm":{"vulnerabilities":[{"id":89035,"title":"FlagEm - flagit.php cID Parameter XSS","url":"http://www.securityfocus.com/bid/61401,http://xforce.iss.net/xforce/xfdb/85925,http://packetstormsecurity.com/files/122505/","osvdb":"98226","created_at":"2014-07-15T17:17:36.377Z","updated_at":"2014-07-15T17:17:36.377Z"}]}},{"chat":{"vulnerabilities":[{"id":89036,"title":"Chat - message Parameter XSS","osvdb":"95984","secunia":"54403","created_at":"2014-07-15T17:17:36.432Z","updated_at":"2014-07-15T17:17:36.432Z"}]}},{"shareaholic":{"vulnerabilities":[{"id":89037,"title":"Shareaholic - Unspecified CSRF","osvdb":"96321","secunia":"54529","created_at":"2014-07-15T17:17:36.479Z","updated_at":"2014-07-15T17:17:36.479Z","fixed_in":"7.0.3.4"}]}},{"page-showcaser-boxes":{"vulnerabilities":[{"id":89038,"title":"Page Showcaser Boxes - Title Field Stored XSS","osvdb":"97579","created_at":"2014-07-15T17:17:36.530Z","updated_at":"2014-07-15T17:17:36.530Z"}]}},{"a-forms":{"vulnerabilities":[{"id":89039,"title":"A Forms 1.4.0 - a-forms.php a_form_tracking_page FunctionMultiple Parameters SQL Injection","osvdb":"96404","created_at":"2014-07-15T17:17:36.578Z","updated_at":"2014-07-15T17:17:36.578Z","fixed_in":"1.4.2"},{"id":89040,"title":"A Forms 1.4.0 - Form Submission CSRF","osvdb":"96381","secunia":"54489","created_at":"2014-07-15T17:17:36.623Z","updated_at":"2014-07-15T17:17:36.623Z","fixed_in":"1.4.1"},{"id":89041,"title":"A Forms 1.4.0 - a-forms.php a_form_shortcode Function Multiple Parameter XSS","osvdb":"96410","secunia":"54489","created_at":"2014-07-15T17:17:36.669Z","updated_at":"2014-07-15T17:17:36.669Z","fixed_in":"1.4.2"},{"id":89042,"title":"A Forms 1.4.0 - a-forms.php aform_css_file_selector() Function css_file_selection Parameter XSS","osvdb":"96809","secunia":"54489","created_at":"2014-07-15T17:17:36.716Z","updated_at":"2014-07-15T17:17:36.716Z","fixed_in":"1.4.2"},{"id":89043,"title":"A Forms 1.4.0 - a-forms.php add_field_to_section Function Multiple Parameter XSS","osvdb":"96810","secunia":"54489","created_at":"2014-07-15T17:17:36.764Z","updated_at":"2014-07-15T17:17:36.764Z","fixed_in":"1.4.2"},{"id":89044,"title":"A Forms 1.4.0 - a-forms.php a_form_initial_page Function Multiple Parameter XSS","osvdb":"96811","secunia":"54489","created_at":"2014-07-15T17:17:36.817Z","updated_at":"2014-07-15T17:17:36.817Z","fixed_in":"1.4.2"},{"id":89045,"title":"A Forms 1.4.0 - a-forms.php a_form_page Function Multiple Parameter XSS","osvdb":"96812","secunia":"54489","created_at":"2014-07-15T17:17:36.867Z","updated_at":"2014-07-15T17:17:36.867Z","fixed_in":"1.4.2"},{"id":89046,"title":"A Forms 1.4.0 - a-forms.php a_form_section_page Function message Parameter XSS","osvdb":"96813","secunia":"54489","created_at":"2014-07-15T17:17:36.918Z","updated_at":"2014-07-15T17:17:36.918Z","fixed_in":"1.4.2"},{"id":89047,"title":"A Forms 1.4.0 - a-forms.php a_form_tracking_page Function Multiple Parameter XSS","osvdb":"96814","secunia":"54489","created_at":"2014-07-15T17:17:36.971Z","updated_at":"2014-07-15T17:17:36.971Z","fixed_in":"1.4.2"}]}},{"share-this":{"vulnerabilities":[{"id":89048,"title":"ShareThis 7.0.3 - Setting Manipulation CSRF","url":"http://www.securityfocus.com/bid/62154","osvdb":"96884","cve":"2013-3479","secunia":"53135","created_at":"2014-07-15T17:17:37.019Z","updated_at":"2014-07-15T17:17:37.019Z","fixed_in":"7.0.6"}]}},{"simple-flash-video":{"vulnerabilities":[{"id":89049,"title":"Simple Flash Video 1.7 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/123562/,http://www.securityfocus.com/bid/62950","osvdb":"98371","created_at":"2014-07-15T17:17:37.065Z","updated_at":"2014-07-15T17:17:37.065Z"}]}},{"landing-pages":{"vulnerabilities":[{"id":89050,"title":"Landing Pages 1.2.3 - Unspecified Issue","osvdb":"102442","created_at":"2014-07-15T17:17:37.114Z","updated_at":"2014-07-15T17:17:37.114Z","fixed_in":"1.3.1"},{"id":89051,"title":"Landing Pages 1.2.1 - module.utils.php post Parameter SQL Injection","url":"http://www.securityfocus.com/bid/62942,http://xforce.iss.net/xforce/xfdb/87803","osvdb":"98334","cve":"2013-6243","secunia":"55192","created_at":"2014-07-15T17:17:37.176Z","updated_at":"2014-07-15T17:17:37.176Z","fixed_in":"1.2.3"},{"id":89052,"title":"Landing Pages 1.2.1 - module.redirect-ab-testing.php permalink_name Parameter SQL Injection","osvdb":"102407","created_at":"2014-07-15T17:17:37.269Z","updated_at":"2014-07-15T17:17:37.269Z","fixed_in":"1.2.3"}]}},{"cart66-lite":{"vulnerabilities":[{"id":89053,"title":"Cart66 1.5.1.14 - admin.php cart66-products Page Product Manipulation CSRF","url":"http://packetstormsecurity.com/files/123587/","osvdb":"98352","cve":"2013-5977","secunia":"55265","exploitdb":"28959","created_at":"2014-07-15T17:17:37.356Z","updated_at":"2014-07-15T17:17:37.356Z","fixed_in":"1.5.1.15"},{"id":89054,"title":"Cart66 - admin.php cart66-products Page Multiple Field Stored XSS","url":"http://packetstormsecurity.com/files/123587/","osvdb":"98353","cve":"2013-5978","exploitdb":"28959","created_at":"2014-07-15T17:17:37.434Z","updated_at":"2014-07-15T17:17:37.434Z","fixed_in":"1.5.1.15"}]}},{"category-wise-search":{"vulnerabilities":[{"id":89055,"title":"Wise Search Widget 1.1 - s Parameter Reflected XSS","osvdb":"97989","created_at":"2014-07-15T17:17:37.503Z","updated_at":"2014-07-15T17:17:37.503Z"}]}},{"catholic-liturgical-calendar":{"vulnerabilities":[{"id":89056,"title":"Catholic Liturgical Calendar Widget 0.0.1 - Title Field Stored XSS","osvdb":"98026","created_at":"2014-07-15T17:17:37.582Z","updated_at":"2014-07-15T17:17:37.582Z","fixed_in":"0.0.2"}]}},{"zenphoto":{"vulnerabilities":[{"id":89057,"title":"Zenphoto 1.4.5.2 - wordpress_import.php wp_prefix Function SQL Injection","url":"http://packetstormsecurity.com/files/123501/,http://www.securityfocus.com/bid/62815,http://seclists.org/bugtraq/2013/Oct/20","osvdb":"98091","created_at":"2014-07-15T17:17:37.641Z","updated_at":"2014-07-15T17:17:37.641Z","fixed_in":"1.4.5.4"}]}},{"bp-group-documents":{"vulnerabilities":[{"id":89058,"title":"Group Documents 1.2.1 - Document Upload Multiple Field Stored XSS","url":"http://seclists.org/fulldisclosure/2014/Feb/170","osvdb":"103475","created_at":"2014-07-15T17:17:37.700Z","updated_at":"2014-07-15T17:17:37.700Z","fixed_in":"1.2.2"},{"id":89059,"title":"Group Documents 1.2.1 - bp-group-documents-settings.php file Parameter Remote Path Traversal File Location Manipulation","url":"http://seclists.org/fulldisclosure/2014/Feb/170","osvdb":"103476","created_at":"2014-07-15T17:17:37.759Z","updated_at":"2014-07-15T17:17:37.759Z","fixed_in":"1.2.2"},{"id":89060,"title":"Group Documents 1.2.1 - Document Property Manipulation CSRF","url":"http://seclists.org/fulldisclosure/2014/Feb/170","osvdb":"103477","created_at":"2014-07-15T17:17:37.832Z","updated_at":"2014-07-15T17:17:37.832Z","fixed_in":"1.2.2"},{"id":89061,"title":"Group Documents 1.2 - File Uploading Multiple Parameter Stored XSS","url":"http://www.securityfocus.com/bid/62886","osvdb":"98246","secunia":"55130","created_at":"2014-07-15T17:17:37.918Z","updated_at":"2014-07-15T17:17:37.918Z","fixed_in":"1.2.2"}]}},{"ab-categories-search-widget":{"vulnerabilities":[{"id":89062,"title":"AB Categories Search Widget 0.1 - s Parameter Reflected XSS","osvdb":"97987","created_at":"2014-07-15T17:17:37.992Z","updated_at":"2014-07-15T17:17:37.992Z"}]}},{"sl-user-create":{"vulnerabilities":[{"id":89063,"title":"SL User Create 0.2.4 - LSL script Secret String Weakness Information Disclosure","url":"http://www.securityfocus.com/bid/63009","osvdb":"98456","secunia":"55262","created_at":"2014-07-15T17:17:38.059Z","updated_at":"2014-07-15T17:17:38.059Z","fixed_in":"0.2.5"}]}},{"player":{"vulnerabilities":[{"id":89064,"title":"Spider Video Player 2.1 - settings.php theme Parameter SQL Injection","url":"http://packetstormsecurity.com/files/121250/,http://www.securityfocus.com/bid/59021,http://xforce.iss.net/xforce/xfdb/83374","osvdb":"92264","cve":"2013-3532","created_at":"2014-07-15T17:17:38.115Z","updated_at":"2014-07-15T17:17:38.115Z"},{"id":89065,"title":"Spider Video Player 2.1 - settings.php s_v_player_id Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124353/","osvdb":"100848","created_at":"2014-07-15T17:17:38.162Z","updated_at":"2014-07-15T17:17:38.162Z"}]}},{"finalist":{"vulnerabilities":[{"id":89066,"title":"Finalist - vote.php id Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/123597/","osvdb":"98665","created_at":"2014-07-15T17:17:38.214Z","updated_at":"2014-07-15T17:17:38.214Z"},{"id":89067,"title":"Finalist - vote.php id Parameter SQL Injection","url":"http://packetstormsecurity.com/files/120951/","osvdb":"98665","created_at":"2014-07-15T17:17:38.271Z","updated_at":"2014-07-15T17:17:38.271Z"}]}},{"dexs-pm-system":{"vulnerabilities":[{"id":89068,"title":"Dexs PM System 1.0.1 - Private Message subject Parameter Stored XSS","url":"http://packetstormsecurity.com/files/123634/,http://www.securityfocus.com/bid/63021","osvdb":"98668","secunia":"55296","exploitdb":"28970","created_at":"2014-07-15T17:17:38.332Z","updated_at":"2014-07-15T17:17:38.332Z"}]}},{"video-metabox":{"vulnerabilities":[{"id":89069,"title":"Video Metabox 1.1 - Persistent XSS Vulnerability Disclosure","url":"http://www.securityfocus.com/bid/63172,http://securityundefined.com/wordpress-video-metabox-plugin-persistent-xss-vulnerability-disclosure/","osvdb":"98641","secunia":"55257","created_at":"2014-07-15T17:17:38.392Z","updated_at":"2014-07-15T17:17:38.392Z","fixed_in":"1.1.1"}]}},{"wp-realty":{"vulnerabilities":[{"id":89070,"title":"WP Realty - MySQL Time Based Injection","url":"http://packetstormsecurity.com/files/123655/,http://www.securityfocus.com/bid/63217","osvdb":"98748","exploitdb":"29021","created_at":"2014-07-15T17:17:38.443Z","updated_at":"2014-07-15T17:17:38.443Z"},{"id":89071,"title":"WP Realty - index_ext.php listing_id Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124418/","osvdb":"101583","created_at":"2014-07-15T17:17:38.496Z","updated_at":"2014-07-15T17:17:38.496Z"}]}},{"feed":{"vulnerabilities":[{"id":89072,"title":"Feed - news_dt.php nid Parameter SQL Injection","url":"http://packetstormsecurity.com/files/122260/","osvdb":"94804","created_at":"2014-07-15T17:17:38.545Z","updated_at":"2014-07-15T17:17:38.545Z"}]}},{"social-sharing-toolkit":{"vulnerabilities":[{"id":89073,"title":"Social Sharing Toolkit 2.1.1 - Setting Manipulation CSRF","url":"http://www.securityfocus.com/bid/63198","osvdb":"98717","cve":"2013-2701","secunia":"52951","created_at":"2014-07-15T17:17:38.598Z","updated_at":"2014-07-15T17:17:38.598Z"},{"id":89074,"title":"Social Sharing Toolkit 2.1.1 - Unspecified XSS","osvdb":"98931","cve":"2013-6280","created_at":"2014-07-15T17:17:38.655Z","updated_at":"2014-07-15T17:17:38.655Z","fixed_in":"2.1.2"}]}},{"videowall":{"vulnerabilities":[{"id":89075,"title":"Videowall - index.php page_id Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/123693/,http://seclists.org/bugtraq/2013/Oct/98","osvdb":"98765","created_at":"2014-07-15T17:17:38.708Z","updated_at":"2014-07-15T17:17:38.708Z"}]}},{"really-simple-facebook-twitter-share-buttons":{"vulnerabilities":[{"id":89076,"title":"Really simple Facebook Twitter share buttons 2.10.4 - Settings Page Manipulation CSRF","url":"http://www.securityfocus.com/bid/62268","osvdb":"97190","secunia":"54707","created_at":"2014-07-15T17:17:38.773Z","updated_at":"2014-07-15T17:17:38.773Z","fixed_in":"2.10.5"}]}},{"car-demon":{"vulnerabilities":[{"id":89077,"title":"Car Demon 1.0.1 - /wp-admin/edit.php Multiple Parameter XSS","osvdb":"90365","secunia":"51088","created_at":"2014-07-15T17:17:38.825Z","updated_at":"2014-07-15T17:17:38.825Z"},{"id":89078,"title":"Car Demon 1.0.1 - /wp-admin/post.php Multiple Parameter XSS","osvdb":"90366","secunia":"51088","created_at":"2014-07-15T17:17:38.892Z","updated_at":"2014-07-15T17:17:38.892Z"}]}},{"blue-wrench-videos-widget":{"vulnerabilities":[{"id":89079,"title":"Blue Wrench Video Widget 1.0.2 - admin.php bw-videos Page Multiple Action CSRF","url":"http://securityundefined.com/wordpress-plugin-blue-wrench-video-widget-csrf-persistent-xss-0day-disclosure/","osvdb":"98922","secunia":"55456","created_at":"2014-07-15T17:17:38.956Z","updated_at":"2014-07-15T17:17:38.956Z"},{"id":89080,"title":"Blue-Wrench-Video-Widget 1.0.2 - admin.php bw-videos Page Multiple Parameter Stored XSS","url":"http://securityundefined.com/wordpress-plugin-blue-wrench-video-widget-csrf-persistent-xss-0day-disclosure/","osvdb":"98923","secunia":"55456","created_at":"2014-07-15T17:17:39.008Z","updated_at":"2014-07-15T17:17:39.008Z"}]}},{"wp-mailup":{"vulnerabilities":[{"id":89081,"title":"MailUp 1.3.2 - ajax.functions.php Ajax Function Call Handling XSS Weakness","osvdb":"91274","cve":"2013-0731,2013-2640","secunia":"51917","created_at":"2014-07-15T17:17:39.066Z","updated_at":"2014-07-15T17:17:39.066Z","fixed_in":"1.3.3"}]}},{"wp-online-store":{"vulnerabilities":[{"id":89082,"title":"WP Online Store 1.3.1 - index.php slug Parameter Traversal Local File Inclusion","osvdb":"90243","secunia":"50836","created_at":"2014-07-15T17:17:39.121Z","updated_at":"2014-07-15T17:17:39.121Z","fixed_in":"1.3.2"},{"id":89083,"title":"WP Online Store 1.3.1 - index.php Multiple Parameter Traversal Arbitrary File Access","osvdb":"90244","secunia":"50836","created_at":"2014-07-15T17:17:39.173Z","updated_at":"2014-07-15T17:17:39.173Z","fixed_in":"1.3.2"}]}},{"payment-gateways-caller-for-wp-e-commerce":{"vulnerabilities":[{"id":89084,"title":"Payment Gateways Caller for WP e-Commerce 0.1.0 - load_merchant Parameter Traversal Local file Inclusion","url":"http://packetstormsecurity.com/files/123744/","osvdb":"98916","created_at":"2014-07-15T17:17:39.226Z","updated_at":"2014-07-15T17:17:39.226Z","fixed_in":"0.1.1"}]}},{"easy-photo-album":{"vulnerabilities":[{"id":89085,"title":"Easy Photo Album 1.1.5 - Album Information Disclosure","osvdb":"98802","created_at":"2014-07-15T17:17:39.279Z","updated_at":"2014-07-15T17:17:39.279Z","fixed_in":"1.1.6"}]}},{"hungred-post-thumbnail":{"vulnerabilities":[{"id":89086,"title":"Hungred Post Thumbnail - hpt_file_upload.php File Upload PHP Code Execution","url":"http://packetstormsecurity.com/files/113402/,http://www.securityfocus.com/bid/53898","osvdb":"82830","created_at":"2014-07-15T17:17:39.328Z","updated_at":"2014-07-15T17:17:39.328Z"}]}},{"dhtmlxspreadsheet":{"vulnerabilities":[{"id":89087,"title":"Spreadsheet - /dhtmlxspreadsheet/codebase/spreadsheet.php page Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/123699/,http://www.securityfocus.com/bid/63256","osvdb":"98831","cve":"2013-6281","secunia":"55396","created_at":"2014-07-15T17:17:39.377Z","updated_at":"2014-07-15T17:17:39.377Z"}]}},{"tweet-blender":{"vulnerabilities":[{"id":89088,"title":"Tweet Blender 4.0.1 - Unspecified XSS","url":"http://packetstormsecurity.com/files/124047/","osvdb":"98978","cve":"2013-6342","secunia":"55780","created_at":"2014-07-15T17:17:39.423Z","updated_at":"2014-07-15T17:17:39.423Z","fixed_in":"4.0.2"}]}},{"sb-uploader":{"vulnerabilities":[{"id":89089,"title":"WordPress SB Uploader 3.9 - Arbitrary File Upload Vulnerability","url":"http://packetstormsecurity.com/files/119159/","created_at":"2014-07-15T17:17:39.467Z","updated_at":"2014-07-15T17:17:39.467Z"}]}},{"connections":{"vulnerabilities":[{"id":89090,"title":"Connections Business Directory 0.7.9.3 - includes/template/class.template-parts.php Pagination URL Handling XSS","osvdb":"106558","created_at":"2014-07-15T17:17:39.521Z","updated_at":"2014-07-15T17:17:39.521Z","fixed_in":"0.7.9.4"},{"id":89091,"title":"Connections \u003c= 0.7.1.5 - Unspecified Security Vulnerability","url":"http://www.securityfocus.com/bid/51204","cve":"2011-5254","created_at":"2014-07-15T17:17:39.587Z","updated_at":"2014-07-15T17:17:39.587Z","fixed_in":"0.7.1.5"}]}},{"gallery-bank":{"vulnerabilities":[{"id":89092,"title":"Gallery Bank 2.0.19 - edit-album.php album_id Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/123924/,http://www.securityfocus.com/bid/63382","osvdb":"99045","secunia":"55443","created_at":"2014-07-15T17:17:39.639Z","updated_at":"2014-07-15T17:17:39.639Z","fixed_in":"2.0.20"},{"id":89093,"title":"Gallery Bank 2.0.19 - Multiple Unspecified Issues","url":"http://www.securityfocus.com/bid/63382","osvdb":"99046","secunia":"55443","created_at":"2014-07-15T17:17:39.691Z","updated_at":"2014-07-15T17:17:39.691Z","fixed_in":"2.0.20"},{"id":89094,"title":"Gallery Bank 2.0.19 - album-gallery-bank-class.php recordsArray Parameter Reflected XSS","url":"http://www.securityfocus.com/bid/63385,http://seclists.org/fulldisclosure/2013/Nov/38","osvdb":"99345","secunia":"55443","created_at":"2014-07-15T17:17:39.761Z","updated_at":"2014-07-15T17:17:39.761Z","fixed_in":"2.0.20"}]}},{"rockhoist-ratings":{"vulnerabilities":[{"id":89095,"title":"Rockhoist Ratings 1.2.2 - wp-admin/admin-ajax.php postID Parameter SQL Injection","url":"http://www.securityfocus.com/bid/63441","osvdb":"99195","secunia":"55445","created_at":"2014-07-15T17:17:39.832Z","updated_at":"2014-07-15T17:17:39.832Z"}]}},{"wordpress-checkout":{"vulnerabilities":[{"id":89096,"title":"Checkout Plugin - File Upload Remote Code Execution","url":"http://packetstormsecurity.com/files/123866/","osvdb":"99225","created_at":"2014-07-15T17:17:39.900Z","updated_at":"2014-07-15T17:17:39.900Z"}]}},{"mobilechief-mobile-site-creator":{"vulnerabilities":[{"id":89097,"title":"MobileChief - jQuery Validation Cross-Site Scripting Vulnerability","url":"http://packetstormsecurity.com/files/123809/","secunia":"55501","created_at":"2014-07-15T17:17:39.952Z","updated_at":"2014-07-15T17:17:39.952Z"}]}},{"timeline":{"vulnerabilities":[{"id":89098,"title":"Facebook Survey Pro - timeline/index.php id Parameter SQL Injection","url":"http://packetstormsecurity.com/files/118238/,http://www.securityfocus.com/bid/56595,http://xforce.iss.net/xforce/xfdb/80141","secunia":"87817","exploitdb":"22853","created_at":"2014-07-15T17:17:40.007Z","updated_at":"2014-07-15T17:17:40.007Z"}]}},{"live-comment-preview":{"vulnerabilities":[{"id":89099,"title":"Live Comment Preview 2.0.2 - Comment Field Preview XSS","osvdb":"92944","created_at":"2014-07-15T17:17:40.060Z","updated_at":"2014-07-15T17:17:40.060Z"}]}},{"polldaddy":{"vulnerabilities":[{"id":89100,"title":"Polldaddy Polls and Ratings 2.0.20 - Cross-Site Request Forgery Vulnerability","url":"http://www.securityfocus.com/bid/63557","osvdb":"99515","secunia":"55464","created_at":"2014-07-15T17:17:40.111Z","updated_at":"2014-07-15T17:17:40.111Z","fixed_in":"2.0.21"}]}},{"jigoshop":{"vulnerabilities":[{"id":89101,"title":"Jigoshop 1.8 - Multiple Script Direct Request Path Disclosure","osvdb":"99485","created_at":"2014-07-15T17:17:40.160Z","updated_at":"2014-07-15T17:17:40.160Z"}]}},{"fcchat":{"vulnerabilities":[{"id":89102,"title":"FCChat 2.2.11-2.2.13 - Upload.php Arbitrary File Upload Vulnerability","url":"http://www.securityfocus.com/bid/53855","created_at":"2014-07-15T17:17:40.206Z","updated_at":"2014-07-15T17:17:40.206Z"}]}},{"another-wordpress-classifieds-plugin":{"vulnerabilities":[{"id":89103,"title":"Another WordPress Classifieds - Unspecified Image Upload Vulnerability","url":"http://www.securityfocus.com/bid/52861","created_at":"2014-07-15T17:17:40.254Z","updated_at":"2014-07-15T17:17:40.254Z"}]}},{"picturesurf-gallery":{"vulnerabilities":[{"id":89104,"title":"Picturesurf Gallery 1.2 - upload.php Arbitrary File Upload Vulnerability","url":"http://www.securityfocus.com/bid/53894","created_at":"2014-07-15T17:17:40.301Z","updated_at":"2014-07-15T17:17:40.301Z"}]}},{"social-slider-2":{"vulnerabilities":[{"id":89105,"title":"Social Slider \u003c= 5.6.5 - social-slider-2/ajax.php rA Parameter SQL Injection","osvdb":"74421","secunia":"45549","exploitdb":"17617","created_at":"2014-07-15T17:17:40.355Z","updated_at":"2014-07-15T17:17:40.355Z","fixed_in":"6.0.0"}]}},{"redirection":{"vulnerabilities":[{"id":89106,"title":"Redirection 2.3.3 - view/admin/item.php URL Handling Reflected XSS","osvdb":"101774","created_at":"2014-07-15T17:17:40.404Z","updated_at":"2014-07-15T17:17:40.404Z","fixed_in":"2.3.4"},{"id":89107,"title":"Redirection - wp-admin/tools.php id Parameter XSS","osvdb":"74783","secunia":"45782","created_at":"2014-07-15T17:17:40.455Z","updated_at":"2014-07-15T17:17:40.455Z","fixed_in":"2.2.9"}]}},{"eshop":{"vulnerabilities":[{"id":89108,"title":"eShop - wp-admin/admin.php Multiple Parameter XSS","url":"http://seclists.org/bugtraq/2011/Aug/52","osvdb":"74464","secunia":"45553","created_at":"2014-07-15T17:17:40.507Z","updated_at":"2014-07-15T17:17:40.507Z","fixed_in":"6.2.9"}]}},{"all-in-one-adsense-and-ypn":{"vulnerabilities":[{"id":89109,"title":"All in One Adsense YPN 2.0.1 - all-in-one-adsense-and-ypn.php Unspecified XSS","osvdb":"74900","secunia":"45579","created_at":"2014-07-15T17:17:40.566Z","updated_at":"2014-07-15T17:17:40.566Z"},{"id":89110,"title":"All in One Adsense YPN 2.0.1 - all-in-one-adsense-and-ypn.php Direct Request AdSense Account Manipulation","osvdb":"74899","secunia":"45579","created_at":"2014-07-15T17:17:40.621Z","updated_at":"2014-07-15T17:17:40.621Z"}]}},{"SearchNSave":{"vulnerabilities":[{"id":89111,"title":"Search N Save - SearchNSave/error_log Direct Request Path Disclosure","osvdb":"95196","secunia":"54078","created_at":"2014-07-15T17:17:40.674Z","updated_at":"2014-07-15T17:17:40.674Z"}]}},{"taggator":{"vulnerabilities":[{"id":89112,"title":"TagGator - 'tagid' Parameter SQL Injection Vulnerability","url":"http://www.securityfocus.com/bid/52908","created_at":"2014-07-15T17:17:40.724Z","updated_at":"2014-07-15T17:17:40.724Z"}]}},{"uploadify-integration":{"vulnerabilities":[{"id":89113,"title":"Uploadify Integration 0.9.6 - Multiple Cross Site Scripting Vulnerabilities","url":"http://www.securityfocus.com/bid/52944","created_at":"2014-07-15T17:17:40.775Z","updated_at":"2014-07-15T17:17:40.775Z"}]}},{"wpsc-mijnpress":{"vulnerabilities":[{"id":89114,"title":"WPsc MijnPress - 'rwflush' Parameter Cross Site Scripting Vulnerability","url":"http://www.securityfocus.com/bid/53302","created_at":"2014-07-15T17:17:40.827Z","updated_at":"2014-07-15T17:17:40.827Z"}]}},{"leaflet-maps-marker":{"vulnerabilities":[{"id":89115,"title":"Leaflet Maps Marker 3.5.2 - Two SQL Injection Vulnerabilities","secunia":"53855","created_at":"2014-07-15T17:17:40.879Z","updated_at":"2014-07-15T17:17:40.879Z","fixed_in":"3.5.3"}]}},{"google-xml-sitemaps-generator":{"vulnerabilities":[{"id":89116,"title":"XML Sitemap Generator 3.2.8 - XML File Overwrite Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/119357/","osvdb":"89411","created_at":"2014-07-15T17:17:40.944Z","updated_at":"2014-07-15T17:17:40.944Z"}]}},{"spam-free-wordpress":{"vulnerabilities":[{"id":89117,"title":"Spam Free Plugin 1.9.2 - Multiple Script Direct Request Path Disclosure","url":"http://xforce.iss.net/xforce/xfdb/81007","osvdb":"88954","created_at":"2014-07-15T17:17:40.999Z","updated_at":"2014-07-15T17:17:40.999Z"},{"id":89118,"title":"Spam Free Plugin 1.9.2 - IP Blocklist Restriction Bypass","url":"http://xforce.iss.net/xforce/xfdb/81006,http://packetstormsecurity.com/files/119274/","osvdb":"88955","created_at":"2014-07-15T17:17:41.053Z","updated_at":"2014-07-15T17:17:41.053Z"}]}},{"editorial-calendar":{"vulnerabilities":[{"id":89119,"title":"Editorial Calendar 2.6 - Post Title XSS","osvdb":"90226","created_at":"2014-07-15T17:17:41.111Z","updated_at":"2014-07-15T17:17:41.111Z","fixed_in":"2.7"},{"id":89120,"title":"Editorial Calendar 2.6 - Permission Verification Arbitrary Calendar Post Deletion","osvdb":"90227","secunia":"52218","created_at":"2014-07-15T17:17:41.165Z","updated_at":"2014-07-15T17:17:41.165Z","fixed_in":"2.7"},{"id":89121,"title":"Editorial Calendar 2.6 - Post Query Multiple Filter SQL Injection","osvdb":"90228","created_at":"2014-07-15T17:17:41.220Z","updated_at":"2014-07-15T17:17:41.220Z"}]}},{"shareyourcart":{"vulnerabilities":[{"id":89122,"title":"ShareYourCart 1.6.1 - SDK Multiple Unspecified Path Disclosure","osvdb":"81618","cve":"2012-4332","secunia":"48960","created_at":"2014-07-15T17:17:41.274Z","updated_at":"2014-07-15T17:17:41.274Z","fixed_in":"1.7.1"}]}},{"alo-easymail":{"vulnerabilities":[{"id":89123,"title":"ALO EasyMail Newsletter 2.4.7 - Multiple Unspecified XSS","osvdb":"82324","secunia":"49320","created_at":"2014-07-15T17:17:41.327Z","updated_at":"2014-07-15T17:17:41.327Z","fixed_in":"2.4.8"}]}},{"contact-form-7":{"vulnerabilities":[{"id":89124,"title":"Contact Form 7 \u003c= 3.7.1 - Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/66381/","cve":"2014-2265","created_at":"2014-07-15T17:17:41.400Z","updated_at":"2014-07-15T17:17:41.400Z","fixed_in":"3.7.2"},{"id":89125,"title":"Contact Form 7 \u0026 Old WP Versions - Crafted File Extension Upload Remote Code Execution","url":"http://packetstormsecurity.com/files/125018/,http://seclists.org/fulldisclosure/2014/Feb/0","osvdb":"102776","created_at":"2014-07-15T17:17:41.455Z","updated_at":"2014-07-15T17:17:41.455Z"},{"id":89126,"title":"Contact Form 7 \u003c= 3.5.2 - Arbitrary File Upload Remote Code Execution","url":"http://packetstormsecurity.com/files/124154/","osvdb":"100189","created_at":"2014-07-15T17:17:41.508Z","updated_at":"2014-07-15T17:17:41.508Z","fixed_in":"3.5.3"}]}},{"store-locator":{"vulnerabilities":[{"id":89127,"title":"Store Locator \u003c= 2.6.1 - Cross-Site Request Forgery Vulnerability","osvdb":"100485","secunia":"55276","created_at":"2014-07-15T17:17:41.562Z","updated_at":"2014-07-15T17:17:41.562Z","fixed_in":"2.12"}]}},{"optinfirex":{"vulnerabilities":[{"id":89128,"title":"Optinfirex - lp/index.php id Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124188/","osvdb":"100435","created_at":"2014-07-15T17:17:41.608Z","updated_at":"2014-07-15T17:17:41.608Z"}]}},{"amerisale-re":{"vulnerabilities":[{"id":89129,"title":"Amerisale-Re - Remote Shell Upload","url":"http://packetstormsecurity.com/files/124992/","created_at":"2014-07-15T17:17:41.654Z","updated_at":"2014-07-15T17:17:41.654Z"},{"id":89130,"title":"Amerisale-Re - netriesdetail/upload.php edit Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124187/,http://xforce.iss.net/xforce/xfdb/89263","osvdb":"100434","created_at":"2014-07-15T17:17:41.700Z","updated_at":"2014-07-15T17:17:41.700Z"}]}},{"js-multihotel":{"vulnerabilities":[{"id":89131,"title":"JS MultiHotel 2.2.1 - includes/show_image.php file Parameter Remote File Inclusion DoS","url":"http://packetstormsecurity.com/files/125959/,http://seclists.org/fulldisclosure/2014/Mar/428","osvdb":"105185","created_at":"2014-07-15T17:17:41.751Z","updated_at":"2014-07-15T17:17:41.751Z"},{"id":89132,"title":"JS MultiHotel 2.2.1 - includes/delete_img.php path Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/125959/,http://seclists.org/fulldisclosure/2014/Mar/428,http://www.securityfocus.com/bid/66529","osvdb":"105186","created_at":"2014-07-15T17:17:41.803Z","updated_at":"2014-07-15T17:17:41.803Z"},{"id":89133,"title":"JS MultiHotel 2.2.1 - Multiple Script Direct Request Path Disclosure","url":"http://packetstormsecurity.com/files/125959/,http://seclists.org/fulldisclosure/2014/Mar/428","osvdb":"105187","created_at":"2014-07-15T17:17:41.851Z","updated_at":"2014-07-15T17:17:41.851Z"},{"id":89134,"title":"JS MultiHotel 2.2.1 - includes/timthumb.php src Parameter Direct Request Path Disclosure","url":"http://seclists.org/fulldisclosure/2014/Mar/413,http://www.securityfocus.com/bid/66529","osvdb":"105119","created_at":"2014-07-15T17:17:41.904Z","updated_at":"2014-07-15T17:17:41.904Z"},{"id":89135,"title":"JS MultiHotel 2.2.1 - refreshDate.php roomid Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124239/,http://www.securityfocus.com/bid/64045","osvdb":"100575","secunia":"55919","created_at":"2014-07-15T17:17:41.954Z","updated_at":"2014-07-15T17:17:41.954Z"}]}},{"dzs-videogallery":{"vulnerabilities":[{"id":89136,"title":"DZS Video Gallery - ajax.php source Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/125179/","osvdb":"103283","secunia":"56904","created_at":"2014-07-15T17:17:42.000Z","updated_at":"2014-07-15T17:17:42.000Z"},{"id":89137,"title":"DZS Video Gallery - upload.php File Upload Remote Code Execution","osvdb":"100620","exploitdb":"29834","created_at":"2014-07-15T17:17:42.051Z","updated_at":"2014-07-15T17:17:42.051Z"},{"id":89138,"title":"DZS Video Gallery 3.1.3 - Remote File Disclosure","url":"http://packetstormsecurity.com/files/124317/","osvdb":"100750","created_at":"2014-07-15T17:17:42.102Z","updated_at":"2014-07-15T17:17:42.102Z"},{"id":89139,"title":"DZS Video Gallery - preview_allchars.swf logoLink Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/126846/,http://www.securityfocus.com/bid/67698,http://seclists.org/fulldisclosure/2014/May/157","osvdb":"107521","cve":"2014-3923","created_at":"2014-07-15T17:17:42.151Z","updated_at":"2014-07-15T17:17:42.151Z"},{"id":89140,"title":"DZS Video Gallery - deploy/preview_skin_overlay.swf logoLink Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/126846/,http://www.securityfocus.com/bid/67698,http://seclists.org/fulldisclosure/2014/May/157","osvdb":"107522","cve":"2014-3923","created_at":"2014-07-15T17:17:42.198Z","updated_at":"2014-07-15T17:17:42.198Z"},{"id":89141,"title":"DZS Video Gallery - deploy/preview.swf logoLink Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/126846/,http://www.securityfocus.com/bid/67698,http://seclists.org/fulldisclosure/2014/May/157","osvdb":"107523","cve":"2014-3923","created_at":"2014-07-15T17:17:42.245Z","updated_at":"2014-07-15T17:17:42.245Z"},{"id":89142,"title":"DZS Video Gallery - preview_skin_rouge.swf logoLink Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/126846/,http://www.securityfocus.com/bid/67698,http://seclists.org/fulldisclosure/2014/May/157","osvdb":"107524","cve":"2014-3923","created_at":"2014-07-15T17:17:42.294Z","updated_at":"2014-07-15T17:17:42.294Z"}]}},{"askapache-firefox-adsense":{"vulnerabilities":[{"id":89143,"title":"AskApache Firefox Adsense 3.0 - Unspecified CSRF","url":"https://www.htbridge.com/advisory/HTB23188","osvdb":"100662","cve":"2013-6992","created_at":"2014-07-15T17:17:42.345Z","updated_at":"2014-07-15T17:17:42.345Z"}]}},{"ad-minister":{"vulnerabilities":[{"id":89144,"title":"Ad-minister 0.6 - Unspecified XSS","url":"http://packetstormsecurity.com/files/124604/,https://www.htbridge.com/advisory/HTB23187","osvdb":"100663","cve":"2013-6993","created_at":"2014-07-15T17:17:42.392Z","updated_at":"2014-07-15T17:17:42.392Z"}]}},{"tdo-mini-forms-wordpress-plugin":{"vulnerabilities":[{"id":89145,"title":"TDO Mini Forms 0.13.9 - tdomf-upload-inline.php File Upload Remote Code Execution","url":"http://packetstormsecurity.com/files/124352/","osvdb":"100847","created_at":"2014-07-15T17:17:42.438Z","updated_at":"2014-07-15T17:17:42.438Z"}]}},{"huskerportfolio":{"vulnerabilities":[{"id":89146,"title":"HuskerPortfolio 0.3 - huskerPortfolio.php File Upload CSRF","url":"http://packetstormsecurity.com/files/124359/","osvdb":"100845","created_at":"2014-07-15T17:17:42.489Z","updated_at":"2014-07-15T17:17:42.489Z"}]}},{"formcraft":{"vulnerabilities":[{"id":89147,"title":"FormCraft - form.php id Parameter SQL Injection","url":"http://packetstormsecurity.com/files/124343/","osvdb":"100877","secunia":"56044","created_at":"2014-07-15T17:17:42.537Z","updated_at":"2014-07-15T17:17:42.537Z"}]}},{"zarzadzanie_kontem":{"vulnerabilities":[{"id":89148,"title":"Zarzadzanie Kontem - ajaxfilemanager.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/118322/","osvdb":"87834","created_at":"2014-07-15T17:17:42.592Z","updated_at":"2014-07-15T17:17:42.592Z"}]}},{"ads-box":{"vulnerabilities":[{"id":89149,"title":"Ads Box - iframe_ampl.php count Parameter SQL Injection","url":"http://packetstormsecurity.com/files/118342/,http://www.securityfocus.com/bid/56681,http://xforce.iss.net/xforce/xfdb/80256","osvdb":"88257","created_at":"2014-07-15T17:17:42.639Z","updated_at":"2014-07-15T17:17:42.639Z"}]}},{"broken-link-checker":{"vulnerabilities":[{"id":89150,"title":"Broken Link Checker 1.9.1 - Bulk Action Form URL Handling XSS","osvdb":"101059","secunia":"56053","created_at":"2014-07-15T17:17:42.692Z","updated_at":"2014-07-15T17:17:42.692Z","fixed_in":"1.9.2"},{"id":89151,"title":"Broken Link Checker 1.9.1 - Sort Direction Query Argument Handling XSS","osvdb":"101066","secunia":"56053","created_at":"2014-07-15T17:17:42.738Z","updated_at":"2014-07-15T17:17:42.738Z","fixed_in":"1.9.2"}]}},{"easy-career-openings":{"vulnerabilities":[{"id":89152,"title":"Easy Career Openings - jobid Parameter SQL Injection","url":"http://packetstormsecurity.com/files/124309/","osvdb":"100677","created_at":"2014-07-15T17:17:42.788Z","updated_at":"2014-07-15T17:17:42.788Z"}]}},{"q-and-a":{"vulnerabilities":[{"id":89153,"title":"Q and A 1.0.6.2 - Multiple Scripts Direct Request Path Disclosure","osvdb":"100793","created_at":"2014-07-15T17:17:42.836Z","updated_at":"2014-07-15T17:17:42.836Z"}]}},{"ml-slider":{"vulnerabilities":[{"id":89154,"title":"Meta Slider 2.5 - metaslider.php id Parameter XSS","url":"http://packetstormsecurity.com/files/127288/,http://www.securityfocus.com/bid/68283","osvdb":"108611","created_at":"2014-07-15T17:17:42.886Z","updated_at":"2014-07-15T17:17:42.886Z"},{"id":89155,"title":"Meta Slider 2.1.6 - Multiple Script Direct Request Path Disclosure","osvdb":"100794","created_at":"2014-07-15T17:17:42.943Z","updated_at":"2014-07-15T17:17:42.943Z"}]}},{"custom-tables":{"vulnerabilities":[{"id":89156,"title":"Custom Tables 3.4.4 - iframe.php key Parameter XSS","osvdb":"83646","secunia":"49823","created_at":"2014-07-15T17:17:42.992Z","updated_at":"2014-07-15T17:17:42.992Z"}]}},{"wp-socializer":{"vulnerabilities":[{"id":89157,"title":"WP Socializer 2.4.2 - admin/wpsr-services-selector.php val Parameter XSS","osvdb":"83645","secunia":"49824","created_at":"2014-07-15T17:17:43.043Z","updated_at":"2014-07-15T17:17:43.043Z"}]}},{"church-admin":{"vulnerabilities":[{"id":89158,"title":"church_admin 0.33.4.5 - includes/validate.php id Parameter XSS","osvdb":"83644","secunia":"49827","created_at":"2014-07-15T17:17:43.094Z","updated_at":"2014-07-15T17:17:43.094Z"}]}},{"phpfreechat":{"vulnerabilities":[{"id":89159,"title":"PHPFreeChat 0.2.8 - lib/csstidy-1.2/css_optimiser.php url Parameter XSS","osvdb":"83642","secunia":"49826","created_at":"2014-07-15T17:17:43.142Z","updated_at":"2014-07-15T17:17:43.142Z"}]}},{"simple-embed-code":{"vulnerabilities":[{"id":89160,"title":"Artiss Code Embed 2.0.1 - wp-admin/admin.php suffix Parameter XSS","osvdb":"83686","secunia":"49848","created_at":"2014-07-15T17:17:43.189Z","updated_at":"2014-07-15T17:17:43.189Z","fixed_in":"2.0.2"}]}},{"dewplayer-flash-mp3-player":{"vulnerabilities":[{"id":89161,"title":"Dewplayer - dewplayer-vinyl.swf xml Parameter XML File Handling XSS","url":"http://packetstormsecurity.com/files/124582/,http://www.securityfocus.com/bid/64506,http://seclists.org/fulldisclosure/2013/Dec/192","osvdb":"101353","created_at":"2014-07-15T17:17:43.237Z","updated_at":"2014-07-15T17:17:43.237Z"},{"id":89162,"title":"Dewplayer - dewplayer-vinyl-en.swf xml Parameter XML File Handling XSS","url":"http://packetstormsecurity.com/files/124582/,http://www.securityfocus.com/bid/64506,http://seclists.org/fulldisclosure/2013/Dec/192","osvdb":"101352","created_at":"2014-07-15T17:17:43.284Z","updated_at":"2014-07-15T17:17:43.284Z"},{"id":89163,"title":"Dewplayer \u003c= 1.2 - dewplayer.php Direct Request Path Disclosure Weakness","url":"http://seclists.org/fulldisclosure/2013/Dec/209","osvdb":"101440","created_at":"2014-07-15T17:17:43.337Z","updated_at":"2014-07-15T17:17:43.337Z"}]}},{"advanced-dewplayer":{"vulnerabilities":[{"id":89164,"title":"Advanced Dewplayer - dewplayer-vinyl.swf xml Parameter XML File Handling XSS","url":"http://packetstormsecurity.com/files/124582/,http://www.securityfocus.com/bid/64506,http://seclists.org/fulldisclosure/2013/Dec/192","osvdb":"101353","created_at":"2014-07-15T17:17:43.384Z","updated_at":"2014-07-15T17:17:43.384Z"},{"id":89162,"title":"Dewplayer - dewplayer-vinyl-en.swf xml Parameter XML File Handling XSS","url":"http://packetstormsecurity.com/files/124582/,http://www.securityfocus.com/bid/64506,http://seclists.org/fulldisclosure/2013/Dec/192","osvdb":"101352","created_at":"2014-07-15T17:17:43.284Z","updated_at":"2014-07-15T17:17:43.284Z"},{"id":89165,"title":"Advanced Dewplayer \u003c= 1.2 - dewplayer.php Direct Request Path Disclosure Weakness","url":"http://seclists.org/fulldisclosure/2013/Dec/209","osvdb":"101440","created_at":"2014-07-15T17:17:43.494Z","updated_at":"2014-07-15T17:17:43.494Z"},{"id":89166,"title":"Advanced Dewplayer \u003c= 1.2 - download-file.php dew_file Parameter Traversal Arbitrary File Access","url":"http://seclists.org/oss-sec/2013/q4/566","osvdb":"101513","secunia":"55941","created_at":"2014-07-15T17:17:43.548Z","updated_at":"2014-07-15T17:17:43.548Z"}]}},{"sem-wysiwyg":{"vulnerabilities":[{"id":89167,"title":"SEM WYSIWYG - Arbitrary File Upload","url":"http://packetstormsecurity.com/files/115789/","created_at":"2014-07-15T17:17:43.594Z","updated_at":"2014-07-15T17:17:43.594Z"}]}},{"recommend-a-friend":{"vulnerabilities":[{"id":89168,"title":"Recommend a friend 2.0.2 - inc/raf_form.php current_url Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124587/","osvdb":"101487","cve":"2013-7276","secunia":"56209","created_at":"2014-07-15T17:17:43.646Z","updated_at":"2014-07-15T17:17:43.646Z"}]}},{"securimage-wp":{"vulnerabilities":[{"id":89169,"title":"Securimage-WP 3.2.4 - siwp_test.php URI XSS","url":"http://packetstormsecurity.com/files/121588/,http://xforce.iss.net/xforce/xfdb/84186","osvdb":"93259","secunia":"53376","created_at":"2014-07-15T17:17:43.692Z","updated_at":"2014-07-15T17:17:43.692Z"}]}},{"amazon-affiliate-link-localizer":{"vulnerabilities":[{"id":89170,"title":"Amazon Affiliate Link Localizer 1.8.2 - amazon_affiliate_link_localizer.php amzn_com Parameter XSS","url":"http://www.dfcode.org/code.php?id=27","osvdb":"100783","created_at":"2014-07-15T17:17:43.743Z","updated_at":"2014-07-15T17:17:43.743Z"}]}},{"maxbuttons":{"vulnerabilities":[{"id":89171,"title":"MaxButtons 1.19.0 - includes/maxbuttons-button-css.php Authentication Bypass","osvdb":"101773","secunia":"56272","created_at":"2014-07-15T17:17:43.789Z","updated_at":"2014-07-15T17:17:43.789Z","fixed_in":"1.20.0"}]}},{"aprils-super-functions-pack":{"vulnerabilities":[{"id":89172,"title":"April's Super Functions Pack 1.4.7 - readme.php page Parameter Reflected XSS","osvdb":"101807","secunia":"55576","created_at":"2014-07-15T17:17:43.838Z","updated_at":"2014-07-15T17:17:43.838Z","fixed_in":"1.4.8"}]}},{"wordpress-connect":{"vulnerabilities":[{"id":89173,"title":"WordPress Connect 2.0.3 - Editor Pages Unspecified XSS","osvdb":"101716","secunia":"56238","created_at":"2014-07-15T17:17:43.884Z","updated_at":"2014-07-15T17:17:43.884Z"}]}},{"page-layout-builder":{"vulnerabilities":[{"id":89174,"title":"Page Layout Builder 1.3.4 - includes/layout-settings.php layout_settings_id Parameter Reflected XSS","osvdb":"101723","secunia":"56214","created_at":"2014-07-15T17:17:43.932Z","updated_at":"2014-07-15T17:17:43.932Z","fixed_in":"1.3.6"},{"id":89175,"title":"Page Layout Builder 1.3.4 - Unspecified Issue","osvdb":"101724","secunia":"56214","created_at":"2014-07-15T17:17:43.980Z","updated_at":"2014-07-15T17:17:43.980Z","fixed_in":"1.3.6"}]}},{"foliopress-wysiwyg":{"vulnerabilities":[{"id":89176,"title":"Foliopress WYSIWYG - Unspecified XSS","osvdb":"101726","secunia":"56261","created_at":"2014-07-15T17:17:44.028Z","updated_at":"2014-07-15T17:17:44.028Z","fixed_in":"2.6.8.5"}]}},{"intouch":{"vulnerabilities":[{"id":89177,"title":"intouch 2.0 - intouch.js.php intouch_failure Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124687/,http://www.securityfocus.com/bid/64680","osvdb":"101822","created_at":"2014-07-15T17:17:44.075Z","updated_at":"2014-07-15T17:17:44.075Z"}]}},{"nmedia-mailchimp-widget":{"vulnerabilities":[{"id":89178,"title":"Nmedia MailChimp 3.1 - api_mailchimp/postToMailChimp.php abs_path Parameter XSS","osvdb":"83083","secunia":"49538","created_at":"2014-07-15T17:17:44.129Z","updated_at":"2014-07-15T17:17:44.129Z","fixed_in":"3.2"}]}},{"ns-utilities":{"vulnerabilities":[{"id":89179,"title":"NS Utilities 1.0 - Unspecified Remote Issue","osvdb":"82944","secunia":"49476","created_at":"2014-07-15T17:17:44.174Z","updated_at":"2014-07-15T17:17:44.174Z","fixed_in":"1.1"}]}},{"spiffy":{"vulnerabilities":[{"id":89180,"title":"Spiffy XSPF Player 0.1 - playlist.php playlist_id Parameter SQL Injection","url":"http://packetstormsecurity.com/files/121204/,http://www.securityfocus.com/bid/58976,http://xforce.iss.net/xforce/xfdb/83345","osvdb":"92258","cve":"2013-3530","created_at":"2014-07-15T17:17:44.224Z","updated_at":"2014-07-15T17:17:44.224Z"}]}},{"easy-media-gallery":{"vulnerabilities":[{"id":89181,"title":"Easy Media Gallery 1.2.29 - wp-admin/edit.php Multiple Parameter Stored XSS","url":"http://packetstormsecurity.com/files/125396/,http://www.securityfocus.com/bid/65804","osvdb":"103779","created_at":"2014-07-15T17:17:44.270Z","updated_at":"2014-07-15T17:17:44.270Z"},{"id":89182,"title":"Easy Media Gallery 1.2.25 - includes/emg-settings.php spg_add_admin Function Admin User Creation CSRF","url":"http://incolumitas.com/2013/12/17/exploiting-wordpress-plugins-using-insecure-admin-forms-no-3-example-exploit-included/","osvdb":"101941","secunia":"56408","created_at":"2014-07-15T17:17:44.317Z","updated_at":"2014-07-15T17:17:44.317Z","fixed_in":"1.2.27"}]}},{"wp-members":{"vulnerabilities":[{"id":89183,"title":"WP-Members 2.8.9 - profile.php Multiple Parameter Stored XSS","url":"http://packetstormsecurity.com/files/124720/,http://www.securityfocus.com/bid/64713","osvdb":"101946","secunia":"56271","created_at":"2014-07-15T17:17:44.364Z","updated_at":"2014-07-15T17:17:44.364Z","fixed_in":"2.8.10"},{"id":89184,"title":"WP-Members 2.8.9 - wp-login.php register Action Multiple Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124720/,http://www.securityfocus.com/bid/64713","osvdb":"101947","secunia":"56271","created_at":"2014-07-15T17:17:44.413Z","updated_at":"2014-07-15T17:17:44.413Z","fixed_in":"2.8.10"}]}},{"wpmbytplayer":{"vulnerabilities":[{"id":89185,"title":"mb.YTPlayer for background videos 1.7.2 - TinyMCE Popup Unspecified Issue","osvdb":"101718","secunia":"56270","created_at":"2014-07-15T17:17:44.462Z","updated_at":"2014-07-15T17:17:44.462Z","fixed_in":"1.7.3"}]}},{"keyring":{"vulnerabilities":[{"id":89186,"title":"Keyring 1.5 - OAuth Example Page XSS","secunia":"56367","created_at":"2014-07-15T17:17:44.511Z","updated_at":"2014-07-15T17:17:44.511Z"}]}},{"avchat-3":{"vulnerabilities":[{"id":89187,"title":"AVChat Video Chat 1.4.1 - index_popup.php Multiple Parameters Reflected XSS","osvdb":"102206","secunia":"56447","created_at":"2014-07-15T17:17:44.561Z","updated_at":"2014-07-15T17:17:44.561Z","fixed_in":"1.4.2"}]}},{"groupdocs-comparison":{"vulnerabilities":[{"id":89188,"title":"GroupDocs Comparison 1.0.2 - grpdocscomparison.php Multiple Parameter XSS","osvdb":"102297","created_at":"2014-07-15T17:17:44.609Z","updated_at":"2014-07-15T17:17:44.609Z","fixed_in":"1.0.3"}]}},{"groupdocs-signature":{"vulnerabilities":[{"id":89189,"title":"GroupDocs Signature 1.2.0 - grpdocs-dialog.php Multiple Parameter XSS","osvdb":"102298","created_at":"2014-07-15T17:17:44.664Z","updated_at":"2014-07-15T17:17:44.664Z","fixed_in":"1.2.1"},{"id":89190,"title":"GroupDocs Signature 1.2.0 - options.php Multiple Parameter XSS","osvdb":"102299","created_at":"2014-07-15T17:17:44.709Z","updated_at":"2014-07-15T17:17:44.709Z","fixed_in":"1.2.1"}]}},{"groupdocs-viewer":{"vulnerabilities":[{"id":89191,"title":"GroupDocs Viewer 1.4.1 - options.php Multiple Parameter XSS","osvdb":"102299","created_at":"2014-07-15T17:17:44.757Z","updated_at":"2014-07-15T17:17:44.757Z","fixed_in":"1.4.2"},{"id":89192,"title":"GroupDocs Viewer 1.4.1 - grpdocs-dialog.php Multiple Parameter XSS","osvdb":"102300","created_at":"2014-07-15T17:17:44.805Z","updated_at":"2014-07-15T17:17:44.805Z","fixed_in":"1.4.2"}]}},{"groupdocs-documents-annotation":{"vulnerabilities":[{"id":89193,"title":"GroupDocs Document Annotation 1.3.8 - options.php Multiple Parameter XSS","osvdb":"102299","created_at":"2014-07-15T17:17:44.854Z","updated_at":"2014-07-15T17:17:44.854Z","fixed_in":"1.3.9"},{"id":89194,"title":"GroupDocs Document Annotation 1.3.8 - grpdocs-dialog.php Multiple Parameter XSS","osvdb":"102301","created_at":"2014-07-15T17:17:44.915Z","updated_at":"2014-07-15T17:17:44.915Z","fixed_in":"1.3.9"}]}},{"athlon-manage-calameo-publications":{"vulnerabilities":[{"id":89195,"title":"Manage Calameo Publications 1.1.0 - thickbox_content.php attachment_id Parameter Reflected XSS","osvdb":"102433","secunia":"56428","created_at":"2014-07-15T17:17:44.964Z","updated_at":"2014-07-15T17:17:44.964Z","fixed_in":"1.1.1"}]}},{"ss-downloads":{"vulnerabilities":[{"id":89196,"title":"SS Downloads 1.4.4.1 - services/getfile.php file Parameter XSS","osvdb":"102501","created_at":"2014-07-15T17:17:45.010Z","updated_at":"2014-07-15T17:17:45.010Z","fixed_in":"1.5"},{"id":89197,"title":"SS Downloads 1.4.4.1 - ss-downloads.php Multiple Variables XSS","osvdb":"102502","created_at":"2014-07-15T17:17:45.055Z","updated_at":"2014-07-15T17:17:45.055Z","fixed_in":"1.5"},{"id":89198,"title":"SS Downloads 1.4.4.1 - templates/download.php Multiple Parameters Reflected XSS","osvdb":"102503","secunia":"56428","created_at":"2014-07-15T17:17:45.104Z","updated_at":"2014-07-15T17:17:45.104Z","fixed_in":"1.5"},{"id":89199,"title":"SS Downloads 1.4.4.1 - templates/register.php Multiple Parameter Reflected XSS","osvdb":"102504","secunia":"56428","created_at":"2014-07-15T17:17:45.154Z","updated_at":"2014-07-15T17:17:45.154Z","fixed_in":"1.5"},{"id":89200,"title":"SS Downloads 1.4.4.1 - templates/emailsent.php Multiple Parameter Reflected XSS","osvdb":"102537","secunia":"56532","created_at":"2014-07-15T17:17:45.201Z","updated_at":"2014-07-15T17:17:45.201Z","fixed_in":"1.5"},{"id":89201,"title":"SS Downloads 1.4.4.1 - templates/emailform.php Multiple Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124958/","osvdb":"102538","secunia":"56532","created_at":"2014-07-15T17:17:45.250Z","updated_at":"2014-07-15T17:17:45.250Z","fixed_in":"1.5"},{"id":89202,"title":"SS Downloads 1.4.4.1 - templates/emailandnameform.php Multiple Parameter Reflected XSS","osvdb":"102539","secunia":"56532","created_at":"2014-07-15T17:17:45.298Z","updated_at":"2014-07-15T17:17:45.298Z","fixed_in":"1.5"}]}},{"global-flash-galleries":{"vulnerabilities":[{"id":89203,"title":"Global Flash Galleries - popup.php id Parameter SQL Injection","osvdb":"104907","created_at":"2014-07-15T17:17:45.344Z","updated_at":"2014-07-15T17:17:45.344Z"},{"id":89204,"title":"Global Flash Galleries - swfupload.php Unauthenticated Image Upload Weakness","url":"http://packetstormsecurity.com/files/124850/,http://www.securityfocus.com/bid/65060","osvdb":"102423","created_at":"2014-07-15T17:17:45.391Z","updated_at":"2014-07-15T17:17:45.391Z"}]}},{"social-connect":{"vulnerabilities":[{"id":89205,"title":"Social Connect 0.10.1 - diagnostics/test.php testing Parameter Reflected XSS","osvdb":"102411","secunia":"56587","created_at":"2014-07-15T17:17:45.442Z","updated_at":"2014-07-15T17:17:45.442Z","fixed_in":"0.10.2"}]}},{"let-them-unsubscribe":{"vulnerabilities":[{"id":89206,"title":"Let Them Unsubscribe 1.0 - let-them-unsubscribe.php Multiple Unspecified Issues","osvdb":"102500","secunia":"56659","created_at":"2014-07-15T17:17:45.490Z","updated_at":"2014-07-15T17:17:45.490Z","fixed_in":"1.1"}]}},{"seo-image":{"vulnerabilities":[{"id":89207,"title":"SEO Friendly Images 2.7.4 - seo-friendly-images.php Add Page CSRF","osvdb":"101789","created_at":"2014-07-15T17:17:45.541Z","updated_at":"2014-07-15T17:17:45.541Z","fixed_in":"2.7.5"},{"id":89208,"title":"SEO Friendly Images 2.7.4 - seo-friendly-images.php Multiple Parameters XSS","osvdb":"101790","created_at":"2014-07-15T17:17:45.591Z","updated_at":"2014-07-15T17:17:45.591Z","fixed_in":"2.7.5"}]}},{"wordpress-social-ring":{"vulnerabilities":[{"id":89209,"title":"Social Ring 1.0 - share.php url Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124851/","osvdb":"102424","created_at":"2014-07-15T17:17:45.637Z","updated_at":"2014-07-15T17:17:45.637Z","fixed_in":"1.1.9"}]}},{"flagallery-skins":{"vulnerabilities":[{"id":89210,"title":"GRAND FlAGallery Skins - compact_music_player/gallery.php playlist Parameter SQL Injection","url":"http://packetstormsecurity.com/files/121699/","osvdb":"93581","created_at":"2014-07-15T17:17:45.687Z","updated_at":"2014-07-15T17:17:45.687Z"}]}},{"contus-video-gallery":{"vulnerabilities":[{"id":89211,"title":"Contus Video Gallery - index.php playid Parameter SQL Injection","url":"http://www.securityfocus.com/bid/59845,http://xforce.iss.net/xforce/xfdb/84239","osvdb":"93369","cve":"2013-3478","secunia":"51344","created_at":"2014-07-15T17:17:45.733Z","updated_at":"2014-07-15T17:17:45.733Z"}]}},{"webengage":{"vulnerabilities":[{"id":89212,"title":"WebEngage 2.0.0 - callback.php Multiple Parameter Reflected XSS","osvdb":"102560","secunia":"56700","created_at":"2014-07-15T17:17:45.785Z","updated_at":"2014-07-15T17:17:45.785Z","fixed_in":"2.0.1"},{"id":89213,"title":"WebEngage 2.0.0 - renderer.php Multiple Parameter Reflected XSS","osvdb":"102561","secunia":"56700","created_at":"2014-07-15T17:17:45.835Z","updated_at":"2014-07-15T17:17:45.835Z","fixed_in":"2.0.1"},{"id":89214,"title":"WebEngage 2.0.0 - resize.php height Parameter XSS","osvdb":"102562","secunia":"56700","created_at":"2014-07-15T17:17:45.883Z","updated_at":"2014-07-15T17:17:45.883Z","fixed_in":"2.0.1"}]}},{"fetch-tweets":{"vulnerabilities":[{"id":89215,"title":"Fetch Tweets 1.3.3.6 - class/FetchTweets_Event_.php Missing Permission Check Unspecified Issue","osvdb":"102578","created_at":"2014-07-15T17:17:45.932Z","updated_at":"2014-07-15T17:17:45.932Z"}]}},{"seolinkrotator":{"vulnerabilities":[{"id":89216,"title":"Seo Link Rotator - pusher.php title Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124959/","osvdb":"102594","secunia":"56710","created_at":"2014-07-15T17:17:45.986Z","updated_at":"2014-07-15T17:17:45.986Z"}]}},{"nokia-mapsplaces":{"vulnerabilities":[{"id":89217,"title":"Nokia Maps and Places 1.6.6 - place.html href Parameter Reflected XSS","osvdb":"102669","cve":"2014-1750","secunia":"56604","created_at":"2014-07-15T17:17:46.033Z","updated_at":"2014-07-15T17:17:46.033Z","fixed_in":"1.6.7"}]}},{"webinar_plugin":{"vulnerabilities":[{"id":89218,"title":"Easy Webinar - get_widget.php wid Parameter SQL Injection","osvdb":"86754","exploitdb":"22300","created_at":"2014-07-15T17:17:46.083Z","updated_at":"2014-07-15T17:17:46.083Z","fixed_in":"1.6.7"}]}},{"wp-social-invitations":{"vulnerabilities":[{"id":89219,"title":"WP Social Invitations \u003c=1.4.4.2 - test.php Multiple Parameter Reflected XSS","osvdb":"102741","secunia":"56711","created_at":"2014-07-15T17:17:46.132Z","updated_at":"2014-07-15T17:17:46.132Z","fixed_in":"1.4.4.3"}]}},{"infusionsoft":{"vulnerabilities":[{"id":89220,"title":"Infusionsoft Gravity Forms Add-on 1.5.6 - Unspecified XSS","osvdb":"102742","created_at":"2014-07-15T17:17:46.178Z","updated_at":"2014-07-15T17:17:46.178Z","fixed_in":"1.5.7"}]}},{"comment-control":{"vulnerabilities":[{"id":89221,"title":"Comment Control 0.3.0 - comment-control.php type Parameter SQL Injection","osvdb":"102581","created_at":"2014-07-15T17:17:46.230Z","updated_at":"2014-07-15T17:17:46.230Z","fixed_in":"0.3.1"}]}},{"wptouch":{"vulnerabilities":[{"id":89222,"title":"WPtouch 3.x - Insecure Nonce Generation","url":"http://blog.sucuri.net/2014/07/disclosure-insecure-nonce-generation-in-wptouch.html","created_at":"2014-07-15T17:17:46.281Z","updated_at":"2014-07-15T17:17:46.281Z","fixed_in":"3.4.3"},{"id":89223,"title":"WPtouch 1.9.8 - ajax/file_upload.php Crafted Content-Type File Upload Remote Code Execution","osvdb":"102582","created_at":"2014-07-15T17:17:46.332Z","updated_at":"2014-07-15T17:17:46.332Z","fixed_in":"1.9.8.1"},{"id":89224,"title":"WPtouch 1.9.8 - include/submit.php Multiple Parameter SQL Injection","osvdb":"102583","created_at":"2014-07-15T17:17:46.382Z","updated_at":"2014-07-15T17:17:46.382Z","fixed_in":"1.9.8.1"}]}},{"better-search":{"vulnerabilities":[{"id":89225,"title":"Better Search 1.2.1 - admin.inc.php Setting Manipulation CSRF","osvdb":"102584","created_at":"2014-07-15T17:17:46.433Z","updated_at":"2014-07-15T17:17:46.433Z","fixed_in":"1.3"}]}},{"very-simple-contact-form":{"vulnerabilities":[{"id":89226,"title":"Very Simple Contact Form 1.1 - Unspecified Issue","osvdb":"102798","created_at":"2014-07-15T17:17:46.478Z","updated_at":"2014-07-15T17:17:46.478Z","fixed_in":"1.2"}]}},{"stop-user-enumeration":{"vulnerabilities":[{"id":89227,"title":"Stop User Enumeration 1.2.4 - POST Request Protection Bypass","url":"http://packetstormsecurity.com/files/125035/,http://seclists.org/fulldisclosure/2014/Feb/3","osvdb":"102799","secunia":"56643","created_at":"2014-07-15T17:17:46.528Z","updated_at":"2014-07-15T17:17:46.528Z"}]}},{"delightful-downloads":{"vulnerabilities":[{"id":89228,"title":"Delightful Downloads 1.3.1.1 - meta-boxes.php dedo_meta_boxes_save Function Multiple Action Authorization Bypass","osvdb":"102932","created_at":"2014-07-15T17:17:46.576Z","updated_at":"2014-07-15T17:17:46.576Z","fixed_in":"1.3.2"},{"id":89229,"title":"Delightful Downloads 1.3.1.1 - includes/functions.php User-Agent HTTP Header Stored XSS","osvdb":"102928","created_at":"2014-07-15T17:17:46.625Z","updated_at":"2014-07-15T17:17:46.625Z","fixed_in":"1.3.2"}]}},{"mobiloud-mobile-app-plugin":{"vulnerabilities":[{"id":89230,"title":"Mobiloud 1.9.0 - comments/disqus_count.php shortname Parameter Reflected XSS","osvdb":"102898","created_at":"2014-07-15T17:17:46.671Z","updated_at":"2014-07-15T17:17:46.671Z","fixed_in":"1.9.1"},{"id":89231,"title":"Mobiloud 1.9.0 - comments/disqus.php shortname Parameter Reflected XSS","osvdb":"102899","created_at":"2014-07-15T17:17:46.719Z","updated_at":"2014-07-15T17:17:46.719Z","fixed_in":"1.9.1"}]}},{"all_in_one_carousel":{"vulnerabilities":[{"id":89232,"title":"all_in_one_carousel 1.2.20 - /tpl/add_carousel.php id Parameter Reflected XSS","url":"http://seclists.org/bugtraq/2014/Feb/38","osvdb":"103351","secunia":"56962","created_at":"2014-07-15T17:17:46.765Z","updated_at":"2014-07-15T17:17:46.765Z"}]}},{"frontend-uploader":{"vulnerabilities":[{"id":89233,"title":"Frontend Uploader - Unspecified File Upload Remote Code Execution","osvdb":"103454","exploitdb":"31570","created_at":"2014-07-15T17:17:46.816Z","updated_at":"2014-07-15T17:17:46.816Z"}]}},{"wp-security-scan":{"vulnerabilities":[{"id":89234,"title":"Acunetix WP Security 4.0.3 - /wp-admin/admin.php wps-database Page Backup Generation CSRF Weakness","url":"http://packetstormsecurity.com/files/125218/","osvdb":"103467","created_at":"2014-07-15T17:17:46.873Z","updated_at":"2014-07-15T17:17:46.873Z"}]}},{"aryo-activity-log":{"vulnerabilities":[{"id":89235,"title":"Aryo Activity Log - Full Path Disclosure","url":"https://github.com/KingYes/wordpress-aryo-activity-log/pull/27","created_at":"2014-07-15T17:17:46.926Z","updated_at":"2014-07-15T17:17:46.926Z","fixed_in":"2.0.4"}]}},{"wp-jquery-spam":{"vulnerabilities":[{"id":89236,"title":"WP jQuery Spam 1.1 - dynamic.php id Parameter Reflected XSS","osvdb":"103579","created_at":"2014-07-15T17:17:46.973Z","updated_at":"2014-07-15T17:17:46.973Z","fixed_in":"1.2"}]}},{"media-file-renamer":{"vulnerabilities":[{"id":89237,"title":"Media File Renamer v1.7.0 - Persistent XSS","url":"http://packetstormsecurity.com/files/125378/,http://www.vapid.dhs.org/advisories/wordpress/plugins/MediaFileRenamer-1.7.0/","cve":"2014-2040","created_at":"2014-07-15T17:17:47.020Z","updated_at":"2014-07-15T17:17:47.020Z"}]}},{"flash-player-widget":{"vulnerabilities":[{"id":89238,"title":"Flash Player Widget - dewplayer.swf Content Spoofing","url":"http://www.openwall.com/lists/oss-security/2013/12/30/5","created_at":"2014-07-15T17:17:47.066Z","updated_at":"2014-07-15T17:17:47.066Z"}]}},{"alpine-photo-tile-for-instagram":{"vulnerabilities":[{"id":89239,"title":"Alpine PhotoTile For Instagram 1.2.6.5 - wp-admin/options-general.php general_lightbox_params Parameter XSS Weakness","url":"http://packetstormsecurity.com/files/125418/","osvdb":"103822","secunia":"57198","created_at":"2014-07-15T17:17:47.118Z","updated_at":"2014-07-15T17:17:47.118Z"}]}},{"widget-control-powered-by-everyblock":{"vulnerabilities":[{"id":89240,"title":"Widget Control Powered By Everyblock 1.0.1 - wp-admin/admin.php idDropdown Parameter XSS Weakness","url":"http://packetstormsecurity.com/files/125421/","osvdb":"103831","secunia":"57203","created_at":"2014-07-15T17:17:47.164Z","updated_at":"2014-07-15T17:17:47.164Z"}]}},{"search-everything":{"vulnerabilities":[{"id":89241,"title":"Search Everything 8.1.0 - options.php Unspecified CSRF","osvdb":"106733","created_at":"2014-07-15T17:17:47.214Z","updated_at":"2014-07-15T17:17:47.214Z","fixed_in":"8.1.1"},{"id":89242,"title":"Search Everything 7.0.4 - Unspecified Issue","osvdb":"104058","created_at":"2014-07-15T17:17:47.260Z","updated_at":"2014-07-15T17:17:47.260Z","fixed_in":"8.0"},{"id":89243,"title":"Search Everything 7.0.2 - search-everything.php s Parameter SQL Injection","url":"http://www.securityfocus.com/bid/65765","osvdb":"103718","cve":"2014-2316","secunia":"56802","created_at":"2014-07-15T17:17:47.307Z","updated_at":"2014-07-15T17:17:47.307Z","fixed_in":"7.0.3"}]}},{"zedity":{"vulnerabilities":[{"id":89244,"title":"Zedity 2.5 - wp-admin/admin-ajax.php zedity_ajax Action zaction Parameter XSS","url":"http://www.securityfocus.com/bid/65799","osvdb":"103789","secunia":"57026","created_at":"2014-07-15T17:17:47.354Z","updated_at":"2014-07-15T17:17:47.354Z"},{"id":89245,"title":"Zedity 2.4 - Cross Site Scripting","url":"http://packetstormsecurity.com/files/125402/","created_at":"2014-07-15T17:17:47.405Z","updated_at":"2014-07-15T17:17:47.405Z"}]}},{"wp-post-to-pdf":{"vulnerabilities":[{"id":89246,"title":"WP Post to PDF 2.3.1 - wp-admin/options.php wpptopdf headerFontSize Parameter XSS","url":"http://packetstormsecurity.com/files/125432/","osvdb":"103872","created_at":"2014-07-15T17:17:47.455Z","updated_at":"2014-07-15T17:17:47.455Z"}]}},{"bsk-pdf-manager":{"vulnerabilities":[{"id":89247,"title":"BSK PDF Manager 1.3 - wp-admin/admin.php Multiple Parameter XSS","url":"http://packetstormsecurity.com/files/125422/","osvdb":"103873","created_at":"2014-07-15T17:17:47.503Z","updated_at":"2014-07-15T17:17:47.503Z"}]}},{"mp3-jplayer":{"vulnerabilities":[{"id":89248,"title":"MP3-jPlayer 1.8.7 - wp-admin/options-general.php Multiple Parameter XSS","url":"http://packetstormsecurity.com/files/125417/","osvdb":"103875","created_at":"2014-07-15T17:17:47.556Z","updated_at":"2014-07-15T17:17:47.556Z"}]}},{"google-analytics-mu":{"vulnerabilities":[{"id":89249,"title":"Google Analytics MU 2.3 - google-analytics-mu-network.php Analytics Code Manipulation CSRF","url":"http://packetstormsecurity.com/files/125514/,http://seclists.org/fulldisclosure/2014/Mar/20,http://www.securityfocus.com/bid/65926","osvdb":"103937","secunia":"56157","created_at":"2014-07-15T17:17:47.605Z","updated_at":"2014-07-15T17:17:47.605Z","fixed_in":"2.4"}]}},{"repagent":{"vulnerabilities":[{"id":89250,"title":"Repagent - dewplayer-vinyl.swf xml Parameter XML File Handling XSS","url":"http://packetstormsecurity.com/files/124582/,http://www.securityfocus.com/bid/64506,http://seclists.org/fulldisclosure/2013/Dec/192","osvdb":"101353","created_at":"2014-07-15T17:17:47.652Z","updated_at":"2014-07-15T17:17:47.652Z"},{"id":89251,"title":"Repagent - dewplayer-vinyl-en.swf xml Parameter XML File Handling XSS","url":"http://packetstormsecurity.com/files/124582/,http://www.securityfocus.com/bid/64506,http://seclists.org/fulldisclosure/2013/Dec/192","osvdb":"101352","created_at":"2014-07-15T17:17:47.698Z","updated_at":"2014-07-15T17:17:47.698Z"}]}},{"LayerSlider":{"vulnerabilities":[{"id":89252,"title":"LayerSlider 4.6.1 - wp-admin/admin.php Style Editing CSRF","url":"http://packetstormsecurity.com/files/125637/","osvdb":"104393","secunia":"57930","created_at":"2014-07-15T17:17:47.746Z","updated_at":"2014-07-15T17:17:47.746Z"},{"id":89253,"title":"LayerSlider 4.6.1 - LayerSlider/editor.php skin Parameter Remote Path Traversal File Access","url":"http://packetstormsecurity.com/files/125637/","osvdb":"104394","secunia":"57309","created_at":"2014-07-15T17:17:47.791Z","updated_at":"2014-07-15T17:17:47.791Z"}]}},{"xcloner-backup-and-restore":{"vulnerabilities":[{"id":89254,"title":"XCloner 3.1.0 - Multiple Actions CSRF","url":"http://packetstormsecurity.com/files/125991/,https://www.htbridge.com/advisory/HTB23206","osvdb":"104402","cve":"2014-2340","secunia":"57362","exploitdb":"32701","created_at":"2014-07-15T17:17:47.841Z","updated_at":"2014-07-15T17:17:47.841Z","fixed_in":"3.1.1"}]}},{"guiform":{"vulnerabilities":[{"id":89255,"title":"GuiForm 1.4.10 - class/class-ajax.php Entry Saving CSRF","osvdb":"104399","created_at":"2014-07-15T17:17:47.891Z","updated_at":"2014-07-15T17:17:47.891Z","fixed_in":"1.5.0"}]}},{"clickdesk-live-support-chat-plugin":{"vulnerabilities":[{"id":89256,"title":"ClickDesk - Live Chat Widget Multiple Field XSS","url":"http://packetstormsecurity.com/files/125528/,http://www.securityfocus.com/bid/65971","osvdb":"104037","created_at":"2014-07-15T17:17:47.940Z","updated_at":"2014-07-15T17:17:47.940Z"}]}},{"duplicate-post":{"vulnerabilities":[{"id":89257,"title":"Duplicate Post 2.5 - duplicate-post-admin.php User Login Cookie Value SQL Injection","osvdb":"104669","created_at":"2014-07-15T17:17:47.990Z","updated_at":"2014-07-15T17:17:47.990Z","fixed_in":"2.6"},{"id":89258,"title":"Duplicate Post 2.5 - options-general.php post Parameter Reflected XSS","osvdb":"104670","created_at":"2014-07-15T17:17:48.036Z","updated_at":"2014-07-15T17:17:48.036Z","fixed_in":"2.6"}]}},{"mtouch-quiz":{"vulnerabilities":[{"id":89259,"title":"mTouch Quiz 3.0.6 - question.php quiz Parameter Reflected XSS","url":"http://www.securityfocus.com/bid/66306","osvdb":"104667","created_at":"2014-07-15T17:17:48.086Z","updated_at":"2014-07-15T17:17:48.086Z","fixed_in":"3.0.7"},{"id":89260,"title":"mTouch Quiz 3.0.6 - question.php quiz Parameter SQL Injection","url":"http://www.securityfocus.com/bid/66306","osvdb":"104668","created_at":"2014-07-15T17:17:48.137Z","updated_at":"2014-07-15T17:17:48.137Z","fixed_in":"3.0.7"}]}},{"simple-retail-menus":{"vulnerabilities":[{"id":89261,"title":"Simple Retail Menus 4.0.1 - includes/actions.php targetmenu Parameter SQL Injection","osvdb":"104680","created_at":"2014-07-15T17:17:48.185Z","updated_at":"2014-07-15T17:17:48.185Z","fixed_in":"4.1"},{"id":89262,"title":"Simple Retail Menus 4.0.1 - includes/mode-edit.php targetmenu Parameter SQL Injection","osvdb":"104682","created_at":"2014-07-15T17:17:48.237Z","updated_at":"2014-07-15T17:17:48.237Z","fixed_in":"4.1"}]}},{"user-domain-whitelist":{"vulnerabilities":[{"id":89263,"title":"User Domain Whitelist 1.4 - user-domain-whitelist.php domain_whitelist Parameter Stored XSS","osvdb":"104681","secunia":"57490","created_at":"2014-07-15T17:17:48.286Z","updated_at":"2014-07-15T17:17:48.286Z"},{"id":89264,"title":"User Domain Whitelist 1.4 - user-domain-whitelist.php Domain Whitelisting Manipulation CSRF","osvdb":"104683","secunia":"57490","created_at":"2014-07-15T17:17:48.331Z","updated_at":"2014-07-15T17:17:48.331Z","fixed_in":"1.5"}]}},{"subscribe-to-comments-reloaded":{"vulnerabilities":[{"id":89265,"title":"Subscribe To Comments Reloaded 140204 - options/index.php manager_page Parameter Stored XSS Weakness","url":"http://www.securityfocus.com/bid/66288","osvdb":"104698","secunia":"57015","created_at":"2014-07-15T17:17:48.381Z","updated_at":"2014-07-15T17:17:48.381Z","fixed_in":"140219"},{"id":89266,"title":"Subscribe To Comments Reloaded 140204 - options/index.php Admin Settings Manipulation CSRF","url":"http://www.securityfocus.com/bid/66288","osvdb":"104699","secunia":"57015","created_at":"2014-07-15T17:17:48.428Z","updated_at":"2014-07-15T17:17:48.428Z","fixed_in":"140219"}]}},{"analytics360":{"vulnerabilities":[{"id":89267,"title":"Analytics360 1.2.1 - analytics360.php Multiple Action CSRF","osvdb":"104743","created_at":"2014-07-15T17:17:48.482Z","updated_at":"2014-07-15T17:17:48.482Z","fixed_in":"1.2.2"},{"id":89268,"title":"Analytics360 1.2 - analytics360.php a360_error Parameter Reflected XSS","osvdb":"104744","created_at":"2014-07-15T17:17:48.529Z","updated_at":"2014-07-15T17:17:48.529Z","fixed_in":"1.2.1"}]}},{"the-events-calendar":{"vulnerabilities":[{"id":89269,"title":"The Events Calendar 3.0 - lib/template-classes/month.php tribe-bar-search Parameter Reflected XSS","osvdb":"104785","created_at":"2014-07-15T17:17:48.580Z","updated_at":"2014-07-15T17:17:48.580Z","fixed_in":"3.0.1"}]}},{"form-maker":{"vulnerabilities":[{"id":89270,"title":"Form Maker 1.6.4 - front_end_form_maker.php Unspecified XSS","osvdb":"104870","created_at":"2014-07-15T17:17:48.628Z","updated_at":"2014-07-15T17:17:48.628Z","fixed_in":"1.6.6"}]}},{"1-jquery-photo-gallery-slideshow-flash":{"vulnerabilities":[{"id":89271,"title":"ZooEffect 1.08 - wp-1pluginjquery.php HTTP Referer Header Reflected XSS","osvdb":"104876","created_at":"2014-07-15T17:17:48.675Z","updated_at":"2014-07-15T17:17:48.675Z","fixed_in":"1.09"}]}},{"google-analytics-dashboard":{"vulnerabilities":[{"id":89272,"title":"Google Analytics Dashboard 2.0.4 - gad-admin-pages-posts.php pid Parameter SQL Injection","osvdb":"104877","created_at":"2014-07-15T17:17:48.722Z","updated_at":"2014-07-15T17:17:48.722Z","fixed_in":"2.0.5"}]}},{"blogvault-real-time-backup":{"vulnerabilities":[{"id":89273,"title":"blogVault 1.08 - Missing Account Empty Secret Key Generation","osvdb":"107570","created_at":"2014-07-15T17:17:48.780Z","updated_at":"2014-07-15T17:17:48.780Z","fixed_in":"1.09"},{"id":89274,"title":"blogVault 1.05 - admin.php blogVault Key Setting CSRF","osvdb":"104906","created_at":"2014-07-15T17:17:48.826Z","updated_at":"2014-07-15T17:17:48.826Z","fixed_in":"1.06"}]}},{"captcha":{"vulnerabilities":[{"id":89275,"title":"Captcha 2.12-3.8.1 - captcha bypass","url":"http://www.antoine-cervoise.fr/2014/03/27/contournement-du-plugin-captcha-pour-wordpress-v-3-8-1-et-anterieures/,https://github.com/cervoise/pentest-scripts/blob/master/web/cms/captcha-bypass/wordpress-plugins/captcha/bypass-3.8.1-and-previous.php","created_at":"2014-07-15T17:17:48.878Z","updated_at":"2014-07-15T17:17:48.878Z","fixed_in":"3.8.2"}]}},{"wp-html-sitemap":{"vulnerabilities":[{"id":89276,"title":"WP HTML Sitemap 1.2 - wp-html-sitemap.html Sitemap Deletion CSRF","url":"http://packetstormsecurity.com/files/125933/,http://seclists.org/fulldisclosure/2014/Mar/400,https://security.dxw.com/advisories/csrf-vulnerability-in-wp-html-sitemap-1-2/","osvdb":"105084","created_at":"2014-07-15T17:17:48.926Z","updated_at":"2014-07-15T17:17:48.926Z"}]}},{"groups":{"vulnerabilities":[{"id":89277,"title":"Groups 1.4.5 - Negated Role Capability Handling Elevated Privilege Issue","osvdb":"104940","created_at":"2014-07-15T17:17:48.973Z","updated_at":"2014-07-15T17:17:48.973Z","fixed_in":"1.4.6"}]}},{"html5-jquery-audio-player":{"vulnerabilities":[{"id":89278,"title":"HTML5 jQuery Audio Player 2.3 - playlist/add_playlist.php Multiple Parameter Stored XSS Weakness","osvdb":"104951","created_at":"2014-07-15T17:17:49.022Z","updated_at":"2014-07-15T17:17:49.022Z","fixed_in":"2.4"},{"id":89279,"title":"HTML5 jQuery Audio Player 2.3 - playlist/add_playlist.php id Parameter SQL Injection","osvdb":"104952","created_at":"2014-07-15T17:17:49.072Z","updated_at":"2014-07-15T17:17:49.072Z","fixed_in":"2.4"}]}},{"shrimptest":{"vulnerabilities":[{"id":89280,"title":"ShrimpTest 1.0b2 - plugins/metric-conversion.php Multiple Unspecified XSS","osvdb":"104956","created_at":"2014-07-15T17:17:49.119Z","updated_at":"2014-07-15T17:17:49.119Z","fixed_in":"1.0b3"},{"id":89281,"title":"ShrimpTest 1.0b2 - plugins/plugin-notification.php Unspecified XSS","osvdb":"104957","created_at":"2014-07-15T17:17:49.168Z","updated_at":"2014-07-15T17:17:49.168Z","fixed_in":"1.0b3"},{"id":89282,"title":"ShrimpTest 1.0b2 - plugins/variant-shortcode.php Unspecified XSS","osvdb":"104958","created_at":"2014-07-15T17:17:49.219Z","updated_at":"2014-07-15T17:17:49.219Z","fixed_in":"1.0b3"},{"id":89283,"title":"ShrimpTest 1.0b2 - admin/experiments.php Multiple Unspecified XSS","osvdb":"104959","created_at":"2014-07-15T17:17:49.273Z","updated_at":"2014-07-15T17:17:49.273Z","fixed_in":"1.0b3"},{"id":89284,"title":"ShrimpTest 1.0b2 - admin/experiment-new.php Multiple Unspecified XSS","osvdb":"104960","created_at":"2014-07-15T17:17:49.320Z","updated_at":"2014-07-15T17:17:49.320Z","fixed_in":"1.0b3"}]}},{"activehelper-livehelp":{"vulnerabilities":[{"id":89285,"title":"ActiveHelper LiveHelp Server 3.2.2 - server/import/status.php Multiple Parameter SQL Injection","osvdb":"104990","created_at":"2014-07-15T17:17:49.366Z","updated_at":"2014-07-15T17:17:49.366Z","fixed_in":"3.4.0"},{"id":89286,"title":"ActiveHelper LiveHelp Server 3.2.2 - server/import/tracker.php Multiple Parameter SQL Injection","osvdb":"104991","created_at":"2014-07-15T17:17:49.416Z","updated_at":"2014-07-15T17:17:49.416Z","fixed_in":"3.4.0"},{"id":89287,"title":"ActiveHelper LiveHelp Server 3.2.2 - server/import/javascript.php Multiple Vector SQL Injection","osvdb":"104992","created_at":"2014-07-15T17:17:49.464Z","updated_at":"2014-07-15T17:17:49.464Z","fixed_in":"3.4.0"},{"id":89288,"title":"ActiveHelper LiveHelp Server 3.2.2 - server/frames.php DEPARTMENT Parameter SQL Injection","osvdb":"104993","created_at":"2014-07-15T17:17:49.519Z","updated_at":"2014-07-15T17:17:49.519Z","fixed_in":"3.4.0"}]}},{"springboard-video-quick-publish":{"vulnerabilities":[{"id":89289,"title":"Springboard Video Quick Publish 0.2.6 - videolist.php paged Parameter Reflected XSS","osvdb":"105992","created_at":"2014-07-15T17:17:49.565Z","updated_at":"2014-07-15T17:17:49.565Z","fixed_in":"0.2.7"},{"id":89290,"title":"Springboard Video Quick Publish 0.2.6 - springboardvideo.php video_id Parameter XSS","osvdb":"105993","created_at":"2014-07-15T17:17:49.614Z","updated_at":"2014-07-15T17:17:49.614Z","fixed_in":"0.2.7"},{"id":89291,"title":"Springboard Video Quick Publish 0.2.6 - sb_search.php paged Parameter Reflected XSS","osvdb":"105994","created_at":"2014-07-15T17:17:49.661Z","updated_at":"2014-07-15T17:17:49.661Z","fixed_in":"0.2.7"},{"id":89292,"title":"Springboard Video Quick Publish 0.2.4 - Unspecified Issue","osvdb":"105007","created_at":"2014-07-15T17:17:49.708Z","updated_at":"2014-07-15T17:17:49.708Z","fixed_in":"0.2.5"}]}},{"ignitiondeck":{"vulnerabilities":[{"id":89293,"title":"IgnitionDeck 1.1 - Purchase Form Unspecified XSS","osvdb":"105008","created_at":"2014-07-15T17:17:49.756Z","updated_at":"2014-07-15T17:17:49.756Z","fixed_in":"1.2"}]}},{"ajax-pagination":{"vulnerabilities":[{"id":89294,"title":"Ajax Pagination 1.1 - wp-admin/admin-ajax.php loop Parameter Local File Inclusion","url":"http://packetstormsecurity.com/files/125929/,http://seclists.org/fulldisclosure/2014/Mar/398","osvdb":"105087","exploitdb":"32622","created_at":"2014-07-15T17:17:49.803Z","updated_at":"2014-07-15T17:17:49.803Z"}]}},{"tt-guest-post-submit":{"vulnerabilities":[{"id":89295,"title":"TT Guest Post Submit 1.0.0 - tt-guest-post-submit-submit.php rootpath Parameter Remote File Inclusion","osvdb":"105120","created_at":"2014-07-15T17:17:49.852Z","updated_at":"2014-07-15T17:17:49.852Z","fixed_in":"1.0.1"}]}},{"salesforce-wordpress-to-lead":{"vulnerabilities":[{"id":89296,"title":"WordPress-to-Lead for Salesforce CRM 1.0.4 - ov_plugin_tools.php textinput Function XSS","osvdb":"105146","created_at":"2014-07-15T17:17:49.901Z","updated_at":"2014-07-15T17:17:49.901Z","fixed_in":"1.0.5"},{"id":89297,"title":"WordPress-to-Lead for Salesforce CRM 1.0.1 - salesforce.php salesforce_form_shortcode Function Error Message Handling XSS","osvdb":"105148","created_at":"2014-07-15T17:17:49.953Z","updated_at":"2014-07-15T17:17:49.953Z","fixed_in":"1.0.2"},{"id":89298,"title":"WordPress-to-Lead for Salesforce CRM 1.0 - salesforce.php Multiple Parameter XSS","osvdb":"105147","created_at":"2014-07-15T17:17:49.999Z","updated_at":"2014-07-15T17:17:49.999Z","fixed_in":"1.0.1"}]}},{"disable-comments":{"vulnerabilities":[{"id":89299,"title":"Disable Comments 1.0.3 - disable_comments_settings.php Comment Status Manipulation CSRF","url":"http://www.securityfocus.com/bid/66564","osvdb":"105245","cve":"2014-2550","secunia":"57613","created_at":"2014-07-15T17:17:50.053Z","updated_at":"2014-07-15T17:17:50.053Z","fixed_in":"1.0.4"}]}},{"wp-business-intelligence-lite":{"vulnerabilities":[{"id":89300,"title":"WP Business intelligence lite \u003c= 1.0.6 - Remote Code Execution Exploit","url":"http://packetstormsecurity.com/files/125927/,http://cxsecurity.com/issue/WLB-2014030243","secunia":"57590","created_at":"2014-07-15T17:17:50.100Z","updated_at":"2014-07-15T17:17:50.100Z","fixed_in":"1.1"}]}},{"barclaycart":{"vulnerabilities":[{"id":89301,"title":"Barclaycart - Shell Upload","url":"http://packetstormsecurity.com/files/125552/","created_at":"2014-07-15T17:17:50.152Z","updated_at":"2014-07-15T17:17:50.152Z"}]}},{"Premium_Gallery_Manager":{"vulnerabilities":[{"id":89302,"title":"Premium Gallery Manager - Shell Upload","url":"http://packetstormsecurity.com/files/125586/","created_at":"2014-07-15T17:17:50.201Z","updated_at":"2014-07-15T17:17:50.201Z"}]}},{"jetpack":{"vulnerabilities":[{"id":89303,"title":"Jetpack \u003c= 2.9.2 - class.jetpack.php XML-RPC Access Control Bypass","url":"http://jetpack.me/2014/04/10/jetpack-security-update/","osvdb":"105714","cve":"2014-0173","secunia":"57729","created_at":"2014-07-15T17:17:50.255Z","updated_at":"2014-07-15T17:17:50.255Z","fixed_in":"2.9.3"}]}},{"lazyest-gallery":{"vulnerabilities":[{"id":89304,"title":"Lazyest Gallery \u003c= 1.1.20 - EXIF Script Insertion Vulnerability","secunia":"57746","created_at":"2014-07-15T17:17:50.305Z","updated_at":"2014-07-15T17:17:50.305Z","fixed_in":"1.1.21"},{"id":89305,"title":"Lazyest Gallery 1.1.7 - Crafted Folder Name Unspecified Issue","osvdb":"105728","created_at":"2014-07-15T17:17:50.351Z","updated_at":"2014-07-15T17:17:50.351Z","fixed_in":"1.1.8"},{"id":89306,"title":"Lazyest Gallery 0.10.4.3 - Multiple File/Directory Insecure Permissions Local Content Manipulation","osvdb":"105818","created_at":"2014-07-15T17:17:50.397Z","updated_at":"2014-07-15T17:17:50.397Z","fixed_in":"0.10.4.4"},{"id":89307,"title":"Lazyest Gallery 0.4.2 - Multiple Unspecified Issues","osvdb":"107400","created_at":"2014-07-15T17:17:50.446Z","updated_at":"2014-07-15T17:17:50.446Z"}]}},{"post-expirator":{"vulnerabilities":[{"id":89308,"title":"Post Expirator \u003c= 2.1.1 - Cross-Site Request Forgery Vulnerability","secunia":"57503","created_at":"2014-07-15T17:17:50.493Z","updated_at":"2014-07-15T17:17:50.493Z","fixed_in":"2.1.2"}]}},{"quick-pagepost-redirect-plugin":{"vulnerabilities":[{"id":89309,"title":"Quick Page Post Redirect 5.0.4 - redirect-updates.php quickppr_redirects Parameter Stored XSS","url":"http://www.securityfocus.com/bid/66790,https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/","osvdb":"105707","cve":"2014-2598","secunia":"57883","exploitdb":"32867","created_at":"2014-07-15T17:17:50.544Z","updated_at":"2014-07-15T17:17:50.544Z","fixed_in":"5.0.5"},{"id":89310,"title":"Quick Page Post Redirect 5.0.4 - redirect-updates.php Multiple Admin Function CSRF","url":"http://www.securityfocus.com/bid/66790,https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/","osvdb":"105708","cve":"2014-2598","secunia":"57883","exploitdb":"32867","created_at":"2014-07-15T17:17:50.591Z","updated_at":"2014-07-15T17:17:50.591Z","fixed_in":"5.0.5"}]}},{"twitget":{"vulnerabilities":[{"id":89311,"title":"Twitget 3.3.1 - twitget.php Twitter Setting Manipulation CSRF","url":"https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1/","osvdb":"105705","cve":"2014-2559","exploitdb":"32868","created_at":"2014-07-15T17:17:50.641Z","updated_at":"2014-07-15T17:17:50.641Z","fixed_in":"3.3.3"},{"id":89312,"title":"Twitget 3.3.1 - twitget.php twitget_consumer_key Parameter Stored XSS","url":"https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1/","osvdb":"105704","cve":"2014-2559","exploitdb":"32868","created_at":"2014-07-15T17:17:50.690Z","updated_at":"2014-07-15T17:17:50.690Z","fixed_in":"3.3.3"}]}},{"hk-exif-tags":{"vulnerabilities":[{"id":89313,"title":"HK Exif Tags 1.11 - hk_exif_tags.php hk_exif_tags_images_process Function EXIF Tags Handling Stored XSS","osvdb":"105725","secunia":"57753","created_at":"2014-07-15T17:17:50.749Z","updated_at":"2014-07-15T17:17:50.749Z","fixed_in":"1.12"}]}},{"unconfirmed":{"vulnerabilities":[{"id":89314,"title":"Unconfirmed \u003c= 1.2.4 - unconfirmed.php s Parameter Reflected XSS","osvdb":"105722","secunia":"57838","created_at":"2014-07-15T17:17:50.796Z","updated_at":"2014-07-15T17:17:50.796Z","fixed_in":"1.2.5"}]}},{"liveoptim":{"vulnerabilities":[{"id":89315,"title":"LiveOptim 1.4.3 - Configuration Setting Manipulation CSRF","url":"http://www.securityfocus.com/bid/66939","osvdb":"105986","secunia":"57990","created_at":"2014-07-15T17:17:50.843Z","updated_at":"2014-07-15T17:17:50.843Z","fixed_in":"1.4.4"}]}},{"wp-conditional-captcha":{"vulnerabilities":[{"id":89316,"title":"Conditional CAPTCHA 3.6 - wp-conditional-captcha.php Settings Page CSRF","osvdb":"106014","created_at":"2014-07-15T17:17:50.890Z","updated_at":"2014-07-15T17:17:50.890Z","fixed_in":"3.6.1"}]}},{"wp-js-external-link-info":{"vulnerabilities":[{"id":89317,"title":"JS External Link Info 1.21 - redirect.php blog Parameter XSS","url":"http://packetstormsecurity.com/files/126238/,http://www.securityfocus.com/bid/66999","osvdb":"106125","created_at":"2014-07-15T17:17:50.939Z","updated_at":"2014-07-15T17:17:50.939Z"}]}},{"simple-fields":{"vulnerabilities":[{"id":89318,"title":"Simple Fields 1.1.6 - inc-admin-options.php Admin Functions CSRF","osvdb":"106316","created_at":"2014-07-15T17:17:50.988Z","updated_at":"2014-07-15T17:17:50.988Z","fixed_in":"1.2"},{"id":89319,"title":"Simple Fields 0.3.5 - simple_fields.php wp_abspath Parameter Remote File Inclusion","osvdb":"106622","created_at":"2014-07-15T17:17:51.035Z","updated_at":"2014-07-15T17:17:51.035Z","fixed_in":"0.3.6"}]}},{"work-the-flow-file-upload":{"vulnerabilities":[{"id":89320,"title":"Work The Flow File Upload 1.2.1 - wp-admin/admin-ajax.php accept_file_types Parameter Manipulation File Upload Restriction Bypass","url":"http://www.securityfocus.com/bid/67083,http://packetstormsecurity.com/files/126333/","osvdb":"106366","secunia":"58216","created_at":"2014-07-15T17:17:51.088Z","updated_at":"2014-07-15T17:17:51.088Z"}]}},{"file-gallery":{"vulnerabilities":[{"id":89321,"title":"File Gallery 1.7.9 - Settings Page create_function Function Remote Command Execution","url":"http://www.securityfocus.com/bid/67120","osvdb":"106417","cve":"2014-2558","secunia":"58216","created_at":"2014-07-15T17:17:51.135Z","updated_at":"2014-07-15T17:17:51.135Z","fixed_in":"1.7.9.2"}]}},{"nextcellent-gallery-nextgen-legacy":{"vulnerabilities":[{"id":89322,"title":"NextCellent Gallery 1.9.13 - admin/manage-images.php Multiple Field Stored XSS Weakness","url":"http://www.securityfocus.com/bid/67085","osvdb":"106474","created_at":"2014-07-15T17:17:51.185Z","updated_at":"2014-07-15T17:17:51.185Z","fixed_in":"1.9.18"}]}},{"wp-affiliate-platform":{"vulnerabilities":[{"id":89323,"title":"WP Affiliate Manager - login.php msg Parameter XSS","url":"http://packetstormsecurity.com/files/126424/","osvdb":"106533","created_at":"2014-07-15T17:17:51.236Z","updated_at":"2014-07-15T17:17:51.236Z"}]}},{"query-interface":{"vulnerabilities":[{"id":89324,"title":"Query Interface 1.1 - Multiple Unspecified Issues","osvdb":"106642","created_at":"2014-07-15T17:17:51.282Z","updated_at":"2014-07-15T17:17:51.282Z","fixed_in":"1.2"}]}},{"photo-gallery":{"vulnerabilities":[{"id":89325,"title":"Photo-Gallery - UploadHandler.php File Upload CSRF","url":"http://packetstormsecurity.com/files/126521/","osvdb":"106732","created_at":"2014-07-15T17:17:51.329Z","updated_at":"2014-07-15T17:17:51.329Z"}]}},{"infusion4wp":{"vulnerabilities":[{"id":89326,"title":"iMember360is 3.9.001 - XSS / Disclosure / Code Execution","url":"http://1337day.com/exploit/22184","created_at":"2014-07-15T17:17:51.374Z","updated_at":"2014-07-15T17:17:51.374Z","fixed_in":"3.9.002"}]}},{"acumbamail-signup-forms":{"vulnerabilities":[{"id":89327,"title":"Acumbamail 1.0.4 - acumbamail.class.php callAPI() Function MitM Information Disclosure","url":"http://www.securityfocus.com/bid/67220","osvdb":"106711","secunia":"67220","created_at":"2014-07-15T17:17:51.422Z","updated_at":"2014-07-15T17:17:51.422Z","fixed_in":"1.0.4.1"}]}},{"tinymce-colorpicker":{"vulnerabilities":[{"id":89328,"title":"TinyMCE Color Picker 1.1 - tinymce-colorpicker.php Color Saving CSRF","url":"http://www.securityfocus.com/bid/67333","osvdb":"106854","secunia":"58095","created_at":"2014-07-15T17:17:51.469Z","updated_at":"2014-07-15T17:17:51.469Z","fixed_in":"1.2"},{"id":89329,"title":"TinyMCE Color Picker 1.1 - tinymce-colorpicker.php Missing edit_others_posts Capability Check","url":"http://www.securityfocus.com/bid/67333","osvdb":"106854","secunia":"58095","created_at":"2014-07-15T17:17:51.524Z","updated_at":"2014-07-15T17:17:51.524Z","fixed_in":"1.2"}]}},{"contact-bank":{"vulnerabilities":[{"id":89330,"title":"Contact Bank 2.0.19 - Multiple Unspecified Issues","osvdb":"106868","secunia":"67334","created_at":"2014-07-15T17:17:51.576Z","updated_at":"2014-07-15T17:17:51.576Z","fixed_in":"2.0.20"}]}},{"bonuspressx":{"vulnerabilities":[{"id":89331,"title":"Bonuspressx - ar_submit.php n Parameter XSS","url":"http://packetstormsecurity.com/files/126595/","osvdb":"106931","created_at":"2014-07-15T17:17:51.625Z","updated_at":"2014-07-15T17:17:51.625Z"}]}},{"profile-builder":{"vulnerabilities":[{"id":89332,"title":"Profile Builder 1.1.59 - front-end/wppb.recover.password.php Password Recovery Bypass","url":"http://www.securityfocus.com/bid/67331","osvdb":"106986","secunia":"58511","created_at":"2014-07-15T17:17:51.672Z","updated_at":"2014-07-15T17:17:51.672Z","fixed_in":"1.1.60"}]}},{"basic-google-maps-placemarks":{"vulnerabilities":[{"id":89333,"title":"Basic Google Maps Placemarks 1.10.2 - settings.php Multiple Fields Stored XSS Weakness","osvdb":"107121","created_at":"2014-07-15T17:17:51.718Z","updated_at":"2014-07-15T17:17:51.718Z","fixed_in":"1.10.3"}]}},{"simple-popup":{"vulnerabilities":[{"id":89334,"title":"Simple Popup - popup.php z Parameter XSS","url":"http://packetstormsecurity.com/files/126763/,http://www.securityfocus.com/bid/67562","osvdb":"107294","cve":"2014-3921","created_at":"2014-07-15T17:17:51.770Z","updated_at":"2014-07-15T17:17:51.770Z"}]}},{"bib2html":{"vulnerabilities":[{"id":89335,"title":"bib2html 0.9.3 - /OSBiB/create/index.php styleShortName Parameter XSS","url":"http://packetstormsecurity.com/files/126782/,http://www.securityfocus.com/bid/67589","osvdb":"107296","cve":"2014-3870","created_at":"2014-07-15T17:17:51.815Z","updated_at":"2014-07-15T17:17:51.815Z"}]}},{"conversionninja":{"vulnerabilities":[{"id":89336,"title":"Conversion Ninja - /lp/index.php id Parameter XSS","url":"http://packetstormsecurity.com/files/126781/,http://www.securityfocus.com/bid/67590","osvdb":"107297","cve":"2014-4017","created_at":"2014-07-15T17:17:51.864Z","updated_at":"2014-07-15T17:17:51.864Z"}]}},{"cool-video-gallery":{"vulnerabilities":[{"id":89337,"title":"Cool Video Gallery 1.8 - admin/gallery-details.php Multiple Actions CSRF","osvdb":"107354","created_at":"2014-07-15T17:17:51.910Z","updated_at":"2014-07-15T17:17:51.910Z","fixed_in":"1.9"},{"id":89338,"title":"Cool Video Gallery 1.8 - admin/gallery-manage.php Gallery Deletion CSRF","osvdb":"107355","created_at":"2014-07-15T17:17:51.957Z","updated_at":"2014-07-15T17:17:51.957Z","fixed_in":"1.9"},{"id":89339,"title":"Cool Video Gallery 1.8 - admin/gallery-settings.php Gallery Settings Manipulation CSRF","osvdb":"107356","created_at":"2014-07-15T17:17:52.003Z","updated_at":"2014-07-15T17:17:52.003Z","fixed_in":"1.9"},{"id":89340,"title":"Cool Video Gallery 1.8 - admin/gallery-sort.php Gallery Sort Order Manipulation CSRF","osvdb":"107357","created_at":"2014-07-15T17:17:52.052Z","updated_at":"2014-07-15T17:17:52.052Z","fixed_in":"1.9"},{"id":89341,"title":"Cool Video Gallery 1.8 - admin/player-settings.php Player Settings Manipulation CSRF","osvdb":"107358","created_at":"2014-07-15T17:17:52.100Z","updated_at":"2014-07-15T17:17:52.100Z","fixed_in":"1.9"},{"id":89342,"title":"Cool Video Gallery 1.8 - admin/plugin-uninstall.php Plugin Uninstallation CSRF","osvdb":"107359","created_at":"2014-07-15T17:17:52.147Z","updated_at":"2014-07-15T17:17:52.147Z","fixed_in":"1.9"},{"id":89343,"title":"Cool Video Gallery 1.8 - admin/video-sitemap.php XML Video Sitemap Generation CSRF","osvdb":"107360","created_at":"2014-07-15T17:17:52.195Z","updated_at":"2014-07-15T17:17:52.195Z","fixed_in":"1.9"},{"id":89344,"title":"Cool Video Gallery 1.8 - lib/core.php Multiple Actions CSRF","osvdb":"107361","created_at":"2014-07-15T17:17:52.241Z","updated_at":"2014-07-15T17:17:52.241Z","fixed_in":"1.9"}]}},{"gtranslate":{"vulnerabilities":[{"id":89345,"title":"GTranslate 1.0.12 - gtranslate.php Widget Code Editing CSRF","osvdb":"107399","created_at":"2014-07-15T17:17:52.294Z","updated_at":"2014-07-15T17:17:52.294Z","fixed_in":"1.0.13"}]}},{"world-of-warcraft-armory-table":{"vulnerabilities":[{"id":89346,"title":"World of Warcraft Armory Table 0.2.5 - WoWArmoryTable.php page Parameter Reflected XSS","url":"http://www.securityfocus.com/bid/67628","osvdb":"107479","secunia":"58596","created_at":"2014-07-15T17:17:52.342Z","updated_at":"2014-07-15T17:17:52.342Z","fixed_in":"0.2.6"}]}},{"participants-database":{"vulnerabilities":[{"id":89347,"title":"Participants Database 1.5.4.8 - pdb-signup CSV_type Action query Parameter SQL Injection","url":"http://www.exploit-db.com/exploits/33613,http://packetstormsecurity.com/files/126878/,http://www.securityfocus.com/bid/67769,http://www.securityfocus.com/bid/67938","osvdb":"107626","cve":"2014-3961","secunia":"58816","created_at":"2014-07-15T17:17:52.395Z","updated_at":"2014-07-15T17:17:52.395Z","fixed_in":"1.5.4.9"}]}},{"popup-images":{"vulnerabilities":[{"id":89348,"title":"Popup Images - popup-images/popup.php z Parameter XSS","url":"http://packetstormsecurity.com/files/126872/","osvdb":"107627","created_at":"2014-07-15T17:17:52.445Z","updated_at":"2014-07-15T17:17:52.445Z"}]}},{"ose-firewall":{"vulnerabilities":[{"id":89349,"title":"Centrora Security 3.2.1 - Multiple Admin Actions CSRF","osvdb":"107658","created_at":"2014-07-15T17:17:52.493Z","updated_at":"2014-07-15T17:17:52.493Z","fixed_in":"3.3.0"}]}},{"lively-chat-support":{"vulnerabilities":[{"id":89350,"title":"Lively Chat Support 1.0.29 - Unspecified Issue","osvdb":"107689","created_at":"2014-07-15T17:17:52.544Z","updated_at":"2014-07-15T17:17:52.544Z","fixed_in":"1.0.30"}]}},{"feature-comments":{"vulnerabilities":[{"id":89351,"title":"Featured Comments 1.2.1 - wp-admin/admin-ajax.php Comment Status Manipulation CSRF","url":"https://security.dxw.com/advisories/csrf-in-featured-comments-1-2-1-allows-an-attacker-to-set-and-unset-comment-statuses/,http://www.securityfocus.com/bid/67955,http://packetstormsecurity.com/files/127023/","osvdb":"107844","cve":"2014-4163","created_at":"2014-07-15T17:17:52.594Z","updated_at":"2014-07-15T17:17:52.594Z"}]}},{"wp-football":{"vulnerabilities":[{"id":89352,"title":"wp-football 1.1 - templates/template_worldCup_preview.php league Parameter Reflected XSS","url":"http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/","osvdb":"108336","created_at":"2014-07-15T17:17:52.658Z","updated_at":"2014-07-15T17:17:52.658Z"},{"id":89353,"title":"wp-football 1.1 - templates/template_default_preview.php league Parameter Reflected XSS","url":"http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/","osvdb":"108337","created_at":"2014-07-15T17:17:52.706Z","updated_at":"2014-07-15T17:17:52.706Z"},{"id":89354,"title":"wp-football 1.1 - football_phases_list.php id Parameter Reflected XSS","url":"http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/","osvdb":"108338","created_at":"2014-07-15T17:17:52.757Z","updated_at":"2014-07-15T17:17:52.757Z"},{"id":89355,"title":"wp-football 1.1 - football_matches_phase.php id Parameter Reflected XSS","url":"http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/","osvdb":"108339","created_at":"2014-07-15T17:17:52.804Z","updated_at":"2014-07-15T17:17:52.804Z"},{"id":89356,"title":"wp-football 1.1 - football_matches_load.php id_league Parameter Reflected XSS","url":"http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/","osvdb":"108340","created_at":"2014-07-15T17:17:52.852Z","updated_at":"2014-07-15T17:17:52.852Z"},{"id":89357,"title":"wp-football 1.1 - football_matches_list.php id Parameter Reflected XSS","url":"http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/","osvdb":"108341","created_at":"2014-07-15T17:17:52.898Z","updated_at":"2014-07-15T17:17:52.898Z"},{"id":89358,"title":"wp-football 1.1 - football_groups_list.php id Parameter Reflected XSS","url":"http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/","osvdb":"108342","created_at":"2014-07-15T17:17:52.947Z","updated_at":"2014-07-15T17:17:52.947Z"},{"id":89359,"title":"wp-football 1.1 - football-functions.php f Parameter Reflected XSS","url":"http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/","osvdb":"108343","created_at":"2014-07-15T17:17:52.993Z","updated_at":"2014-07-15T17:17:52.993Z"},{"id":89360,"title":"wp-football 1.1 - football_criteria.php league Parameter Reflected XSS","url":"http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/","osvdb":"108344","created_at":"2014-07-15T17:17:53.049Z","updated_at":"2014-07-15T17:17:53.049Z"},{"id":89361,"title":"wp-football 1.1 - football_classification.php league Parameter Reflected XSS","url":"http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/","osvdb":"108345","created_at":"2014-07-15T17:17:53.101Z","updated_at":"2014-07-15T17:17:53.101Z"}]}},{"member-approval":{"vulnerabilities":[{"id":89362,"title":"Member Approval 131109 - wp-admin/options-general.php Option Manipulation CSRF","url":"http://www.securityfocus.com/bid/67952,http://packetstormsecurity.com/files/127024/","osvdb":"107845","cve":"2014-3850","created_at":"2014-07-15T17:17:53.149Z","updated_at":"2014-07-15T17:17:53.149Z"}]}},{"jw-player-plugin-for-wordpress":{"vulnerabilities":[{"id":89363,"title":"JW Player 2.1.2 - wp-admin/admin.php Player Deletion CSRF","url":"http://www.securityfocus.com/bid/67954,http://packetstormsecurity.com/files/127025/","osvdb":"107846","cve":"2014-4030","created_at":"2014-07-15T17:17:53.199Z","updated_at":"2014-07-15T17:17:53.199Z"}]}},{"adminonline":{"vulnerabilities":[{"id":89364,"title":"AdminOnline - download.php file Parameter Remote Path Traversal File Access","url":"http://packetstormsecurity.com/files/127046/","osvdb":"108024","created_at":"2014-07-15T17:17:53.245Z","updated_at":"2014-07-15T17:17:53.245Z"}]}},{"ruven-toolkit":{"vulnerabilities":[{"id":89365,"title":"Ruven Toolkit 1.1 - tinymce/popup.php popup Parameter Reflected XSS","osvdb":"108312","created_at":"2014-07-15T17:17:53.292Z","updated_at":"2014-07-15T17:17:53.292Z"}]}},{"verification-code-for-comments":{"vulnerabilities":[{"id":89366,"title":"Verification Code for Comments 2.1.0 - vcc.js.php Multiple Parameter Reflected XSS","url":"http://codevigilant.com/disclosure/wp-plugin-verification-code-for-comments-a3-cross-site-scripting-xss","osvdb":"108313","cve":"2014-4565","created_at":"2014-07-15T17:17:53.344Z","updated_at":"2014-07-15T17:17:53.344Z"}]}},{"wpcb":{"vulnerabilities":[{"id":89367,"title":"wpcb 2.4.8 - facture.php id Parameter Reflected XSS","url":"http://www.securityfocus.com/bid/68357","osvdb":"108407","cve":"2014-4581","created_at":"2014-07-15T17:17:53.398Z","updated_at":"2014-07-15T17:17:53.398Z"}]}},{"wp-app-maker":{"vulnerabilities":[{"id":89368,"title":"WP App Maker 1.0.16.4 - icons-launcher.php uid Parameter Reflected XSS","osvdb":"108408","cve":"2014-4578","created_at":"2014-07-15T17:17:53.446Z","updated_at":"2014-07-15T17:17:53.446Z"}]}},{"wp-amasin-the-amazon-affiliate-shop":{"vulnerabilities":[{"id":89369,"title":"wp-amasin-the-amazon-affiliate-shop 0.9.6 - reviews.php url Parameter Local File Inclusion","osvdb":"108501","cve":"2014-4577","created_at":"2014-07-15T17:17:53.498Z","updated_at":"2014-07-15T17:17:53.498Z"}]}},{"cross-rss":{"vulnerabilities":[{"id":89370,"title":"Cross RSS 1.7 - proxy.php rss Parameter Local File Inclusion","osvdb":"108502","created_at":"2014-07-15T17:17:53.550Z","updated_at":"2014-07-15T17:17:53.550Z"}]}},{"wphotfiles":{"vulnerabilities":[{"id":89371,"title":"Hot Files \u003c 1.0.0 - Cross-site scripting (XSS) vulnerability in tpls/editmedia.php","cve":"2014-4588","created_at":"2014-07-15T17:17:53.600Z","updated_at":"2014-07-15T17:17:53.600Z"}]}},{"yahoo-updates-for-wordpress":{"vulnerabilities":[{"id":89372,"title":"Yahoo Updates \u003c 1.0 - XSS vulnerabilities in yupdates_application.php","url":"http://codevigilant.com/disclosure/wp-plugin-yahoo-updates-for-wordpress-a3-cross-site-scripting-xss/","cve":"2014-4603","created_at":"2014-07-15T17:17:53.650Z","updated_at":"2014-07-15T17:17:53.650Z"}]}},{"toolpage":{"vulnerabilities":[{"id":89373,"title":"Toolpage 1.6.1 - XSS vulnerability in includes/getTipo.php","url":"http://codevigilant.com/disclosure/wp-plugin-toolpage-a3-cross-site-scripting-xss/","cve":"2014-4560","created_at":"2014-07-15T17:17:53.697Z","updated_at":"2014-07-15T17:17:53.697Z"}]}},{"url-cloak-encrypt":{"vulnerabilities":[{"id":89374,"title":"Cloak and Encrypt \u003c 2.0 - XSS vulnerability in go.php","url":"http://codevigilant.com/disclosure/wp-plugin-url-cloak-encrypt-a3-cross-site-scripting-xss/","cve":"2014-4563","created_at":"2014-07-15T17:17:53.745Z","updated_at":"2014-07-15T17:17:53.745Z"}]}},{"validated":{"vulnerabilities":[{"id":89375,"title":"Validated \u003c 1.0.2 - XSS vulnerability in check.php","url":"http://www.securityfocus.com/bid/68320,http://codevigilant.com/disclosure/wp-plugin-validated-a3-cross-site-scripting-xss/","osvdb":"108659","cve":"2014-4564","created_at":"2014-07-15T17:17:53.795Z","updated_at":"2014-07-15T17:17:53.795Z"}]}},{"verweise-wordpress-twitter":{"vulnerabilities":[{"id":89376,"title":"Verwei.se WordPress Twitter \u003c 1.0 2 - XSS vulnerability in res/fake_twitter/frame.php","url":"http://codevigilant.com/disclosure/wp-plugin-verweise-wordpress-twitter-a3-cross-site-scripting-xss/","cve":"2014-4566","created_at":"2014-07-15T17:17:53.842Z","updated_at":"2014-07-15T17:17:53.842Z"}]}},{"easy-banners":{"vulnerabilities":[{"id":89377,"title":"Easy Banners 1.4 - XSS vulnerability in wp-admin/options-general.php","url":"http://packetstormsecurity.com/files/127293/,http://www.securityfocus.com/bid/68281","osvdb":"108626","cve":"2014-4723","created_at":"2014-07-15T17:17:53.889Z","updated_at":"2014-07-15T17:17:53.889Z"}]}},{"custom-banners":{"vulnerabilities":[{"id":89378,"title":"Custom Banners plugin 1.2.2.2 - XSS vulnerability in custom_banners_registered_name parameter to wp-admin/options.php","url":"http://packetstormsecurity.com/files/127291/,http://www.securityfocus.com/bid/68279","osvdb":"108683","cve":"2014-4724","created_at":"2014-07-15T17:17:53.936Z","updated_at":"2014-07-15T17:17:53.936Z"}]}},{"video-posts-webcam-recorder":{"vulnerabilities":[{"id":89379,"title":"Video Posts Webcam Recorder plugin \u003c 1.55.4 - XSS vulnerability in posts/videowhisper/r_logout.php","url":"http://codevigilant.com/disclosure/wp-plugin-video-posts-webcam-recorder-a3-cross-site-scripting-xss/","cve":"2014-4568","created_at":"2014-07-15T17:17:53.984Z","updated_at":"2014-07-15T17:17:53.984Z"}]}},{"zeenshare":{"vulnerabilities":[{"id":89380,"title":"ZeenShare plugin \u003c 1.0.1 - XSS vulnerability in redirect_to_zeenshare.php via the zs_sid parameter","url":"http://codevigilant.com/disclosure/wp-plugin-zeenshare-a3-cross-site-scripting-xss/","cve":"2014-4606","created_at":"2014-07-15T17:17:54.036Z","updated_at":"2014-07-15T17:17:54.036Z"}]}},{"zdstats":{"vulnerabilities":[{"id":89381,"title":"ZdStatistics \u003c 2.0.1 - XSS vulnerability in cal/test.php via the lang parameter","url":"http://codevigilant.com/disclosure/wp-plugin-zdstats-a3-cross-site-scripting-xss/","cve":"2014-4605","created_at":"2014-07-15T17:17:54.082Z","updated_at":"2014-07-15T17:17:54.082Z"}]}},{"your-text-manager":{"vulnerabilities":[{"id":89382,"title":"Your Text Manager \u003c 0.3.0 - XSS vulnerability in settings/pwsettings.php via the ytmpw parameter","url":"http://codevigilant.com/disclosure/wp-plugin-your-text-manager-a3-cross-site-scripting-xss/","cve":"2014-4604","created_at":"2014-07-15T17:17:54.134Z","updated_at":"2014-07-15T17:17:54.134Z"}]}},{"xen-carousel":{"vulnerabilities":[{"id":89383,"title":"XEN Carousel \u003c 0.12.2 - XSS vulnerabilities in xencarousel-admin.js.php via path or ajaxpath parameter","url":"http://codevigilant.com/disclosure/wp-plugin-xen-carousel-a3-cross-site-scripting-xss/","cve":"2014-4602","created_at":"2014-07-15T17:17:54.180Z","updated_at":"2014-07-15T17:17:54.180Z"}]}},{"wp-media-player":{"vulnerabilities":[{"id":89384,"title":"WP Silverlight Media Player \u003c 0.8 - XSS vulnerability in uploader.php via the post_id parameter","url":"http://codevigilant.com/disclosure/wp-plugin-wp-media-player-a3-cross-site-scripting-xss/","cve":"2014-4589","created_at":"2014-07-15T17:17:54.234Z","updated_at":"2014-07-15T17:17:54.234Z"}]}},{"wp-microblogs":{"vulnerabilities":[{"id":89385,"title":"WP Microblogs plugin \u003c 0.4.0 - XSS vulnerability in get.php via the oauth_verifier parameter","url":"http://codevigilant.com/disclosure/wp-plugin-wp-microblogs-a3-cross-site-scripting-xss/","cve":"2014-4590","created_at":"2014-07-15T17:17:54.284Z","updated_at":"2014-07-15T17:17:54.284Z"}]}}]
\ No newline at end of file
diff --git a/data/plugin_vulns.xml b/data/plugin_vulns.xml
deleted file mode 100644
index eb1258c8..00000000
--- a/data/plugin_vulns.xml
+++ /dev/null
@@ -1,13894 +0,0 @@
-
-
-
-
-
-
- Theme My Login 6.3.9 - Local File Inclusion
-
- 108517
- http://packetstormsecurity.com/files/127302/
- http://seclists.org/fulldisclosure/2014/Jun/172
- http://www.securityfocus.com/bid/68254
- https://security.dxw.com/advisories/lfi-in-theme-my-login/
-
- LFI
- 6.3.10
-
-
-
-
-
- Login Rebuilder < 1.2.0 - Cross Site Request Forgery Vulnerability
-
- 108364
- 2014-3882
-
- CSRF
- 1.2.0
-
-
-
-
-
- Simple Share Buttons Adder 4.4 - options-general.php Multiple Admin Actions CSRF
-
- 108444
- 2014-4717
- 33896
- https://security.dxw.com/advisories/csrf-and-stored-xss-in-simple-share-buttons-adder/
- http://packetstormsecurity.com/files/127238/
-
- CSRF
- 4.5
-
-
- Simple Share Buttons Adder 4.4 - options-general.php ssba_share_text Parameter Stored XSS Weakness
-
- 108445
- 33896
- https://security.dxw.com/advisories/csrf-and-stored-xss-in-simple-share-buttons-adder/
- http://packetstormsecurity.com/files/127238/
-
- XSS
- 4.5
-
-
-
-
-
- Content Slide <= 1.4.2 - Cross Site Request Forgery Vulnerability
-
- 93871
- 2013-2708
- 52949
-
- CSRF
-
-
-
-
-
- WP Cron DashBoard <= 1.1.5 - wp-cron-dashboard.php procname Parameter Reflected XSS
-
- 100660
- 2013-6991
- http://packetstormsecurity.com/files/124602/
- https://www.htbridge.com/advisory/HTB23189
-
- XSS
-
-
-
-
-
- Simple Paypal Shopping Cart 3.5 - Cross-Site Request Forgery Vulnerability
-
- 93953
- 2013-2705
- 52963
-
- CSRF
- 3.6
-
-
-
-
-
- WP-SendSMS 1.0 - Setting Manipulation CSRF
-
- 94209
- 53796
- 26124
-
- CSRF
-
-
- WP-SendSMS 1.0 - wp-admin/admin.php Multiple Parameter XSS
-
- 94210
- 26124
-
- XSS
-
-
-
-
-
- Mail Subscribe List - Script Insertion Vulnerability
-
- 53732
- 94197
-
- XSS
- 2.1
-
-
-
-
-
- S3 Video <= 0.97 - VideoJS Cross Site Scripting Vulnerability
-
- 53437
- http://seclists.org/fulldisclosure/2013/May/66
-
- XSS
- 0.98
-
-
- S3 Video 0.982 - preview_video.php base Parameter XSS
-
- 101388
- 56167
- 2013-7279
-
- XSS
- 0.983
-
-
-
-
-
- VideoJS Cross - Site Scripting Vulnerability
-
- 53426
- http://seclists.org/fulldisclosure/2013/May/66
-
- XSS
- 4.1
-
-
-
-
-
- VideoJS Cross - Site Scripting Vulnerability
-
- 53445
- http://seclists.org/fulldisclosure/2013/May/66
-
- XSS
- 1.4
-
-
-
-
-
- VideoJS Cross - Site Scripting Vulnerability
-
- 53396
- http://seclists.org/fulldisclosure/2013/May/66
-
- XSS
- 2.1
-
-
-
-
-
- VideoJS Cross - Site Scripting Vulnerability
-
- http://seclists.org/fulldisclosure/2013/May/66
-
- XSS
-
-
-
-
-
- Crayon Syntax Highlighter - Remote File Inclusion Vulnerability
-
- 86255
- 86256
- 50804
- http://ceriksen.com/2012/10/15/wordpress-crayon-syntax-highlighter-remote-file-inclusion-vulnerability/
-
- RFI
- 1.13
-
-
-
-
-
- UnGallery <= 1.5.8 - Local File Disclosure Vulnerability
-
- 17704
-
- LFI
-
-
- UnGallery - Arbitrary Command Execution
-
- 50875
- http://ceriksen.com/2012/10/23/wordpress-ungallery-remote-command-injection-vulnerability/
-
- RCE
- 2.1.6
-
-
-
-
-
- Thank You Counter Button 1.8.7 - wp-admin/options.php Multiple Parameter Stored XSS
-
- 103778
- http://packetstormsecurity.com/files/125397/
- http://www.securityfocus.com/bid/65805
- 2014-2315
-
- XSS
-
-
- Thank You Counter Button <= 1.8.2 - XSS
-
- 50977
-
- XSS
- 1.8.3
-
-
-
-
-
- Bookings <= 1.8.2 - controlpanel.php error Parameter XSS
-
- 86613
- 50975
-
- XSS
- 1.8.3
-
-
-
-
-
- Cimy User Manager <= 1.4.2 - Arbitrary File Disclosure
-
- 50834
- http://ceriksen.com/2012/10/24/wordpress-cimy-user-manager-arbitrary-file-disclosure/
-
- UNKNOWN
- 1.4.4
-
-
-
-
-
- FireStorm Professional Real Estate 2.06.01 - xml/marker_listings.php id Parameter SQL Injection
-
- 86686
- 51107
- 22071
- http://packetstormsecurity.com/files/118232/
- http://xforce.iss.net/xforce/xfdb/80261
-
- SQLI
- 2.06.04
-
-
- FireStorm Professional Real Estate - Multiple SQL Injection
-
- 50873
- http://ceriksen.com/2012/10/25/wordpress-firestorm-professional-real-estate-plugin-sql-injection-vulnerability/
-
- SQLI
- 2.06.03
-
-
-
-
-
- WP125 <= 1.4.4 - Multiple XSS
-
- 50976
-
- XSS
- 1.4.5
-
-
- WP125 <= 1.4.9 - CSRF
-
- 92113
- 2013-2700
- 52876
- http://www.securityfocus.com/bid/58934
-
- CSRF
- 1.5.0
-
-
-
-
-
- All Video Gallery - Multiple SQL Injection Vulnerabilities
-
- 50874
- 22427
- http://ceriksen.com/2012/11/04/wordpress-all-video-gallery-plugin-sql-injection/
-
- SQLI
-
-
-
-
-
- BuddyStream - XSS
-
- 50972
-
- XSS
-
-
-
-
-
- Post views 2.6.1 - wp-content/plugins/post-views/post-views.php search_input Parameter XSS
-
- 87349
- 50982
- http://www.securityfocus.com/bid/56555
- http://xforce.iss.net/xforce/xfdb/80076
-
- XSS
-
-
-
-
-
- Floating Social Media Links <= 1.4.2 - fsml-admin.js.php wpp Parameter Remote File Inclusion
-
- 88383
- 51346
- http://www.securityfocus.com/bid/56913
- http://xforce.iss.net/xforce/xfdb/80641
- http://ceriksen.com/2013/01/12/wordpress-floating-social-media-link-plugins-remote-file-inclusion/
-
- RFI
- 1.4.3
-
-
- Floating Social Media Links <= 1.4.2 - fsml-hideshow.js.php wpp Parameter Remote File Inclusion
-
- 88385
- 51346
- http://www.securityfocus.com/bid/56913
- http://ceriksen.com/2013/01/12/wordpress-floating-social-media-link-plugins-remote-file-inclusion/
-
- RFI
- 1.4.3
-
-
-
-
-
- Zingiri Forum 1.4.2 - forum.php zing_forum_output Function url Parameter XSS
-
- 89069
- 2012-4920
- 50833
- http://www.securityfocus.com/bid/57224
- http://xforce.iss.net/xforce/xfdb/81156
- http://ceriksen.com/2013/01/12/wordpress-zingiri-forums-arbitrary-file-disclosure/
-
- XSS
- 1.4.4
-
-
-
-
-
- Google Document Embedder - Arbitrary File Disclosure
-
- 2012-4915
- 23970
- 50832
- http://www.securityfocus.com/bid/57133
- http://packetstormsecurity.com/files/119329/
- http://ceriksen.com/2013/01/03/wordpress-google-document-embedder-arbitrary-file-disclosure/
- exploit/unix/webapp/wp_google_document_embedder_exec
-
- UNKNOWN
- 2.5.4
-
-
-
-
-
- extended-user-profile - Full Path Disclosure vulnerability
-
- http://1337day.com/exploit/20118
-
- FPD
-
-
-
-
-
- superslider-show - Full Path Disclosure vulnerability
-
- http://1337day.com/exploit/20117
-
- FPD
-
-
-
-
-
- multibox - Full Path Disclosure vulnerability
-
- http://1337day.com/exploit/20119
-
- FPD
-
-
-
-
-
- OpenInviter - Information Disclosure
-
- http://packetstormsecurity.com/files/119265/
-
- UNKNOWN
-
-
-
-
-
- RokBox - Multiple Vulnerabilities
-
- http://1337day.com/exploit/19981
-
- MULTI
-
-
- RokBox <= 2.13 - thumb.php src Parameter Malformed Input Path Disclosure
-
- 88604
- http://packetstormsecurity.com/files/118884/
- http://xforce.iss.net/xforce/xfdb/80732
- http://www.securityfocus.com/bid/56953
- http://seclists.org/fulldisclosure/2012/Dec/159
-
- UNKNOWN
-
-
- RokBox <= 2.13 - thumb.php src Parameter XSS
-
- 88605
- http://packetstormsecurity.com/files/118884/
- http://xforce.iss.net/xforce/xfdb/80731
- http://www.securityfocus.com/bid/56953
- http://seclists.org/fulldisclosure/2012/Dec/159
-
- XSS
-
-
- RokBox <= 2.13 - rokbox.php Direct Request Path Disclosure
-
- 88606
- http://packetstormsecurity.com/files/118884/
- http://www.securityfocus.com/bid/56953
- http://seclists.org/fulldisclosure/2012/Dec/159
-
- UNKNOWN
-
-
- RokBox <= 2.13 - error_log Direct Request Error Log Information Disclosure
-
- 88607
- http://packetstormsecurity.com/files/118884/
- http://xforce.iss.net/xforce/xfdb/80761
- http://www.securityfocus.com/bid/56953
- http://seclists.org/fulldisclosure/2012/Dec/159
-
- UNKNOWN
-
-
- RokBox <= 2.13 - jwplayer/jwplayer.swf abouttext Parameter XSS
-
- 88608
- http://packetstormsecurity.com/files/118884/
- http://xforce.iss.net/xforce/xfdb/80731
- http://www.securityfocus.com/bid/56953
- http://seclists.org/fulldisclosure/2012/Dec/159
-
- XSS
-
-
- RokBox <= 2.13 - thumb.php src Parameter Arbitrary File Upload
-
- 88609
- http://packetstormsecurity.com/files/118884/
- http://xforce.iss.net/xforce/xfdb/80733
- http://xforce.iss.net/xforce/xfdb/80739
- http://www.securityfocus.com/bid/56953
- http://seclists.org/fulldisclosure/2012/Dec/159
-
- UPLOAD
-
-
-
-
-
- RokIntroScroller <= 1.8 - XSS,DoS,Disclosure,Upload Vulnerabilities
-
- 97418
- 54801
- http://packetstormsecurity.com/files/123302/
- http://seclists.org/fulldisclosure/2013/Sep/121
-
- MULTI
-
-
-
-
-
- RokMicroNews <= 1.5 - XSS,DoS,Disclosure,Upload Vulnerabilities
-
- 97418
- 54801
- http://packetstormsecurity.com/files/123312/
- http://seclists.org/fulldisclosure/2013/Sep/124
-
- MULTI
-
-
-
-
-
- RokNewsPager <= 1.17 - XSS,DoS,Disclosure,Upload Vulnerabilities
-
- 97418
- 54801
- http://packetstormsecurity.com/files/123271/
- http://seclists.org/fulldisclosure/2013/Sep/109
-
- MULTI
-
-
-
-
-
- RokStories <= 1.25 - XSS,DoS,Disclosure,Upload Vulnerabilities
-
- 97418
- 54801
- http://packetstormsecurity.com/files/123270/
- http://seclists.org/fulldisclosure/2013/Sep/108
-
- MULTI
-
-
-
-
-
- grou-random-image-widget - Full Path Disclosure
-
- http://1337day.com/exploit/20047
-
- FPD
-
-
-
-
-
- sintic_gallery - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/19993
-
- UPLOAD
-
-
- sintic_gallery - Path Disclosure Vulnerability
-
- http://1337day.com/exploit/20020
-
- FPD
-
-
-
-
-
- WP-UserOnline - Full Path Disclosure
-
- http://seclists.org/fulldisclosure/2010/Jul/8
-
- FPD
-
-
- Wp-UserOnline <= 0.62 - Persistent XSS
-
- http://seclists.org/fulldisclosure/2010/Jul/8
-
- XSS
-
-
-
-
-
- Shopping Cart 8.1.14 - Shell Upload, SQL Injection
-
- http://packetstormsecurity.com/files/119217/
- 51690
-
- MULTI
- 8.1.15
-
-
- Level Four Storefront - levelfourstorefront/getsortmanufacturers.php id Parameter SQL Injection
-
- 91680
- http://packetstormsecurity.com/files/120950/
-
- SQLI
-
-
-
-
-
- ReFlex Gallery 1.4.2 - Unspecified XSS
-
- 102585
-
- XSS
- 1.4.3
-
-
- ReFlex Gallery 1.4 - reflex-gallery.php Direct Request Path Disclosure
-
- 88869
-
- FPD
-
-
- ReFlex Gallery 1.3 - Shell Upload
-
- http://packetstormsecurity.com/files/119218/
-
- UPLOAD
-
-
-
-
-
- Uploader 1.0.4 - Shell Upload
-
- 70648
- 43075
- 52465
- http://packetstormsecurity.com/files/119219/
-
- UPLOAD
-
-
- Uploader 1.0.4 - notify.php blog Parameter XSS
-
- 90840
- 2013-2287
- 52465
-
- XSS
-
-
- Uploader 1.0.0 - wp-content/plugins/uploader/views/notify.php num Parameter XSS
-
- 70649
- 43075
-
- XSS
-
-
-
-
-
- Xerte Online 0.32 - Shell Upload
-
- http://packetstormsecurity.com/files/119220/
-
- UPLOAD
-
-
-
-
-
- Advanced Custom Fields <= 3.5.1 - Remote File Inclusion
-
- http://packetstormsecurity.com/files/119221/
- 51037
- 23856
- 87353
- exploit/unix/webapp/wp_advanced_custom_fields_exec
-
- RFI
- 3.5.2
-
-
-
-
-
- sitepress-multilingual-cms - Full Path Disclosure
-
- http://1337day.com/exploit/20067
-
- FPD
-
-
-
-
-
- Asset Manager 0.2 - Arbitrary File Upload
-
- 82653
- 18993
- 23652
- 49378
- http://www.securityfocus.com/bid/53809
- http://packetstormsecurity.com/files/119133/
-
- UPLOAD
-
-
- Asset Manager - upload.php Arbitrary Code Execution
-
- 82653
- http://www.ethicalhack3r.co.uk/security/wordpress-plugin-asset-manager-upload-php-arbitrary-code-execution/
- http://packetstormsecurity.com/files/113285/
- http://xforce.iss.net/xforce/xfdb/80823
-
- UPLOAD
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
- Blaze Slideshow 2.1 - Unspecified Security Vulnerability
-
- http://www.securityfocus.com/bid/52677
-
- UNKNOWN
- 2.2
-
-
-
-
-
- Comment Extra Field 1.7 - CSRF / XSS
-
- http://packetstormsecurity.com/files/122625/
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- MULTI
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
- PDW File Browser - upload.php Arbitrary File Upload Vulnerability
-
- http://www.securityfocus.com/bid/53895
-
- UPLOAD
-
-
-
-
-
- powerzoomer - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/20253
-
- UPLOAD
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- Smart Slideshow - upload.php Multiple File Extension Upload Arbitrary Code Execution
-
- 87373
-
- UPLOAD
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- TinyMCE 3.5 - swfupload Cross-Site Scripting Vulnerability
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
- 51224
-
- XSS
- 3.6
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- wp-3dflick-slideshow - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/20255
-
- UPLOAD
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
- 51250
-
- XSS
-
-
- Carousel Slideshow - Unspecified Vulnerabilities
-
- 50377
-
- UNKNOWN
- 3.10
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- wp-homepage-slideshow - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/20260
-
- UPLOAD
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- Image News Slider 3.3 - Arbitrary File Upload Vulnerability
-
- 87375
- http://1337day.com/exploit/20259
-
- UPLOAD
-
-
- Image News Slider 3.3 - Unspecified Vulnerabilities
-
- 84935
- 50390
-
- UNKNOWN
- 3.4
-
-
- Image News Slider 3.2 - Multiple Unspecified Remote Issues
-
- 81314
- 2012-4327
- 48747
- http://www.securityfocus.com/bid/52977
- http://xforce.iss.net/xforce/xfdb/74788
-
- UNKNOWN
- 3.3
-
-
- Image News Slider 3.1 - Multiple Unspecified Remote Issues
-
- 80310
- 48538
-
- UNKNOWN
- 3.2
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- Image Resizer - Cross Site Scripting
-
- http://packetstormsecurity.com/files/123651/
-
- XSS
-
-
-
-
-
- wp-levoslideshow - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/20250
-
- UPLOAD
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- wp-powerplaygallery - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/20252
-
- UPLOAD
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- wp-royal-gallery - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/20261
-
- UPLOAD
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
- wp superb Slideshow - Full Path Disclosure
-
- http://1337day.com/exploit/19979
-
- FPD
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
-
-
-
- Ajax - Post Search Sql Injection
-
- http://seclists.org/bugtraq/2012/Nov/33
- 51205
- http://www.girlinthemiddle.net/2012/10/sqli-vulnerability-in-ajax-post-search.html
-
- SQLI
- 1.3
-
-
-
-
-
- Answer My Question 1.1 - record_question.php Multiple Parameter XSS
-
- 85567
- 50655
- http://www.securityfocus.com/archive/1/524625/30/0/threaded
- http://seclists.org/bugtraq/2012/Nov/24
-
- XSS
- 1.2
-
-
-
-
-
- Spider Catalog - HTML Code Injection and Cross-site scripting
-
- http://packetstormsecurity.com/files/117820/
- 51143
-
- MULTI
-
-
- Spider Catalog - Multiple SQL Injection and Cross Site Scripting Vulnerabilities
-
- http://www.securityfocus.com/bid/60079
-
- MULTI
-
-
- Spider Catalog 1.4.6 - Multiple Shortcode id Parameter SQL Injection
-
- 93589
- 25724
- 53491
- http://seclists.org/bugtraq/2013/May/79
-
- SQLI
-
-
- Spider Catalog 1.4.6 - catalog.php catalog_after_search_results Function s Parameter SQL Injection
-
- 93590
- 25724
- 53491
- http://seclists.org/bugtraq/2013/May/79
-
- SQLI
-
-
- Spider Catalog 1.4.6 - Categories.php Multiple Function id Parameter SQL Injection
-
- 93591
- 25724
- 53491
- http://seclists.org/bugtraq/2013/May/79
-
- SQLI
-
-
- Spider Catalog 1.4.6 - products.php Multiple Function Multiple Parameter SQL Injection
-
- 93592
- 25724
- 53491
- http://seclists.org/bugtraq/2013/May/79
-
- SQLI
-
-
- Spider Catalog 1.4.6 - Category Entry Multiple Field XSS
-
- 93593
- 25723
- 53491
- http://seclists.org/bugtraq/2013/May/79
-
- XSS
-
-
- Spider Catalog 1.4.6 - Categories.html.php Multiple Parameter XSS
-
- 93594
- 25724
- 53491
- http://seclists.org/bugtraq/2013/May/79
-
- XSS
-
-
- Spider Catalog 1.4.6 - Products.html.php Multiple Parameter XSS
-
- 93595
- 25724
- 53491
- http://seclists.org/bugtraq/2013/May/79
-
- XSS
-
-
- Spider Catalog 1.4.6 - spiderBox/spiderBox.js.php Multiple Parameter XSS
-
- 93596
- 25724
- 53491
- http://seclists.org/bugtraq/2013/May/79
-
- XSS
-
-
- Spider Catalog 1.4.6 - catalog.php spider_box_js_php Function Multiple Parameter XSS
-
- 93597
- 25724
- 53491
- http://seclists.org/bugtraq/2013/May/79
-
- XSS
-
-
- Spider Catalog 1.4.6 - Multiple Script Direct Request Path Disclosure
-
- 93598
- 25724
- 53491
- http://seclists.org/bugtraq/2013/May/79
-
- FPD
-
-
-
-
-
- Wordfence 3.8.6 - lib/IPTraf.php User-Agent Header Stored XSS
-
- 102445
- 56558
-
- XSS
- 3.8.7
-
-
- Wordfence 3.8.1 - lib/wordfenceClass.php isStrongPasswd Function Password Creation Restriction Bypass Weakness
-
- 102478
-
- AUTHBYPASS
- 3.8.3
-
-
- Wordfence 3.8.1 - wp-admin/admin.php whois Parameter Stored XSS
-
- 97884
- http://packetstormsecurity.com/files/122993/
- http://www.securityfocus.com/bid/62053
-
- XSS
- 3.8.3
-
-
- Wordfence 3.3.5 - XSS and IAA
-
- 86557
- 51055
- http://seclists.org/fulldisclosure/2012/Oct/139
-
- MULTI
- 3.3.7
-
-
-
-
-
- Slideshow jQuery Image Gallery - Multiple Vulnerabilities
-
- http://www.waraxe.us/advisory-92.html
-
- MULTI
-
-
- Slideshow - Multiple Script Insertion Vulnerabilities
-
- 51135
-
- XSS
-
-
-
-
-
- Social Discussions 6.1.1 - Multiple Script Direct Request Path Disclosure
-
- 86730
- 22158
- http://xforce.iss.net/xforce/xfdb/79465
- http://www.waraxe.us/advisory-93.html
-
- FPD
-
-
- Social Discussions 6.1.1 - social-discussions-networkpub_ajax.php HTTP_ENV_VARS Parameter Remote File Inclusion
-
- 86731
- 22158
- http://xforce.iss.net/xforce/xfdb/79464
- http://www.waraxe.us/advisory-93.html
-
- RFI
-
-
-
-
-
- ABtest - Directory Traversal
-
- http://scott-herbert.com/?p=140
-
- UNKNOWN
-
-
-
-
-
- BBPress - Multiple Script Malformed Input Path Disclosure
-
- 86399
- 22396
- http://xforce.iss.net/xforce/xfdb/78244
- http://packetstormsecurity.com/files/116123/
-
- SQLI
-
-
- BBPress - forum.php page Parameter SQL Injection
-
- 86400
- 22396
- http://xforce.iss.net/xforce/xfdb/78244
- http://packetstormsecurity.com/files/116123/
-
- SQLI
-
-
-
-
-
- NextGen Cu3er Gallery - Information Disclosure
-
- http://packetstormsecurity.com/files/116150/
-
- UNKNOWN
-
-
-
-
-
- Rich Widget - File Upload
-
- http://packetstormsecurity.com/files/115787/
-
- UPLOAD
-
-
-
-
-
- Monsters Editor - Shell Upload
-
- http://packetstormsecurity.com/files/115788/
-
- UPLOAD
-
-
-
-
-
- Quick Post Widget 1.9.1 - Multiple Cross-site scripting vulnerabilities
-
- 2012-4226
- 83640
- http://www.darksecurity.de/advisories/2012/SSCHADV2012-016.txt
- http://seclists.org/bugtraq/2012/Aug/66
-
- XSS
-
-
-
-
-
- ThreeWP Email Reflector 1.13 - Subject Field XSS
-
- 2012-2572
- 85134
- 20365
-
- XSS
- 1.16
-
-
-
-
-
- SimpleMail 1.0.6 - Stored XSS
-
- 84534
- 2012-2579
- 20361
- 50208
-
- XSS
-
-
-
-
-
- Postie 1.4.3 - Stored XSS
-
- 84532
- 2012-2580
- 20360
- 50207
-
- XSS
- 1.5.15
-
-
-
-
-
- RSVPMaker 2.5.4 - index.php RSVP Form Multiple Field XSS
-
- 84749
- 50289
- 20474
-
- XSS
- 2.5.5
-
-
-
-
-
- Mz-jajak <= 2.1 - index.php id Parameter SQL Injection
-
- 84698
- 50217
- 20416
-
- SQLI
-
-
-
-
-
- Resume Submissions Job Posting 2.5.1 - Unrestricted File Upload
-
- 83807
- 49896
- 19791
- http://packetstormsecurity.com/files/114716/
-
- UPLOAD
-
-
-
-
-
- WP-Predict 1.0 - Blind SQL Injection
-
- 83697
- 49843
- 19715
-
- SQLI
-
-
-
-
-
- Backup 2.0.1 - Information Disclosure
-
- 83701
- 50038
- 19524
-
- UNKNOWN
- 2.1
-
-
-
-
-
- MoodThingy Widget 0.8.7 - admin-ajax.php Multiple Parameter lydl_store_results Function SQL Injection
-
- 83632
- 49805
- 19572
-
- SQLI
-
-
-
-
-
- Paid Business Listings 1.0.2 - Form Submission pbl_listing_pkg_id Parameter SQL Injection
-
- 83768
- 19481
-
- SQLI
-
-
-
-
-
- Website FAQ 1.0 - wp-admin/admin-ajax.php category Parameter SQL injection
-
- 83265
- 49682
- 19400
-
- SQLI
-
-
-
-
-
- Fancy Gallery 1.2.4 - Shell Upload
-
- 83410
- 19398
- http://packetstormsecurity.com/files/114114/
-
- UPLOAD
-
-
-
-
-
- Flip Book 1.0 - Shell Upload
-
- http://packetstormsecurity.com/files/114112/
-
- UPLOAD
-
-
-
-
-
- Ajax Multi Upload 1.1 - Shell Upload
-
- http://packetstormsecurity.com/files/114109/
-
- UPLOAD
-
-
-
-
-
- Schreikasten 0.14.13 - wp-admin/admin-ajax.php Multiple Parameter XSS
-
- 83152
- 49600
- 19294
-
- XSS
-
-
-
-
-
- Automatic 2.0.3 - csv.php q Parameter SQL Injection
-
- 82971
- 49573
- 19187
- http://packetstormsecurity.com/files/113763/
-
- SQLI
- 2.0.4
-
-
-
-
-
- VideoWhisper Video Conference 4.51 - Arbitrary File Upload Vulnerability
-
- http://packetstormsecurity.com/files/113580/
-
- UPLOAD
-
-
- Video Whisper - XSS
-
- http://packetstormsecurity.com/files/122943/
-
- XSS
-
-
-
-
-
- VideoWhisper Live Streaming Integration 4.29.6 - videowhisper_streaming.php Multiple Parameter XSS
-
- 103871
- http://packetstormsecurity.com/files/125430/
-
- XSS
-
-
- VideoWhisper Live Streaming Integration 4.27.3 - ls/vc_chatlog.php msg Parameter Stored XSS
-
- 103821
- 2014-1906
- https://www.htbridge.com/advisory/HTB23199
-
- XSS
- 4.29.5
-
-
- VideoWhisper Live Streaming Integration 4.27.3 - ls/v_status.php ct Parameter Reflected XSS
-
- 103820
- 2014-1906
- https://www.htbridge.com/advisory/HTB23199
-
- XSS
- 4.29.5
-
-
- VideoWhisper Live Streaming Integration 4.27.3 - ls/lb_logout.php message Parameter Reflected XSS
-
- 103819
- 2014-1906
- https://www.htbridge.com/advisory/HTB23199
-
- XSS
- 4.29.5
-
-
- VideoWhisper Live Streaming Integration 4.27.3 - ls/videotext.php n Parameter Reflected XSS
-
- 103818
- 2014-1906
- https://www.htbridge.com/advisory/HTB23199
-
- XSS
- 4.29.5
-
-
- VideoWhisper Live Streaming Integration 4.27.3 - ls/video.php n Parameter Reflected XSS
-
- 103817
- 2014-1906
- https://www.htbridge.com/advisory/HTB23199
-
- XSS
- 4.29.5
-
-
- VideoWhisper Live Streaming Integration 4.27.3 - ls/htmlchat.php n Parameter Reflected XSS
-
- 103816
- 2014-1906
- https://www.htbridge.com/advisory/HTB23199
-
- XSS
- 4.29.5
-
-
- VideoWhisper Live Streaming Integration 4.27.3 - ls/rtmp_logout.php s Parameter Path Traversal Remote File Deletion
-
- 103815
- 2014-1907
- http://packetstormsecurity.com/files/125454/
- https://www.htbridge.com/advisory/HTB23199
-
- UNKNOWN
- 4.29.5
-
-
- VideoWhisper Live Streaming Integration 4.27.3 - ls/channel.php n Parameter Reflected XSS
-
- 103814
- 2014-1906
- https://www.htbridge.com/advisory/HTB23199
-
- XSS
- 4.29.5
-
-
- VideoWhisper Live Streaming Integration 4.27.3 - Error Message Unspecified Remote Information Disclosure
-
- 103428
-
- UNKNOWN
- 4.29.5
-
-
- VideoWhisper Live Streaming Integration 4.27.3 - Unspecified Path Traversal
-
- 103427
-
- UNKNOWN
- 4.29.5
-
-
- VideoWhisper Live Streaming Integration 4.27.3 - Unspecified XSS
-
- 103426
-
- XSS
- 4.29.5
-
-
- VideoWhisper Live Streaming Integration 4.27.3 - Unspecified File Upload Remote Code Execution
-
- 103425
-
- RCE
- 4.29.5
-
-
- VideoWhisper Live Streaming Integration < 4.27.2 - XSS vulnerability in ls/vv_login.php via room_name parameter
-
- 2014-4569
- http://codevigilant.com/disclosure/wp-plugin-videowhisper-live-streaming-integration-a3-cross-site-scripting-xss/
-
- XSS
-
-
- VideoWhisper Live Streaming Integration - ls/htmlchat.php Multiple Parameter XSS
-
- 96593
- 2013-5714
- 54619
- http://www.securityfocus.com/bid/61977
- http://seclists.org/bugtraq/2013/Aug/163
-
- XSS
-
-
-
-
-
- Sitemile Auctions 2.0.1.3 - wp-content/plugins/auctionPlugin/upload.php File Upload PHP Code Execution
-
- 83075
- 49497
- http://packetstormsecurity.com/files/113568/
-
- UPLOAD
-
-
-
-
-
- LB Mixed Slideshow 1.0 - Arbitrary File Upload Vulnerability
-
- http://packetstormsecurity.com/files/113844/
-
- UPLOAD
-
-
-
-
-
- Lim4wp 1.1.1 - Arbitrary File Upload Vulnerability
-
- 83016
- 49609
- http://packetstormsecurity.com/files/113846/
-
- UPLOAD
-
-
-
-
-
- Wp-ImageZoom 1.0.3 - download.php File Upload PHP Code Execution
-
- 83015
- 49612
- http://www.opensyscom.fr/Actualites/wordpress-plugins-wp-imagezoom-remote-file-disclosure-vulnerability.html
-
- UPLOAD
-
-
- Wp-ImageZoom 1.0.3 - Remote File Disclosure
-
- http://packetstormsecurity.com/files/113845/
-
- UNKNOWN
-
-
- Wp-ImageZoom - zoom.php id Parameter SQL Injection
-
- 87870
- http://www.securityfocus.com/bid/56691
- http://xforce.iss.net/xforce/xfdb/80285
-
- SQLI
-
-
-
-
-
- Invit0r 0.22 - Shell Upload
-
- http://packetstormsecurity.com/files/113639/
-
- UPLOAD
-
-
-
-
-
- Annonces 1.2.0.1 - Shell Upload
-
- http://packetstormsecurity.com/files/113637/
-
- UPLOAD
-
-
-
-
-
- Contus Video Gallery 1.3 - Arbitrary File Upload Vulnerability
-
- http://packetstormsecurity.com/files/113571/
-
- UPLOAD
-
-
-
-
-
- Contus HD FLV Player <= 1.3 - SQL Injection Vulnerability
-
- 17678
-
- SQLI
-
-
- Contus HD FLV Player 1.7 - Arbitrary File Upload Vulnerability
-
- http://packetstormsecurity.com/files/113570/
-
- UPLOAD
-
-
-
-
-
-
- User Meta Version 1.1.1 - Arbitrary File Upload Vulnerability
-
- 82902
- 19052
-
- UPLOAD
-
-
-
-
-
- Top Quark Architecture 2.1.0 - lib/js/fancyupload/showcase/batch/script.php File Upload PHP Code Execution
-
- 82843
- 49465
- 19053
- http://packetstormsecurity.com/files/113522/
-
- UPLOAD
-
-
-
-
-
- SFBrowser 1.4.5 - connectors/php/sfbrowser.php File Upload PHP Code Execution
-
- 82845
- 49466
- 19054
-
- UPLOAD
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
- Pica Photo Gallery 1.0 - Arbitrary File Upload Vulnerability
-
- 19055
-
- UPLOAD
-
-
- PICA Photo Gallery 1.0 - Remote File Disclosure
-
- 19016
- http://www.securityfocus.com/bid/53893
-
- UNKNOWN
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
- Mac Photo Gallery - Two Security Bypass Security Issues
-
- 49923
-
- AUTHBYPASS
-
-
- Mac Photo Gallery - Multiple Script Insertion Vulnerabilities
-
- 49836
-
- XSS
- 3.0
-
-
- Mac Photo Gallery 2.7 - upload-file.php File Upload PHP Code Execution
-
- 82844
- 49468
- 19056
-
- UPLOAD
-
-
-
-
-
- drag and drop file upload 0.1 - Arbitrary File Upload Vulnerability
-
- 19057
-
- UPLOAD
-
-
-
-
-
- Custom Content Type Manager 0.9.5.13pl - upload_form.php File Upload PHP Code Execution
-
- 82904
- 19058
- http://packetstormsecurity.com/files/113520/
-
- UPLOAD
-
-
-
-
-
- wp-gpx-max version 1.1.21 - Arbitrary File Upload
-
- 82900
- 2012-6649
- 19050
- http://www.securityfocus.com/bid/53909
- http://packetstormsecurity.org/files/113523/
-
- UPLOAD
- 1.1.23
-
-
-
-
-
- Front File Manager 0.1 - Arbitrary File Upload
-
- 19012
-
- UPLOAD
-
-
-
-
-
- Front End Upload 0.5.3 - Arbitrary File Upload
-
- 19008
-
- UPLOAD
-
-
- Front End Upload 0.5.4 - Arbitrary PHP File Upload
-
- 20083
-
- UPLOAD
-
-
-
-
-
- Omni Secure Files 0.1.13 - Arbitrary File Upload
-
- 19009
- 82790
- 49441
- http://www.securityfocus.com/bid/53872
-
- UPLOAD
-
-
-
-
-
- Easy Contact Forms Export 1.1.0 - Information Disclosure Vulnerability
-
- 19013
-
- UNKNOWN
-
-
-
-
-
- Plugin Newsletter 1.5 - Remote File Disclosure Vulnerability
-
- 82703
- 2012-3588
- 49464
- 19018
- http://packetstormsecurity.org/files/113413/
-
- UNKNOWN
-
-
-
-
-
- RBX Gallery 2.1 - uploader.php File Upload PHP Code Execution
-
- 82796
- 2012-3575
- 49463
- 19019
- http://packetstormsecurity.com/files/113414/
- http://xforce.iss.net/xforce/xfdb/76170
-
- UPLOAD
-
-
-
-
-
- Simple Download Button Shortcode 1.0 - Remote File Disclosure
-
- 19020
-
- UNKNOWN
-
-
-
-
-
- Thinkun Remind 1.1.3 - Remote File Disclosure
-
- 19021
-
- UNKNOWN
-
-
-
-
-
- Tinymce Thumbnail Gallery 1.0.7 - download-image.php href Parameter Traversal Arbitrary File Access
-
- 82706
- 49460
- 19022
- http://packetstormsecurity.org/files/113417/
-
- UNKNOWN
-
-
-
-
-
- wpStoreCart 2.5.27-2.5.29 - Arbitrary File Upload
-
- 19023
-
- UPLOAD
-
-
-
-
-
- Gallery 3.06 - gallery-plugin/upload/php.php File Upload PHP Code Execution
-
- 82661
- 18998
-
- UPLOAD
-
-
- Gallery Plugin 3.8.3 - gallery-plugin.php filename_1 Parameter Arbitrary File Access
-
- 89124
- http://packetstormsecurity.com/files/119458/
- http://www.securityfocus.com/bid/57256
- http://seclists.org/bugtraq/2013/Jan/45
-
- LFI
-
-
-
-
-
- Font Uploader 1.2.4 - Arbitrary File Upload
-
- 18994
- 82657
- 2012-3814
- http://www.securityfocus.com/bid/53853
-
- UPLOAD
-
-
-
-
-
- WP Property <= 1.38.3.2 - Non-administrative User XMLI Remote Information Disclosure
-
- 102709
-
- UNKNOWN
- 1.38.4
-
-
- WP Property <= 1.35.0 - Arbitrary File Upload
-
- 82656
- 18987
- 23651
- 49394
- http://packetstormsecurity.com/files/113274/
- exploits/unix/webapp/wp_property_upload_exec
-
- UPLOAD
-
-
-
-
-
- WP Marketplace 1.5.0-1.6.1 - Arbitrary File Upload
-
- 18988
-
- UPLOAD
-
-
- WP Marketplace 1.2.1 - File Enumeration Weakness and File Upload Vulnerabilities
-
- http://www.securityfocus.com/bid/52960
-
- UPLOAD
- 1.2.2
-
-
-
-
-
- Google Maps via Store Locator - Multiple Vulnerabilities
-
- 18989
-
- MULTI
-
-
- store-locator-le - SQL Injection
-
- 51757
-
- SQLI
- 3.8.7
-
-
-
-
-
- HTML5 AV Manager 0.2.7 - Arbitrary File Upload
-
- 18990
- http://www.securityfocus.com/bid/53804
-
- UPLOAD
-
-
-
-
-
- Foxypress 0.4.1.1-0.4.2.1 - Arbitrary File Upload
-
- http://packetstormsecurity.com/files/113576/
- http://www.securityfocus.com/bid/53805
- 18991
- 19100
- exploits/unix/webapp/php_wordpress_foxypress
-
- UPLOAD
-
-
- FoxyPress 0.4.2.5 - XSS, CSRF, SQL Injection
-
- http://packetstormsecurity.com/files/117768/
- 51109
-
- MULTI
-
-
- FoxyPress 0.4.2.5 - documenthandler.php prefix Parameter SQL Injection
-
- 86804
- 22374
- http://xforce.iss.net/xforce/xfdb/79698
-
- SQLI
-
-
- FoxyPress 0.4.2.5 - foxypress-manage-emails.php id Parameter SQL Injection
-
- 86805
- 22374
- http://xforce.iss.net/xforce/xfdb/79697
-
- SQLI
-
-
- FoxyPress 0.4.2.5 - inventory-category.php Multiple Parameter SQL Injection
-
- 86806
- 22374
- http://xforce.iss.net/xforce/xfdb/79697
-
- SQLI
-
-
- FoxyPress 0.4.2.5 - reports.php Multiple Parameter XSS
-
- 86807
- 22374
- http://xforce.iss.net/xforce/xfdb/79699
-
- XSS
-
-
- FoxyPress 0.4.2.5 - foxypress-affiliate.php aff_id Parameter XSS
-
- 86808
- 22374
- http://xforce.iss.net/xforce/xfdb/79699
-
- XSS
-
-
- FoxyPress 0.4.2.5 - affiliate-management.php Multiple Parameter SQL Injection
-
- 86809
- 22374
- http://xforce.iss.net/xforce/xfdb/79697
-
- SQLI
-
-
- FoxyPress 0.4.2.5 - foxypress-manage-emails.php id Parameter XSS
-
- 86810
- 22374
- http://xforce.iss.net/xforce/xfdb/79699
-
- XSS
-
-
- FoxyPress 0.4.2.5 - order-management.php status Parameter XSS
-
- 86811
- 22374
- http://xforce.iss.net/xforce/xfdb/79699
-
- XSS
-
-
- FoxyPress 0.4.2.5 - affiliate-management.php page Parameter XSS
-
- 86812
- 22374
- http://xforce.iss.net/xforce/xfdb/79699
-
- XSS
-
-
- FoxyPress 0.4.2.5 - foxypress-affiliate.php url Parameter Arbitrary Site Redirect
-
- 86813
- 22374
- http://xforce.iss.net/xforce/xfdb/79700
-
- UNKNOWN
-
-
- FoxyPress 0.4.2.5 - Multiple CSV File Direct Request Information Disclosure
-
- 86814
- 22374
- http://xforce.iss.net/xforce/xfdb/79701
-
- UNKNOWN
-
-
- FoxyPress 0.4.2.5 - ajax.php Access Restriction Multiple Command Execution
-
- 86815
- 22374
- http://xforce.iss.net/xforce/xfdb/79703
-
- RCE
-
-
- FoxyPress 0.4.2.5 - Multiple Script Direct Request Path Disclosure
-
- 86816
- 22374
- http://xforce.iss.net/xforce/xfdb/79704
-
- FPD
-
-
- FoxyPress 0.4.2.5 - Multiple Object Deletion CSRF
-
- 86817
- 22374
- http://xforce.iss.net/xforce/xfdb/79702
-
- CSRF
-
-
- FoxyPress 0.4.2.5 - documenthandler.php File Upload Arbitrary Code Execution
-
- 86818
- 22374
- http://xforce.iss.net/xforce/xfdb/79697
-
- RCE
-
-
-
-
-
- Track That Stat <= 1.0.8 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112722/
- http://www.securityfocus.com/bid/53551
-
- XSS
-
-
-
-
-
- WP-Facethumb Gallery <= 0.1 - Reflected Cross Site Scripting
-
- http://packetstormsecurity.com/files/112658/
-
- XSS
-
-
-
-
-
- Survey And Quiz Tool <= 2.9.2 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112685/
-
- XSS
-
-
-
-
-
- WP Statistics <= 2.2.4 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112686/
-
- XSS
-
-
-
-
-
- WP Easy Gallery <= 2.7 - CSRF
-
- 49190
- https://plugins.trac.wordpress.org/changeset?reponame=&old=669527@wp-easy-gallery&new=669527@wp-easy-gallery
-
- CSRF
- 2.7.3
-
-
- WP Easy Gallery 2.7 - admin/overview.php galleryId Parameter SQL Injection
-
- 105012
-
- SQLI
- 2.7.1
-
-
- WP Easy Gallery 2.7 - admin/add-images.php Multiple Parameter SQL Injection
-
- 105013
-
- SQLI
- 2.7.1
-
-
- WP Easy Gallery 2.7 - Multiple Admin Function CSRF
-
- 105014
-
- CSRF
- 2.7.1
-
-
- WP Easy Gallery <= 1.7 - Cross Site Scripting
-
- 49190
- http://packetstormsecurity.com/files/112687/
-
- XSS
- 2.7.3
-
-
-
-
-
- Subscribe2 <= 8.0 - Cross Site Scripting
-
- 49189
- http://packetstormsecurity.com/files/112688/
- http://www.securityfocus.com/bid/53538
-
- XSS
- 8.1
-
-
-
-
-
- Soundcloud Is Gold <= 2.1 - 'action' Parameter Cross Site Scripting Vulnerability
-
- 49188
- http://packetstormsecurity.com/files/112689/
- http://www.securityfocus.com/bid/53537
- 2012-6624
- 81919
-
- XSS
-
-
-
-
-
- Sharebar <= 1.2.5 - sharebar-admin.php page Parameter XSS
-
- 98078
- http://packetstormsecurity.com/files/123365/
-
- XSS
-
-
- Sharebar <= 1.2.5 - Button Manipulation CSRF
-
- 94843
- 2013-3491
- 52948
- http://www.securityfocus.com/bid/60956
-
- CSRF
-
-
- Sharebar 1.2.3 - wp-admin/options-general.php status Parameter XSS
-
- 81465
- 48908
-
- XSS
-
-
- Sharebar <= 1.2.1 - SQL Injection / Cross Site Scripting
-
- http://packetstormsecurity.com/files/112690/
-
- MULTI
- 1.2.2
-
-
-
-
-
- Share And Follow <= 1.80.3 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112691/
-
- XSS
-
-
-
-
-
- SABRE <= 1.2.0 - Cross Site Scripting
-
- 2012-2916
- 82269
- http://packetstormsecurity.com/files/112692/
-
- XSS
- 1.2.2
-
-
-
-
-
- Pretty Link Lite <= 1.5.2 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112693/
-
- XSS
-
-
- Pretty Link Lite <= 1.6.1 - Cross Site Scripting
-
- 50980
-
- XSS
-
-
- pretty-link - XSS in SWF
-
- http://seclists.org/bugtraq/2013/Feb/100
- http://packetstormsecurity.com/files/120433/
- 2013-1636
-
- XSS
-
-
-
-
-
- Newsletter Manager <= 1.0.2 - Cross Site Scripting
-
- 49183
- http://packetstormsecurity.com/files/112694/
- 2012-6628
- 102186
- 102548
- 102549
- 102550
- 81920
-
- XSS
- 1.0.2
-
-
- Newsletter Manager 1.0.2 - Cross Site Scripting & Cross-Site Request Forgery
-
- 49152
- 2012-6627
- 2012-6629
-
- MULTI
-
-
-
-
-
- Network Publisher <= 5.0.1 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112695/
-
- XSS
-
-
-
-
-
- LeagueManager <= 3.7 - wp-admin/admin.php Multiple Parameter XSS
-
- 82266
- 49949
- http://packetstormsecurity.com/files/112698/
- http://www.securityfocus.com/bid/53525
- http://xforce.iss.net/xforce/xfdb/75629
-
- XSS
-
-
- LeagueManager 3.8 - SQL Injection
-
- 91442
- 24789
- 2013-1852
-
- SQLI
-
-
-
-
-
- Leaflet <= 0.0.1 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112699/
-
- XSS
-
-
-
-
-
- PDF And Print Button Joliprint <= 1.3.0 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112700/
-
- XSS
-
-
-
-
-
- IFrame Admin Pages <= 0.1 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112701/
-
- XSS
-
-
-
-
-
- EZPZ One Click Backup <= 12.03.10 - OS Command Injection
-
- 106511
- 2014-3114
- http://www.openwall.com/lists/oss-security/2014/05/01/11
-
- RCE
-
-
- EZPZ One Click Backup <= 12.03.10 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112705/
-
- XSS
-
-
-
-
-
- Dynamic Widgets <= 1.5.1 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112706/
-
- XSS
-
-
-
-
-
- Download Monitor <= 3.3.6.1 - wp-admin/admin.php Multiple Parameter XSS (Note: This plugin changed its version numbering, this may produce false positive)
-
- 95613
- 2013-5098
- 2013-3262
- 53116
- http://www.securityfocus.com/bid/61407
- http://xforce.iss.net/xforce/xfdb/85921
-
- XSS
- 3.3.6.2
-
-
- Download Monitor <= 3.3.5.7 - index.php dlsearch Parameter XSS (Note: This plugin changed its version numbering, this may produce false positive)
-
- 85319
- 2012-4768
- 50511
- http://www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.html
-
- XSS
- 3.3.5.9
-
-
- Download Monitor <= 3.3.5.4 - Cross Site Scripting (Note: This plugin changed its version numbering, this may produce false positive)
-
- http://packetstormsecurity.com/files/112707/
-
- XSS
-
-
- Download Monitor 2.0.6 - wp-download_monitor/download.php id Parameter SQL Injection (Note: This plugin changed its version numbering, this may produce false positive)
-
- 44616
- 2008-2034
- 29876
-
- SQLI
- 2.0.8
-
-
-
-
-
- Download Manager 2.5.8 - Download Package file Parameter Stored XSS
-
- 101143
- 2013-7319
- 55969
- http://www.securityfocus.com/bid/64159
-
- XSS
- 2.5.9
-
-
- Download Manager <= 2.2.2 - admin.php cid Parameter XSS
-
- 81449
- 48927
- http://packetstormsecurity.com/files/112708/
-
- XSS
- 2.2.3
-
-
-
-
-
- Code Styling Localization <= 1.99.17 - Cross Site Scripting
-
- 49037
- http://packetstormsecurity.com/files/112709/
-
- XSS
- 1.99.20
-
-
-
-
-
- Catablog <= 1.6 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112619/
-
- XSS
-
-
-
-
-
- Bad Behavior <= 2.24 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112619/
-
- XSS
-
-
-
-
-
- BulletProof Security <= .47 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112618/
-
- XSS
- .47.1
-
-
- BulletProof Security - Security Log Script Insertion Vulnerability
-
- 95928
- 95929
- 95930
- 2013-3487
- 53614
-
- XSS
- .49
-
-
-
-
-
- Better WP Security 3.6.3 - Online Backup Storage current_time Function Brute Force Disclosure
-
- 103358
- http://packetstormsecurity.com/files/125219/
-
- XSS
-
-
- Better WP Security 3.6.3 - /wp-admin/admin-ajax.php license Parameter Stored XSS Weakness
-
- 103357
- http://packetstormsecurity.com/files/125219/
-
- XSS
-
-
- Better WP Security 3.5.5 - inc/admin/content.php id_specialfile Parameter Stored XSS
-
- 101788
-
- XSS
- 3.5.6
-
-
- Better WP Security <= 3.5.3 - inc/secure.php logevent Function URL Handling Stored XSS
-
- 95884
- 54299
- 27290
- http://packetstormsecurity.com/files/122615/
- https://github.com/wpscanteam/wpscan/issues/251
- http://www.securityfocus.com/archive/1/527634/30/0/threaded
-
- XSS
- 3.5.4
-
-
- Better WP Security 3.4.3 - Multiple XSS
-
- http://seclists.org/bugtraq/2012/Oct/9
-
- XSS
- 3.4.4
-
-
- Better WP Security <= 3.2.4 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112617/
-
- XSS
- 3.2.5
-
-
-
-
-
- Custom Contact Forms <= 5.0.0.1 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112616/
-
- XSS
-
-
-
-
-
- 2-Click-Socialmedia-Buttons <= 0.34 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112615/
-
- XSS
-
-
- 2-Click-Socialmedia-Buttons <= 0.32.2 - Cross Site Scripting
-
- 49181
- http://packetstormsecurity.com/files/112711/
-
- XSS
- 0.35
-
-
-
-
-
- Login With Ajax - Cross Site Scripting
-
- 2012-2759
- 81712
- 49013
- http://www.secureworks.com/cyber-threat-intelligence/advisories/SWRX-2012-003/
-
- XSS
- 3.0.4.1
-
-
- Login With Ajax - Cross-Site Request Forgery Vulnerability
-
- 93031
- 2013-2707
- 52950
-
- CSRF
- 3.1
-
-
-
-
-
- Media Library Categories <= 1.0.6 - SQL Injection Vulnerability
-
- 17628
-
- SQLI
-
-
- Media Library Categories <= 1.1.1 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112697/
- 2012-6630
- 81916
- 109601
-
- SQLI
-
-
-
-
-
- FCKeditor Deans With Pwwangs Code <= 1.0.0 - Remote Shell Upload
-
- http://packetstormsecurity.com/files/111319/
-
- RFI
-
-
-
-
-
- Zingiri Web Shop 2.6.5 - fwkfor/ajax/uploadfilexd.php Unspecified Issue
-
- 103554
-
- UNKNOWN
- 2.6.6
-
-
- Zingiri Web Shop 2.6.4 - mform.php Unspecified Issue
-
- 101717
- 56230
-
- UNKNOWN
- 2.6.5
-
-
- Zingiri Web Shop 2.5.0 - ajaxfilemanager.php path Parameter File Upload Arbitrary Code Execution
-
- 87833
- http://packetstormsecurity.com/files/118318/
- http://www.securityfocus.com/bid/56659
- http://xforce.iss.net/xforce/xfdb/80257
-
- RCE
-
-
- Zingiri Web Shop 2.4.3 - Shell Upload
-
- http://packetstormsecurity.com/files/113668/
-
- UPLOAD
-
-
- Zingiri Web Shop - Cookie SQL Injection Vulnerability
-
- 49398
-
- SQLI
- 2.4.8
-
-
- Zingiri Web Shop <= 2.4.0 - zing.inc.php page Parameter XSS
-
- 81492
- 2012-6506
- 18787
- 48991
- http://www.securityfocus.com/bid/53278
- http://xforce.iss.net/xforce/xfdb/75178
-
- XSS
- 2.4.2
-
-
- Zingiri Web Shop <= 2.4.0 - onecheckout.php notes Parameter XSS
-
- 81493
- 2012-6506
- 18787
- 48991
- http://www.securityfocus.com/bid/53278
- http://xforce.iss.net/xforce/xfdb/75179
-
- XSS
- 2.4.2
-
-
- Zingiri Web Shop <= 2.3.5 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112684/
-
- XSS
-
-
-
-
-
- Organizer 1.2.1 - Cross Site Scripting / Path Disclosure
-
- http://packetstormsecurity.com/files/112086/
- http://packetstormsecurity.com/files/113800/
-
- MULTI
-
-
-
-
-
- Zingiri Tickets 2.1.2 - Unspecified Issue
-
- 105015
-
- UNKNOWN
- 2.1.3
-
-
- Zingiri Tickets - File Disclosure
-
- http://packetstormsecurity.com/files/111904/
-
- UNKNOWN
-
-
-
-
-
- CMS Tree Page View 1.2.4 - Page Creation CSRF
-
- 91270
- 52581
-
- CSRF
- 1.2.5
-
-
- CMS Tree Page View 0.8.8 - XSS vulnerability
-
- 80573
- 48510
- https://www.htbridge.com/advisory/HTB23083
- http://www.securityfocus.com/bid/52708
- http://xforce.iss.net/xforce/xfdb/74337
-
- XSS
- 0.8.9
-
-
-
-
-
- All-in-One Event Calendar 1.4 - Multiple XSS vulnerabilities
-
- http://seclists.org/bugtraq/2012/Apr/70
-
- XSS
-
-
- All-in-One Event Calendar 1.9 - wp-admin/post-new.php Multiple Parameter XSS
-
- 96271
- 54038
- http://www.firefart.net/sql-injection-and-xss-in-all-in-one-event-calendar-wordpress-plugin/
-
- XSS
- 1.10
-
-
- All-in-One Event Calendar 1.9 - index.php Multiple Parameter SQL Injection
-
- 96272
- 54038
- http://www.firefart.net/sql-injection-and-xss-in-all-in-one-event-calendar-wordpress-plugin/
-
- SQLI
- 1.10
-
-
-
-
-
- Buddypress <= 1.9.1 - Crafted bp_new_group_id Cookie Arbitrary Group Manipulation
-
- 103308
- 2014-1889
- 56950
- 31571
- http://packetstormsecurity.com/files/125213/
-
- UNKNOWN
- 1.9.2
-
-
- Buddypress <= 1.9.1 - groups/create/step/group-details/ Group Name Field Stored XSS
-
- 103307
- 2014-1888
- 56950
- http://packetstormsecurity.com/files/125212/
-
- XSS
- 1.9.2
-
-
- BuddyPress 1.7.1 - bp-activity-classes.php Multiple Parameter SQL Injection
-
- 104761
-
- SQLI
- 1.7.2
-
-
- BuddyPress 1.7.1 - bp-blogs-classes.php Multiple Parameter SQL Injection
-
- 104761
-
- SQLI
- 1.7.2
-
-
- BuddyPress 1.7.1 - bp-friends/bp-friends-classes.php Multiple Parameter SQL Injection
-
- 104760
-
- SQLI
- 1.7.2
-
-
- BuddyPress 1.7.1 - bp-core/bp-core-classes.php Multiple Parameter SQL Injection
-
- 104759
-
- SQLI
- 1.7.2
-
-
- BuddyPress 1.7.1 - bp-core/bp-core-functions.php page_ids Parameter SQL Injection
-
- 104758
-
- SQLI
- 1.7.2
-
-
- BuddyPress 1.7.1 - bp-core/bp-core-filters.php user_ids Parameter SQL Injection
-
- 104757
-
- SQLI
- 1.7.2
-
-
- BuddyPress 1.7.1 - bp-core/bp-core-cache.php object_ids Parameter SQL Injection
-
- 104755
-
- SQLI
- 1.7.2
-
-
- Buddypress - player.swf / jwplayer.swf playerready Parameter XSS
-
- 88886
- http://packetstormsecurity.com/files/119020/
- http://xforce.iss.net/xforce/xfdb/80840
-
- XSS
-
-
- Buddypress <= 1.5.4 - wp-load.php exclude Parameter SQL Injection
-
- 2012-2109
- 80763
- 18690
-
- SQLI
- 1.5.5
-
-
- BuddyPress 1.2.9 - groups/test-group/activity/ activity_ids Parameter SQL Injection
-
- 104756
-
- SQLI
- 1.2.10
-
-
-
-
-
- Register Plus Redux <= 3.8.3 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/111367/
-
- XSS
-
-
-
-
-
- Magn WP Drag and Drop <= 1.1.4 - Upload Shell Upload Vulnerability
-
- http://packetstormsecurity.com/files/110103/
-
- UPLOAD
-
-
-
-
-
- Kish Guest Posting 1.0 - Arbitrary File Upload
-
- 18412
-
- RFI
-
-
-
-
-
- AllWebMenus Shell Upload <= 1.1.9 - Shell Upload
-
- http://packetstormsecurity.com/files/108946/
-
- RFI
-
-
- AllWebMenus 1.1.3 - Remote File Inclusion
-
- 2011-3981
- 75615
- 17861
- 46068
-
- 1.1.4
- RFI
-
-
-
-
-
- Shortcode Redirect <= 1.0.01 - Stored Cross Site Scripting
-
- http://packetstormsecurity.com/files/108914/
-
- XSS
-
-
-
-
-
- uCan Post <= 1.0.09 - Stored XSS
-
- 18390
-
- XSS
-
-
-
-
-
- WP Cycle Playlist - Multiple Vulnerabilities
-
- http://1337day.com/exploit/17396
-
- MULTI
-
-
-
-
-
- myEASYbackup 1.0.8.1 - Directory Traversal
-
- http://packetstormsecurity.com/files/108711/
-
- UNKNOWN
-
-
-
-
-
- Count per Day 3.2.5 - wp-admin/index.php daytoshow Parameter XSS
-
- 90893
- 52436
- http://packetstormsecurity.com/files/120649/
-
- XSS
-
-
- Count per Day 3.2.5 - counter.php HTTP Referer Header XSS
-
- 91491
- 24859
- http://packetstormsecurity.com/files/120870/
-
- XSS
-
-
- Count Per Day 3.2.3 - notes.php Malformed Requests Remote DoS
-
- 90833
- http://packetstormsecurity.com/files/120631/
- http://seclists.org/fulldisclosure/2013/Mar/43
-
- UNKNOWN
-
-
- Count Per Day 3.2.3 - Multiple Script Direct Request Path Disclosure
-
- 90832
- http://packetstormsecurity.com/files/120631/
- http://seclists.org/fulldisclosure/2013/Mar/43
-
- FPD
-
-
- Count Per Day 3.2.3 - notes.php note Parameter XSS
-
- 84933
- 20862
- 50450
- http://packetstormsecurity.com/files/115904/
-
- XSS
-
-
- Count Per Day 3.2.2 - notes.php note Parameter XSS
-
- 84920
- 50419
-
- XSS
- 3.2.3
-
-
- Count Per Day 3.1.1 - userperspan.php Multiple Parameter XSS
-
- 83491
- 2012-3434
- 49692
- http://packetstormsecurity.com/files/114787/
- http://www.securityfocus.com/bid/54258
-
- XSS
- 3.2
-
-
- Count Per Day <= 3.1 - download.php f Parameter Traversal Arbitrary File Access
-
- 78270
- 18355
- 47529
- http://xforce.iss.net/xforce/xfdb/72385
- http://packetstormsecurity.org/files/108631/
-
- UNKNOWN
- 3.1.1
-
-
- Count Per Day <= 3.1 - map.php map Parameter XSS
-
- 78271
- 18355
- 47529
- http://xforce.iss.net/xforce/xfdb/72385
- http://packetstormsecurity.org/files/108631/
-
- XSS
- 3.1.1
-
-
- Count per Day <= 2.17 - SQL Injection Vulnerability
-
- 75598
- 17857
- 46051
-
- SQLI
- 3.0
-
-
-
-
-
- WP-AutoYoutube <= 0.1 - Blind SQL Injection Vulnerability
-
- http://1337day.com/exploit/17368
-
- SQLI
-
-
-
-
-
- Age Verification <= 0.4 - Open Redirect
-
- 2012-6499
- 82584
- 18350
-
- REDIRECT
-
-
-
-
-
- Yousaytoo Auto Publishing <= 1.0 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/108470/
-
- XSS
-
-
-
-
-
- Pay With Tweet <= 1.1 - Multiple Vulnerabilities
-
- 18330
-
- MULTI
-
-
-
-
-
- Whois Search <= 1.4.2 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/108271/
-
- XSS
-
-
-
-
-
- UPM-POLLS 1.0.4 - BLIND SQL injection
-
- 18231
-
- SQLI
-
-
-
-
-
- Disqus <= 2.75 - Remote Code Execution Vuln
-
- http://blog.sucuri.net/2014/06/anatomy-of-a-remote-code-execution-bug-on-disqus.html
-
- RCE
- 2.76
-
-
- Disqus Comment System <= 2.68 - Reflected Cross-Site Scripting (XSS)
-
- http://www.ethicalhack3r.co.uk/security/wordpress-plugin-disqus-comment-system-xss/
-
- XSS
- 2.69
-
-
- Disqus Blog Comments - Blind SQL Injection Vulnerability
-
- 85935
- 20913
-
- SQLI
-
-
-
-
-
- Google reCAPTCHA <= 3.1.3 - Reflected XSS Vulnerability
-
- http://security-sh3ll.blogspot.com/2011/12/google-recaptcha-wordpress-plugin.html
-
- XSS
- 3.1.4
-
-
-
-
-
- Link Library 5.8.0.9 - Multiple Unspecified Issues
-
- 102842
-
- MULTI
- 5.8.1
-
-
- Link Library 5.1.6 - link-library-ajax.php Multiple Parameter SQL Injection
-
- 102804
-
- SQLI
- 5.1.7
-
-
- Link Library 5.0.8 - wp-content/plugins/link-library/tracker.php id Parameter XSS
-
- 74561
- 45588
-
- XSS
- 5.0.9
-
-
- Link Library 5.0.8 - wp-content/plugins/link-library/tracker.php id Parameter SQL Injection
-
- 74562
- 45588
-
- SQLI
- 5.0.9
-
-
- Link Library <= 5.2.1 - SQL Injection
-
- 84579
- 17887
-
- SQLI
- 5.7.9.7
-
-
-
-
-
- CevherShare 2.0 - SQL Injection Vulnerability
-
- 17891
-
- SQLI
-
-
-
-
-
- meenews 5.1 - Cross-Site Scripting Vulnerabilities
-
- http://seclists.org/bugtraq/2011/Nov/151
-
- XSS
-
-
-
-
-
- Click Desk Live Support Chat - Cross Site Scripting Vulnerability
-
- http://seclists.org/bugtraq/2011/Nov/148
-
- XSS
- 2.0
-
-
-
-
-
- adminimize 1.7.21 - 'page' Parameter Cross Site Scripting Vulnerability
-
- 2011-4926
- 77472
- http://www.securityfocus.com/bid/50745
- http://seclists.org/bugtraq/2011/Nov/135
-
- XSS
- 1.7.22
-
-
-
-
-
- Advanced Text Widget <= 2.0.0 - Cross Site Scripting Vulnerability
-
- http://seclists.org/bugtraq/2011/Nov/133
-
- XSS
-
-
-
-
-
- MM Duplicate <= 1.2 - SQL Injection Vulnerability
-
- 17707
-
- SQLI
-
-
-
-
-
- Menu Creator <= 1.1.7 - SQL Injection Vulnerability
-
- 17689
-
- SQLI
-
-
-
-
-
- Allow PHP in Posts and Pages <= 2.0.0.RC2 - SQL Injection Vulnerability
-
- 17688
-
- SQLI
- 2.1.0
-
-
-
-
-
- Global Content Blocks <= 1.2 - SQL Injection Vulnerability
-
- 17687
-
- SQLI
-
-
-
-
-
- Ajax Gallery <= 3.0 - SQL Injection Vulnerability
-
- 17686
-
- SQLI
-
-
-
-
-
- WP DS FAQ <= 1.3.2 - ajax.php id Parameter SQL Injection
-
- 74574
- 45640
- 17683
-
- SQLI
-
-
-
-
-
- WP DS FAQ Plus 1.0.12 - Multiple Unspecified Issues
-
- 106614
-
- MULTI
- 1.0.13
-
-
- WP DS FAQ Plus 1.0.11 - Multiple Unspecified Issues
-
- 106615
-
- MULTI
- 1.0.12
-
-
- WP DS FAQ Plus 1.0.3 - Multiple Unspecified CSRF
-
- 106618
-
- CSRF
- 1.0.3
-
-
- WP DS FAQ Plus - Unspecified SQL Injection
-
- 106724
-
- SQLI
- 1.0.0
-
-
-
-
-
- OdiHost Newsletter <= 1.0 - SQL Injection Vulnerability
-
- 17681
-
- SQLI
-
-
-
-
-
- Easy Contact Form Lite <= 1.0.7 - SQL Injection Vulnerability
-
- 17680
-
- SQLI
-
-
-
-
-
- WP Symposium 13.04 - invite.php u Parameter Arbitrary Site Redirect
-
- 92274
- 2013-2694
- 52925
-
- REDIRECT
-
-
- WP Symposium 13.02 - wp-symposium/invite.php u Parameter XSS
-
- 92275
- 2013-2695
- 52864
-
- XSS
- 13.04
-
-
- WP Symposium <= 12.09 - ajax/symposium_groups_functions.php gid Parameter SQL Injection
-
- 89455
- 50674
- http://www.securityfocus.com/bid/57478
- http://ceriksen.com/2013/02/18/wp-symposium-multiple-sql-injection/
-
- SQLI
- 12.12
-
-
- WP Symposium <= 12.09 - index.php uid Parameter SQL Injection
-
- 89456
- 50674
- http://www.securityfocus.com/bid/57478
- http://ceriksen.com/2013/02/18/wp-symposium-multiple-sql-injection/
-
- SQLI
- 12.12
-
-
- WP Symposium <= 12.09 - ajax/symposium_profile_functions.php friend_to Parameter SQL Injection
-
- 89457
- 50674
- http://www.securityfocus.com/bid/57478
- http://ceriksen.com/2013/02/18/wp-symposium-multiple-sql-injection/
-
- SQLI
- 12.12
-
-
- WP Symposium <= 12.09 - ajax/symposium_forum_functions.php Multiple Parameter SQL Injection
-
- 89458
- 50674
- http://www.securityfocus.com/bid/57478
- http://ceriksen.com/2013/02/18/wp-symposium-multiple-sql-injection/
-
- SQLI
- 12.12
-
-
- WP Symposium <= 12.09 - get_album_item.php size Parameter SQL Injection
-
- 89459
- 50674
- http://www.securityfocus.com/bid/57478
- http://ceriksen.com/2013/02/18/wp-symposium-multiple-sql-injection/
-
- SQLI
- 12.12
-
-
- WP Symposium <= 12.07.07 - ajax/symposium_ajax_functions.php Authentication Bypass
-
- 83696
- 49791
-
- AUTHBYPASS
-
-
- WP Symposium <= 12.06.16 - ajax/symposium_forum_functions.php tid Parameter SQL Injection
-
- 83662
- 49534
-
- SQLI
- 12.07.01
-
-
- WP Symposium <= 12.06.16 - ajax/symposium_group_functions.php uid1 Parameter SQL Injection
-
- 83663
- 49534
-
- SQLI
- 12.07.01
-
-
- WP Symposium <= 12.06.16 - ajax/symposium_bar_functions.php chat_to Parameter SQL Injection
-
- 83668
- 49534
-
- SQLI
- 12.07.01
-
-
- WP Symposium <= 12.06.16 - ajax/symposium_mail_functions.php Multiple Parameter SQL Injection
-
- 83675
- 49534
-
- SQLI
- 12.07.01
-
-
- WP Symposium <= 11.11.26 - uploadify/upload_admin_avatar.php File Upload Remote PHP Code Execution
-
- 78041
- 2011-5051
- 46097
- http://xforce.iss.net/xforce/xfdb/72012
-
- RCE
- 11.12.24
-
-
- WP Symposium <= 11.11.26 - uploadify/upload_profile_avatar.php File Upload Remote PHP Code Execution
-
- 78042
- 2011-5051
- 46097
- http://xforce.iss.net/xforce/xfdb/72012
-
- RCE
- 11.12.24
-
-
- WP Symposium <= 11.11.26 - uploadify/get_profile_avatar.php uid Parameter XSS
-
- 77634
- 2011-3841
- 47243
- http://www.securityfocus.com/bid/51017
- http://xforce.iss.net/xforce/xfdb/71748
-
- XSS
- 11.12.08
-
-
- WP Symposium <= 0.64 - uploadify/get_profile_avatar.php uid Parameter SQL Injection
-
- 74664
- 47243
- 17679
-
- SQLI
- 11.08.18
-
-
-
-
-
- File Groups <= 1.1.2 - SQL Injection Vulnerability
-
- 17677
-
- SQLI
-
-
-
-
-
- IP-Logger <= 3.0 - SQL Injection Vulnerability
-
- 17673
-
- SQLI
-
-
-
-
-
- Beer Recipes 1.0 - XSS
-
- 17453
-
- SQLI
-
-
-
-
-
- Is-human <= 1.4.2 - Remote Command Execution Vulnerability
-
- 17299
-
- RCE
-
-
-
-
-
- EditorMonkey - (FCKeditor) Arbitrary File Upload
-
- 17284
-
- UPLOAD
-
-
-
-
-
- SermonBrowser 0.43 - SQL Injection
-
- 17214
-
- SQLI
-
-
-
-
-
- Ajax Category Dropdown 0.1.5 - Multiple Vulnerabilities
-
- 17207
-
- MULTI
-
-
-
-
-
- WP Custom Pages 0.5.0.1 - LFI Vulnerability
-
- 17119
-
- LFI
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
- GRAND Flash Album Gallery 2.70- "s" Cross-Site Scripting Vulnerability
-
- 93714
- 2013-3261
- 53111
-
- XSS
- 2.72
-
-
- GRAND Flash Album Gallery 2.55 - "gid" SQL Injection Vulnerability
-
- 93087
- 53356
-
- SQLI
- 2.56
-
-
- GRAND Flash Album Gallery - Multiple Vulnerabilities
-
- 51100
-
- MULTI
- 2.17
-
-
- GRAND Flash Album Gallery 1.9.0 and 2.0.0 - Multiple Vulnerabilities
-
- 51601
- http://packetstormsecurity.com/files/117665/
- http://www.waraxe.us/advisory-94.html
-
- MULTI
-
-
- GRAND Flash Album Gallery <= 1.71 - wp-admin/admin.php skin Parameter XSS
-
- 81923
- http://packetstormsecurity.com/files/112704/
-
- XSS
- 1.76
-
-
- GRAND Flash Album Gallery <= 1.56 - XSS Vulnerability
-
- http://seclists.org/bugtraq/2011/Nov/186
-
- XSS
-
-
- GRAND Flash Album Gallery 0.55 - lib/hitcounter.php pid Parameter SQL Injection
-
- 71072
- 43648
- 16947
-
- SQLI
-
-
- GRAND Flash Album Gallery 0.55 - admin/news.php want2Read Parameter Traversal Arbitrary File Access
-
- 71073
- 43648
- 16947
-
- UNKNOWN
-
-
-
-
-
- PHP Speedy <= 0.5.2 - (admin_container.php) Remote Code Exec Exploit
-
- 16273
-
- RCE
-
-
-
-
-
- OPS Old Post Spinner 2.2.1 - LFI Vulnerability
-
- 16251
-
- LFI
-
-
-
-
-
- jQuery Mega Menu 1.0 - Local File Inclusion
-
- 16250
-
- LFI
-
-
-
-
-
- IWantOneButton 3.0.1 - Multiple Vulnerabilities
-
- 16236
-
- MULTI
-
-
-
-
-
- WP Forum Server <= 1.7.3 - wpf-insert.php edit_post_id Parameter SQL Injection
-
- 75463
- 2012-6625
- 45974
- http://packetstormsecurity.com/files/112703/
-
- SQLI
- 1.7.4
-
-
- WP Forum Server <= 1.7.3 - fs-admin/wpf-add-forum.php groupid Parameter XSS
-
- 102185
- 2012-6623
- 49167
- http://packetstormsecurity.com/files/112703/
- http://www.securityfocus.com/bid/65215
-
- XSS
-
-
- WP Forum Server <= 1.7.3 - fs-admin/fs-admin.php Multiple Parameter XSS
-
- 81914
- 2012-6622
- 49155
- http://packetstormsecurity.com/files/112703/
-
- XSS
-
-
- WP Forum Server <= 1.7 - SQL Injection Vulnerability
-
- 17828
-
- SQLI
-
-
- WP Forum Server 1.6.5 - feed.php topic Parameter SQL Injection
-
- 70994
- 2011-1047
- 43306
- 16235
- http://www.securityfocus.com/bid/46360
- http://www.securityfocus.com/bid/46362
-
- SQLI
-
-
- WP Forum Server 1.6.5 - index.php Multiple Parameter SQL Injection
-
- 70993
- 2011-1047
- 43306
- 16235
- http://www.securityfocus.com/bid/46362
-
- SQLI
-
-
-
-
-
- Relevanssi 3.2 - Unspecified SQL Injection
-
- 104014
- 56641
- http://www.securityfocus.com/bid/65960
-
- SQLI
- 3.3
-
-
- Relevanssi 2.7.2 - Stored XSS Vulnerability
-
- 71236
- 43461
- 16233
-
- XSS
- 2.7.3
-
-
-
-
-
- GigPress 2.1.10 - Stored XSS Vulnerability
-
- 16232
-
- XSS
-
-
-
-
-
- Comment Rating 2.9.32 - Security Bypass Weakness and SQL Injection
-
- 90676
- 24552
- 52348
- http://packetstormsecurity.com/files/120569/
-
- MULTI
-
-
- Comment Rating 2.9.23 - Multiple Vulnerabilities
-
- 71044
- 43406
- 16221
-
- MULTI
- 2.9.24
-
-
-
-
-
- Z-Vote 1.1 - SQL Injection Vulnerability
-
- 16218
-
- SQLI
-
-
-
-
-
- User Photo - Component Remote File Upload Vulnerability
-
- 2013-1916
- 16181
- 71071
-
- UPLOAD
- 0.9.5
-
-
-
-
-
- Enable Media Replace - Multiple Vulnerabilities
-
- 16144
-
- MULTI
-
-
-
-
-
- Mingle Forum <= 1.0.32.1 - Cross Site Scripting / SQL Injection
-
- http://packetstormsecurity.com/files/108915/
-
- MULTI
-
-
- Mingle Forum <= 1.0.31 - SQL Injection Vulnerability
-
- 17894
-
- SQLI
-
-
- Mingle Forum <= 1.0.26 - Multiple Vulnerabilities
-
- 15943
-
- MULTI
-
-
- Mingle Forum <= 1.0.33 - Cross Site Scripting
-
- 49171
- http://packetstormsecurity.com/files/112696/
-
- XSS
- 1.0.33.2
-
-
- Mingle Forum 1.0.33.3 - fs-admin.php togroupusers Parameter XSS
-
- 90432
- 2013-0734
- 52167
-
- XSS
- 1.0.34
-
-
- Mingle Forum 1.0.33.3 - wpf.class.php search_words Parameter XSS
-
- 90433
- 2013-0734
- 52167
-
- XSS
- 1.0.34
-
-
- Mingle Forum 1.0.33.3 - wpf.class.php Multiple Parameter SQL Injection
-
- 90434
- 2013-0735
- 52167
-
- SQLI
- 1.0.34
-
-
- Mingle Forum 1.0.35 - Privilege Escalation CSRF
-
- 96905
- 2013-0736
- 47687
-
- CSRF
-
-
-
-
-
- Accept Signups 0.1 - XSS
-
- 15808
-
- XSS
-
-
-
-
-
- Events Manager Extended - Persistent XSS Vulnerability
-
- 14923
-
- XSS
-
-
-
-
-
- NextGEN Smooth Gallery - Blind SQL Injection Vulnerability
-
- 14541
-
- SQLI
-
-
- NextGen Smooth Gallery - XSS
-
- http://packetstormsecurity.com/files/123074/
-
- XSS
-
-
-
-
-
- myLDlinker - SQL Injection Vulnerability
-
- 14441
-
- SQLI
-
-
-
-
-
- Firestats - Remote Configuration File Download
-
- 14308
-
- UNKNOWN
-
-
-
-
-
- Simple Press - SQL Injection Vulnerability
-
- 14198
-
- SQLI
-
-
-
-
-
- Cimy Counter - Vulnerabilities
-
- 14057
-
- MULTI
-
-
-
-
-
- NextGEN Gallery & 2.0.66 - Arbitrary File Upload (the user must have upload privileges)
-
- http://packetstormsecurity.com/files/127340/wpnextgen2063-shell.txt
-
- UPLOAD
-
- 2.0.66
-
-
- NextGEN Gallery 2.0.0 - Directory Traversal
-
- 103473
- http://seclists.org/fulldisclosure/2014/Feb/171
- https://security.dxw.com/advisories/directory-traversal-in-nextgen-gallery-2-0-0/
-
- UNKNOWN
- 2.0.7
-
-
- NextGEN Gallery - SWF Vulnerable to XSS
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
- 51271
-
- XSS
- 1.9.8
-
-
- NextGEN Gallery - swfupload.swf Multiple Cross Site Scripting Vulnerabilities
-
- http://www.securityfocus.com/bid/60433
-
- MULTI
-
-
- NextGEN Gallery 1.9.12 - Arbitrary File Upload
-
- 94232
- 2013-3684
- http://wordpress.org/plugins/nextgen-gallery/changelog/
-
- UPLOAD
- 1.9.13
-
-
- NextGEN Gallery 1.9.11 - xml/json.php Crafted Request Parsing Path Disclosure
-
- 90242
- 2013-0291
- 52137
-
- UNKNOWN
-
-
- NextGEN Gallery 1.9.5 - gallerypath Parameter Stored XSS
-
- 97690
-
- XSS
-
-
- NextGEN Gallery <= 1.9.0 - admin/manage-galleries.php paged Parameter XSS
-
- 78363
- 47588
-
- XSS
- 1.9.1
-
-
- NextGEN Gallery <= 1.9.0 - admin/manage-images.php paged Parameter XSS
-
- 78364
- 47588
-
- XSS
- 1.9.1
-
-
- NextGEN Gallery <= 1.9.0 - admin/manage.php Multiple Parameter XSS
-
- 78365
- 47588
-
- XSS
- 1.9.1
-
-
- NextGEN Gallery <= 1.8.3 - wp-admin/admin.php search Parameter XSS
-
- 76576
- 46602
-
- XSS
- 1.8.4
-
-
- NextGEN Gallery <= 1.8.3 - Tag Deletion CSRF
-
- 76577
- 46602
-
- CSRF
- 1.8.4
-
-
- NextGEN Gallery <= 1.7.3 - xml/ajax.php Path Disclosure
-
- 72023
-
- FPD
- 1.7.4
-
-
- NextGEN Gallery <= 1.5.1 - xml/media-rss.php mode Parameter XSS
-
- 63574
- 12098
- 39341
- http://www.securityfocus.com/bid/39250
-
- XSS
- 1.5.2
-
-
-
-
-
- Copperleaf Photolog - SQL injection
-
- 11458
-
- SQLI
-
-
-
-
-
- Events Calendar - SQL Injection Vulnerability
-
- 10929
- 95677
-
- SQLI
- 6.7.10
-
-
- Events Calendar - wp-admin/admin.php EC_id Parameter XSS
-
- 74705
- 45717
-
- XSS
- 6.7.12a
-
-
-
-
-
- Image Manager - Shell Upload Vulnerability
-
- 10325
-
- UPLOAD
-
-
-
-
-
- WP-Cumulus <= 1.20 - Vulnerabilities
-
- 10228
-
- MULTI
-
-
- WP-Cumulus - Cross Site Scripting Vulnerabily
-
- http://seclists.org/fulldisclosure/2011/Nov/340
-
- XSS
- 1.23
-
-
-
-
-
- WP-Syntax < 0.9.10 - Remote Command Execution
-
- 9431
-
- RCE
- 0.9.10
-
-
-
-
-
- My Category Order <= 2.8 - SQL Injection Vulnerability
-
- 9150
-
- SQLI
-
-
-
-
-
- Related Sites 2.1 - Blind SQL Injection Vulnerability
-
- 9054
-
- SQLI
-
-
-
-
-
- SWF Vulnerable to XSS Bundled in Many WordPress Plugins
-
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
-
-
- DM Albums 1.9.2 - Remote File Disclosure Vulnerability
-
- 9048
-
- LFI
-
-
- DM Albums 1.9.2 - Remote File Inclusion Vuln
-
- 9043
-
- RFI
-
-
-
-
-
- Photoracer 1.0 - (id) SQL Injection Vulnerability
-
- 8961
-
- SQLI
-
-
- Photoracer <= 1.0 - SQL Injection Vulnerability
-
- 17720
-
- SQLI
-
-
- Photoracer <= 1.0 - Multiple Vulnerabilities
-
- 17731
-
- MULTI
-
-
-
-
-
- Lytebox - Local File Inclusion Vulnerability
-
- 8791
-
- LFI
-
-
-
-
-
- fMoblog 2.1 - (id) SQL Injection Vulnerability
-
- 8229
-
- SQLI
-
-
-
-
-
- Page Flip Image Gallery <= 0.2.2 - Remote FD Vuln
-
- 50902
- 2008-5752
- 7543
- 33274
- http://www.securityfocus.com/bid/32966
- http://xforce.iss.net/xforce/xfdb/47568
-
- LFI
-
-
-
-
-
-
- e-Commerce <= 3.4 - Arbitrary File Upload Exploit
-
- 6867
-
- UPLOAD
-
-
-
-
-
- Download Manager 0.2 - Arbitrary File Upload Exploit
-
- 6127
-
- UPLOAD
-
-
-
-
-
- Spreadsheet <= 0.6 - SQL Injection Vulnerability
-
- 5486
-
- SQLI
-
-
-
-
-
- Download - (dl_id) SQL Injection Vulnerability
-
- 5326
-
- SQLI
-
-
-
-
-
- Sniplets 1.1.2 - (RFI/XSS/RCE) Multiple Vulnerabilities
-
- 5194
-
- MULTI
-
-
-
-
-
- Photo album - Remote SQL Injection Vulnerability
-
- 5135
-
- SQLI
-
-
-
-
-
- Simple Forum 2.0-2.1 - SQL Injection Vulnerability
-
- 5126
-
- SQLI
-
-
- Simple Forum 1.10-1.11 - SQL Injection Vulnerability
-
- 5127
-
- SQLI
-
-
-
-
-
- st_newsletter - Remote SQL Injection Vulnerability
-
- 5053
-
- SQLI
-
-
- st_newsletter - (stnl_iframe.php) SQL Injection Vulnerability
-
- 6777
-
- SQLI
-
-
-
-
-
- Wordspew - Remote SQL Injection Vulnerability
-
- 5039
-
- SQLI
-
-
-
-
-
- dmsguestbook 1.7.0 - Multiple Remote Vulnerabilities
-
- 5035
-
- MULTI
-
-
-
-
-
- WassUp 1.4.3 - (spy.php to_date) SQL Injection Exploit
-
- 5017
-
- SQLI
-
-
-
-
-
- Adserve 0.2 - adclick.php SQL Injection Exploit
-
- 5013
-
- SQLI
-
-
-
-
-
- fGallery 2.4.1 - fimrss.php SQL Injection Vulnerability
-
- 4993
-
- SQLI
-
-
-
-
-
- WP-Cal 0.3 - editevent.php SQL Injection Vulnerability
-
- 4992
-
- SQLI
-
-
-
-
-
- plugin WP-Forum 1.7.4 - Remote SQL Injection Vulnerability
-
- 4939
-
- SQLI
-
-
- plugin WP-Forum 1.7.8 - Remote SQL Injection Vulnerability
-
- 7738
-
- SQLI
-
-
-
-
-
- wp-FileManager 1.2 - Remote Upload Vulnerability
-
- 4844
-
- UPLOAD
-
-
- wp-FileManager 1.3.0 - File Download Vulnerability
-
- 53421
- 25440
- 93446
-
- UNKNOWN
- 1.4.0
-
-
-
-
-
- PictPress <= 0.91 - Remote File Disclosure Vulnerability
-
- 4695
-
- LFI
-
-
-
-
-
- BackUp <= 0.4.2b - RFI Vulnerability
-
- 4593
-
- RFI
- 0.4.3
-
-
-
-
-
- Myflash <= 1.00 - (wppath) RFI Vulnerability
-
- 3828
-
- RFI
-
-
- Myflash - myextractXML.php path Parameter Arbitrary File Access
-
- 88260
- http://packetstormsecurity.com/files/118400/
-
- LFI
-
-
-
-
-
- plugin wordTube <= 1.43 - (wpPATH) RFI Vulnerability
-
- 3825
-
- RFI
-
-
-
-
-
- plugin wp-Table <= 1.43 - (inc_dir) RFI Vulnerability
-
- 3824
-
- RFI
-
-
-
-
-
- myGallery <= 1.4b4 - Remote File Inclusion Vulnerability
-
- 3814
-
- RFI
-
-
-
-
-
- SendIt <= 1.5.9 - Blind SQL Injection Vulnerability
-
- 17716
-
- SQLI
-
-
-
-
-
- Js-appointment <= 1.5 - SQL Injection Vulnerability
-
- 17724
-
- SQLI
-
-
-
-
-
- MM Forms Community <= 1.2.3 - SQL Injection Vulnerability
-
- 17725
-
- SQLI
-
-
- MM Forms Community 2.2.6 - Arbitrary File Upload
-
- 18997
-
- UPLOAD
-
-
-
-
-
- Super CAPTCHA <= 2.2.4 - SQL Injection Vulnerability
-
- 17728
-
- SQLI
-
-
-
-
-
- Collision Testimonials <= 3.0 - SQL Injection Vulnerability
-
- 17729
-
- SQLI
-
-
-
-
-
- Oqey Headers <= 0.3 - SQL Injection Vulnerability
-
- 17730
-
- SQLI
-
-
-
-
-
- Facebook Promotions <= 1.3.3 - SQL Injection Vulnerability
-
- 17737
-
- SQLI
-
-
-
-
-
- Evarisk 5.1.5.4 - include/lib/actionsCorrectives/activite/uploadPhotoApres.php File Upload PHP Code Execution
-
- 82960
- 49521
- http://packetstormsecurity.com/files/113638/
-
- UPLOAD
-
-
- Evarisk <= 5.1.3.6 - SQL Injection Vulnerability
-
- 17738
-
- SQLI
-
-
-
-
-
- Profiles <= 2.0RC1 - SQL Injection Vulnerability
-
- 17739
-
- SQLI
-
-
-
-
-
- mySTAT <= 2.6 - SQL Injection Vulnerability
-
- 17740
-
- SQLI
-
-
-
-
-
- SH Slideshow <= 3.1.4 - SQL Injection Vulnerability
-
- 17748
-
- SQLI
-
-
-
-
-
- iCopyright(R) Article Tools <= 1.1.4 - SQL Injection Vulnerability
-
- 17749
-
- SQLI
-
-
-
-
-
- Advertizer <= 1.0 - SQL Injection Vulnerability
-
- 17750
-
- SQLI
-
-
-
-
-
- Event Registration <= 5.44 - SQL Injection Vulnerability
-
- 17814
-
- SQLI
-
-
- Event Registration <= 5.43 - SQL Injection Vulnerability
-
- 17751
-
- SQLI
-
-
- Event Registration 5.32 - SQL Injection Vulnerability
-
- 15513
-
- SQLI
-
-
-
-
-
- Craw Rate Tracker <= 2.0.2 - SQL Injection Vulnerability
-
- 17755
-
- SQLI
-
-
-
-
-
- wp audio gallery playlist <= 0.12 - SQL Injection Vulnerability
-
- 17756
-
- SQLI
-
-
-
-
-
- yolink Search 2.5 - "s" Cross-Site Scripting Vulnerability
-
- 89756
- 52030
- http://www.securityfocus.com/bid/57665
-
- XSS
- 2.6
-
-
- yolink Search <= 1.1.4 - includes/bulkcrawl.php Multiple Parameter SQL Injection
-
- 74832
- 45801
- 17757
-
- SQLI
-
-
-
-
-
- PureHTML <= 1.0.0 - SQL Injection Vulnerability
-
- 17758
-
- SQLI
-
-
-
-
-
- Couponer <= 1.2 - SQL Injection Vulnerability
-
- 17759
-
- SQLI
-
-
-
-
-
- grapefile <= 1.1 - Arbitrary File Upload
-
- 17760
-
- UPLOAD
-
-
-
-
-
- image-gallery-with-slideshow <= 1.5 - Arbitrary File Upload / SQL Injection
-
- 17761
-
- MULTI
-
-
-
-
-
- Donation <= 1.0 - SQL Injection Vulnerability
-
- 17763
-
- SQLI
-
-
-
-
-
- WP Bannerize <= 2.8.6 - SQL Injection Vulnerability
-
- 74835
- 45811
- 17764
-
- SQLI
- 2.8.7
-
-
- WP Bannerize <= 2.8.7 - SQL Injection Vulnerability
-
- 76658
- 46236
- 17906
-
- SQLI
- 2.8.8
-
-
-
-
-
- SearchAutocomplete <= 1.0.8 - SQL Injection Vulnerability
-
- 17767
-
- SQLI
-
-
-
-
-
- VideoWhisper Video Presentation <= 1.1 - SQL Injection Vulnerability
-
- 17771
-
- SQLI
-
-
- VideoWhisper Video Presentation 3.17 - 'vw_upload.php' Arbitrary File Upload Vulnerability
-
- http://www.securityfocus.com/bid/53851
-
- UPLOAD
-
-
-
-
-
- Facebook Opengraph Meta <= 1.0 - SQL Injection Vulnerability
-
- 17773
-
- SQLI
-
-
-
-
-
- Zotpress <= 4.4 - SQL Injection Vulnerability
-
- 17778
-
- SQLI
-
-
-
-
-
- oQey Gallery <= 0.4.8 - SQL Injection Vulnerability
-
- 17779
-
- SQLI
-
-
-
-
-
- Tweet Old Post <= 3.2.5 - SQL Injection Vulnerability
-
- 17789
-
- SQLI
-
-
-
-
-
- post highlights <= 2.2 - SQL Injection Vulnerability
-
- 17790
-
- SQLI
-
-
-
-
-
- KNR Author List Widget <= 2.0.0 - SQL Injection Vulnerability
-
- 17791
-
- SQLI
-
-
-
-
-
- SCORM Cloud <= 1.0.6.6 - SQL Injection Vulnerability
-
- 77679
- 17793
-
- 1.0.7
- SQLI
-
-
-
-
-
- Eventify - Simple Events <= 1.7.f - SQL Injection Vulnerability
-
- 17794
-
- SQLI
-
-
-
-
-
- Paid Downloads <= 2.01 - SQL Injection Vulnerability
-
- 17797
-
- SQLI
-
-
-
-
-
- Community Events <= 1.2.1 - SQL Injection Vulnerability
-
- 17798
-
- SQLI
-
-
-
-
-
- 1-flash-gallery <= 1.9.0 - XSS in ZeroClipboard.swf
-
- http://1337day.com/exploit/20396
-
- XSS
-
-
- 1 Flash Gallery - Arbiraty File Upload Exploit (MSF)
-
- 17801
-
- UPLOAD
-
-
-
-
-
- WP-Filebase Download Manager 0.3.0.02 - class/Admin.php GetFileHash Function Remote Command Execution
-
- 105039
- 57456
- http://www.securityfocus.com/bid/66341
-
- SQLI
- 0.3.0.03
-
-
- WP-Filebase 0.2.9.24- Unspecified Vulnerabilities
-
- 87294
- 51269
- http://xforce.iss.net/xforce/xfdb/80034
-
- UNKNOWN
- 0.2.9.25
-
-
- WP-Filebase Download Manager <= 0.2.9 - wpfb-ajax.php base Parameter SQL Injection
-
- 75308
- 45931
- 17808
-
- SQLI
-
-
-
-
-
- A to Z Category Listing <= 1.3 - SQL Injection Vulnerability
-
- 17809
-
- SQLI
-
-
-
-
-
- WP-e-Commerce 3.8.9.5 - Cross Site Scripting Vulnerability
-
- http://1337day.com/exploit/20517
-
- XSS
-
-
- WP-e-Commerce 3.8.9.5 - display-sales-logs.php c Parameter Remote Code Execution
-
- 102484
- http://packetstormsecurity.com/files/124921/
-
- RCE
-
-
- WP-e-Commerce 3.8.9.5 - misc.functions.php image_name Parameter Local File Inclusion
-
- 102485
- http://packetstormsecurity.com/files/124921/
-
- LFI
-
-
- WP-e-Commerce 3.8.9.5 - ajax.php wpsc_action Parameter Remote Code Execution
-
- 102486
- http://packetstormsecurity.com/files/124921/
-
- RCE
-
-
- WP-e-Commerce 3.8.9.5 - save-data.functions.php GIF File Upload
-
- 102497
- http://packetstormsecurity.com/files/124921/
-
- UPLOAD
-
-
- WP-e-Commerce 3.8.9 - purchase-log-list-table-class.php m Parameter XSS
-
- 88231
- http://www.securityfocus.com/bid/56499
- http://xforce.iss.net/xforce/xfdb/80048
-
- XSS
- 3.8.9.1
-
-
- WP-e-Commerce 3.8.9 - purchaselogs.class.php view_purchlogs_by_status Parameter SQL Injection
-
- 88232
- http://www.securityfocus.com/bid/56499
- http://xforce.iss.net/xforce/xfdb/80042
-
- SQLI
- 3.8.9.1
-
-
- WP e-Commerce 3.8.6 - wpsc-cart_widget.php cart_messages Parameter XSS
-
- 74295
- 45513
-
- XSS
- 3.8.8
-
-
- WP e-Commerce <= 3.8.6 - SQL Injection Vulnerability
-
- 17832
-
- SQLI
-
-
-
-
-
- Filedownload 0.1 - (download.php) Remote File Disclosure Vulnerability
-
- 17858
-
- LFI
-
-
-
-
-
- TheCartPress <= 1.6 - Cross Site Sripting
-
- http://packetstormsecurity.com/files/108272/
-
- XSS
-
-
- TheCartPress 1.1.1 - Remote File Inclusion
-
- 75616
- 17860
-
- 1.1.2
- RFI
-
-
-
-
-
- WPEasyStats 1.8 - Remote File Inclusion
-
- 17862
-
- RFI
-
-
-
-
-
- Annonces 1.2.0.1 - admin/theme.php File Upload PHP Code Execution
-
- 82948
- 49488
- http://packetstormsecurity.com/files/113637/
-
- UPLOAD
-
-
-
-
-
- Livesig 0.4 - Remote File Inclusion
-
- 17864
-
- RFI
-
-
-
-
-
- Disclosure Policy 1.0 - Remote File Inclusion
-
- 17865
-
- RFI
-
-
-
-
-
- Mailing List 1.3.2 - Remote File Inclusion
-
- 75617
- 17866
-
- 1.3.4
- RFI
-
-
- Mailing List - Arbitrary file download
-
- 18276
-
- UNKNOWN
- 1.4.1
-
-
-
-
-
- Zingiri Web Shop 2.2.0 - Remote File Inclusion
-
- 17867
-
- RFI
-
-
- Zingiri Web Shop <= 2.2.3 - Remote Code Execution
-
- 18111
-
- RCE
-
-
-
-
-
- Mini Mail Dashboard Widget 1.36 - wp-mini-mail.php abspath Parameter Remote File Inclusion
-
- 75402
- 45953
- 17868
-
- RFI
- 1.37
-
-
- Mini Mail Dashboard Widget 1.42 - Message Body XSS
-
- 85135
- 20358
-
- XSS
- 1.43
-
-
-
-
-
- Relocate Upload 0.14 - Remote File Inclusion
-
- 17869
-
- RFI
-
-
-
-
-
- Category Grid View Gallery 0.1.1 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
- Category Grid View Gallery 2.3.1 - CatGridPost.php ID Parameter XSS
-
- 94805
- 2013-4117
- 54035
- http://packetstormsecurity.com/files/122259/
-
- XSS
- 2.3.3
-
-
-
-
-
- Auto Attachments 0.2.9 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- WP Marketplace 1.1.0 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- DP Thumbnail 1.0 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- Vk Gallery 1.1.0 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- Rekt Slideshow 1.0.5 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- CAC Featured Content 0.8 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- Rent A Car 1.0 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- LISL Last Image Slider 1.0 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- Islidex 2.7 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- Kino Gallery 1.0 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- Cms Pack 1.3 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- A Gallery 0.9 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- Category List Portfolio Page 0.9 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- Really Easy Slider 0.1 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- Verve Meta Boxes 1.2.8 - Shell Upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- User Avatar 1.3.7 - shell upload vulnerability
-
- 17872
-
- UPLOAD
-
-
-
-
-
- Extend 1.3.7 - Shell Upload vulnerability
-
- 75638
- 2011-4106
- 17872
- http://markmaunder.com/2011/08/01/zero-day-vulnerability-in-many-wordpress-themes/
-
- UPLOAD
-
-
-
-
-
- AdRotate <= 3.9.4 - clicktracker.php track Parameter SQL Injection
-
- 103578
- 2014-1854
- 57079
- 31834
- http://packetstormsecurity.com/files/125330/
-
- SQLI
- 3.9.5
-
-
- AdRotate <= 3.6.6 - SQL Injection Vulnerability
-
- 77507
- 2011-4671
- 46814
- 18114
-
- SQLI
- 3.6.8
-
-
- AdRotate <= 3.6.5 - SQL Injection Vulnerability
-
- 77507
- 2011-4671
- 17888
- http://unconciousmind.blogspot.com/2011/09/wordpress-adrotate-plugin-365-sql.html
-
- SQLI
- 3.6.8
-
-
-
-
-
- WP-SpamFree 3.2.1 - Spam SQL Injection Vulnerability
-
- 17970
-
- SQLI
-
-
-
-
-
- GD Star Rating 1.9.22 - gd-star-rating-stats.php s Parameter SQL Injection
-
- 105085
- http://packetstormsecurity.com/files/125932/
- http://seclists.org/fulldisclosure/2014/Mar/399
- https://security.dxw.com/advisories/xss-csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/
-
- SQLI
-
-
- GD Star Rating 1.9.22 - gd-star-rating-stats.php Setting Manipulation CSRF
-
- 105086
- 57667
- http://packetstormsecurity.com/files/125932/
- http://seclists.org/fulldisclosure/2014/Mar/399
- https://security.dxw.com/advisories/xss-csrf-and-blind-sql-injection-in-gd-star-rating-1-9-22/
-
- CSRF
-
-
- GD Star Rating 1.9.18 - Export Security Bypass Security Issue
-
- 105086
- 49850
-
- AUTHBYPASS
- 1.9.19
-
-
- GD Star Rating <= 1.9.16 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/112702/
-
- XSS
-
-
- GD Star Rating <= 1.9.10 - gd-star-rating/export.php de Parameter SQL Injection
-
- 83466
- 17973
-
- SQLI
-
-
- GD Star Rating 1.9.7 - gd-star-rating/widgets/widget_top.php wpfn Parameter XSS
-
- 71060
- 43403
- http://seclists.org/bugtraq/2011/Feb/219
-
- XSS
-
-
-
-
-
- Contact Form <= 2.7.5 - SQL Injection
-
- 17980
-
- SQLI
-
-
-
-
-
- WP Photo Album Plus <= 4.1.1 - SQL Injection
-
- 17983
-
- SQLI
-
-
- WP Photo Album Plus <= 4.8.12 - wp-photo-album-plus.php wppa-searchstring XSS
-
- 88851
- 51669
- 51679
-
- XSS
-
-
- WP Photo Album Plus - Full Path Disclosure
-
- http://1337day.com/exploit/20125
-
- FPD
- 4.9.1
-
-
- WP Photo Album Plus - index.php wppa-tag Parameter XSS
-
- 89165
- 51829
-
- XSS
- 4.9.3
-
-
- WP Photo Album Plus - "commentid" Cross-Site Scripting Vulnerability
-
- 93033
- 2013-3254
- 53105
-
- XSS
- 5.0.3
-
-
- WP Photo Album Plus - wp-admin/admin.php edit_id Parameter XSS
-
- 94465
- 53915
-
- XSS
- 5.0.11
-
-
-
-
-
- BackWPUp 2.1.4 - Code Execution
-
- 17987
-
- RCE
-
-
- plugin BackWPup 1.5.2, 1.6.1, 1.7.1 - Remote and Local Code Execution Vulnerability
-
- 71481
-
- RCE
-
-
- BackWPup 3.0.12 - wp-admin/admin.php tab Parameter XSS
-
- 2013-4626
- https://www.htbridge.com/advisory/HTB23161
- 96505
- 54515
- http://packetstormsecurity.com/files/122916/
-
- XSS
- 3.0.13
-
-
-
-
-
- portable-phpMyAdmin - Authentication Bypass
-
- 88391
- 2012-5469
- 23356
- 51520
-
- AUTHBYPASS
- 1.3.1
-
-
- Portable phpMyAdmin - /pma/phpinfo.php Direct Request System Information Disclosure
-
- 98766
- 2013-4454
- http://www.securityfocus.com/bid/63249
- http://seclists.org/oss-sec/2013/q4/138
-
- FPD
-
-
- Portable phpMyAdmin 1.4.1 - Multiple Script Direct Request Authentication Bypass
-
- 98767
- 2013-4462
- 55270
- http://seclists.org/oss-sec/2013/q4/138
-
- AUTHBYPASS
-
-
-
-
-
- super-refer-a-friend - Full Path Disclosure
-
- http://1337day.com/exploit/20126
-
- FPD
- 1.0
-
-
-
-
-
- W3 Total Cache - Username and Hash Extract
-
- 92742
- 92741
- 2012-6079
- 2012-6078
- http://seclists.org/fulldisclosure/2012/Dec/242
- https://github.com/FireFart/W3TotalCacheExploit
- auxiliary/gather/wp_w3_total_cache_hash_extract
-
- UNKNOWN
- 0.9.2.5
-
-
- W3 Total Cache - Remote Code Execution
-
- http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/
- http://wordpress.org/support/topic/pwn3d
- http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html
- exploits/unix/webapp/php_wordpress_total_cache
- 25137
- 2013-2010
- 92652
- 53052
-
- RCE
- 0.9.2.9
-
-
-
-
-
- WP-Super-Cache 1.3 - Remote Code Execution
-
- http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/
- http://wordpress.org/support/topic/pwn3d
- http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html
-
- RCE
- 1.3.1
-
-
- WP Super Cache 1.3 - trunk/wp-cache.php wp_nonce_url Function URI XSS
-
- 92832
- 2013-2008
-
- XSS
- 1.3.1
-
-
- WP Super Cache 1.3 - trunk/plugins/wptouch.php URI XSS
-
- 92831
- 2013-2008
-
- XSS
- 1.3.1
-
-
- WP Super Cache 1.3 - trunk/plugins/searchengine.php URI XSS
-
- 92830
- 2013-2008
-
- XSS
- 1.3.1
-
-
- WP Super Cache 1.3 - trunk/plugins/domain-mapping.php URI XSS
-
- 92829
- 2013-2008
-
- XSS
- 1.3.1
-
-
- WP Super Cache 1.3 - trunk/plugins/badbehaviour.php URI XSS
-
- 92828
- 2013-2008
-
- XSS
- 1.3.1
-
-
- WP Super Cache 1.3 - trunk/plugins/awaitingmoderation.php URI XSS
-
- 92827
- 2013-2008
-
- XSS
- 1.3.1
-
-
-
-
-
-
- ripe-hd-player 1.0 - ripe-hd-player/config.php id Parameter SQL Injection
-
- 89437
- 24229
- http://xforce.iss.net/xforce/xfdb/81415
-
- SQLI
-
-
- ripe-hd-player 1.0 - Multiple Script Direct Request Path Disclosure
-
- 89438
- 24229
- http://www.securityfocus.com/bid/57473
- http://xforce.iss.net/xforce/xfdb/81414
-
- FPD
-
-
-
-
-
- floating-tweets - persistent XSS
-
- http://packetstormsecurity.com/files/119499/
- http://websecurity.com.ua/6023/
-
- XSS
-
-
- floating-tweets - directory traversal
-
- http://packetstormsecurity.com/files/119499/
- http://websecurity.com.ua/6023/
-
- UNKNOWN
-
-
-
-
-
- ipfeuilledechou - SQL Injection Vulnerability
-
- http://www.exploit4arab.com/exploits/377
- http://1337day.com/exploit/20206
-
- SQLI
-
-
-
-
-
- Simple Login Log - XSS
-
- 51780
-
- XSS
- 0.9.4
-
-
- Simple Login Log - SQL Injection
-
- 51780
-
- SQLI
- 0.9.4
-
-
-
-
-
- WP SlimStat 3.5.5 - Overview URI Stored XSS
-
- 104428
- 57305
-
- XSS
- 3.5.6
-
-
- WP SlimStat 2.8.4 - wp-content/plugins/wp-slimstat/admin/view/panel1.php s Parameter XSS
-
- 89052
- 51721
-
- XSS
- 2.8.5
-
-
-
-
-
- SlimStat-Ex - Open Flash Chart Arbitrary File Creation Vulnerability
-
- 55160
- http://packetstormsecurity.com/files/123494/
-
- UPLOAD
-
-
-
-
-
- Browser Rejector - Remote and Local File Inclusion
-
- 89053
- 51739
-
- LFI
- 2.11
-
-
-
-
-
- File Uploader - PHP File Upload Vulnerability
-
- http://la.usch.io/2013/01/21/wordpress-file-uploader-plugin-php-file-upload-vulnerability/
-
- UPLOAD
-
-
-
-
-
- Cardoza WordPress poll 34.05 - Multiple External Function Remote Poll Manipulation
-
- 89443
- 2013-1401
- 51925
- http://seclists.org/bugtraq/2013/Jan/86
- http://packetstormsecurity.com/files/119736/
-
- CSRF
- 34.06
-
-
- Cardoza WordPress poll - CWPPoll.js Multiple Method pollid Parameter SQL Injection
-
- 89444
- 2013-1400
- http://packetstormsecurity.com/files/119736/
- http://www.girlinthemiddle.net/2013/01/multiple-sql-injection-vulnerabilities.html
- http://seclists.org/bugtraq/2013/Jan/86
-
- SQLI
-
-
- Cardoza WordPress poll - Multiple SQL Injection Vulnerabilities
-
- 50910
-
- SQLI
- 33.6
-
-
-
-
-
- Developer Formatter 2013.0.1.40 - devformatter.php Multiple Action CSRF
-
- 89475
- 24294
- 51912
- http://packetstormsecurity.com/files/119731/
- http://seclists.org/bugtraq/2013/Jan/91
- http://1337day.com/exploit/20210
-
- CSRF
- 2013.0.1.41
-
-
- Developer Formatter 2013.0.1.40 - devformatter.php Multiple Field XSS
-
- 89474
- http://seclists.org/bugtraq/2013/Jan/91
-
- XSS
- 2013.0.1.41
-
-
-
-
-
- DVS Custom Notification - Cross-Site Request Forgery Vulnerability
-
- 89441
- 2012-4921
- 51531
-
- CSRF
- 1.0.1
-
-
-
-
-
- Events Manager 5.5.1 - Multiple Unspecified XSS Vulnerabilities
-
- 98198
- 55182
-
- XSS
- 5.5.2
-
-
- Events Manager 5.3.8 - Event Search Form em_search Parameter XSS
-
- 93556
- http://www.securityfocus.com/bid/60078
- 53478
-
- XSS
- 5.3.9
-
-
- Events Manager 5.3.8 - wp-admin/edit.php author Parameter XSS
-
- 93557
- http://www.securityfocus.com/bid/60078
- 53478
-
- XSS
- 5.3.9
-
-
- Events Manager 5.3.8 - Event Editing redirect_to Parameter XSS
-
- 93558
- http://www.securityfocus.com/bid/60078
- 53478
-
- XSS
- 5.3.9
-
-
- Events Manager 5.3.5 - wp-admin/admin-ajax.php dbem_phone Parameter XSS
-
- 90913
- 52475
-
- XSS
- 5.3.6
-
-
- Events Manager 5.3.5 - index.php event_owner_name Parameter XSS
-
- 90914
- 52475
-
- XSS
- 5.3.6
-
-
- Events Manager 5.3.5 - wp-admin/post.php Multiple Parameter XSS
-
- 90915
- 52475
-
- XSS
- 5.3.6
-
-
- Events Manager 5.3.3 - templates/forms/bookingform/booking-fields.php Multiple Parameter XSS
-
- 89488
- 2013-1407
- 51869
- http://packetstormsecurity.com/files/120688/
- http://www.securityfocus.com/bid/57477
-
- XSS
- 5.3.4
-
-
- Events Manager 5.3.3 - templates/templates/events-search.php Multiple Parameter XSS
-
- 89487
- 2013-1407
- 51869
- http://packetstormsecurity.com/files/120688/
- http://www.securityfocus.com/bid/57477
-
- XSS
- 5.3.4
-
-
- Events Manager 5.3.3 - XSS classes/em-bookings-table.php wp_nonce Parameter XSS
-
- 89486
- 2013-1407
- 51869
- http://packetstormsecurity.com/files/120688/
- http://www.securityfocus.com/bid/57477
-
- XSS
- 5.3.4
-
-
-
-
-
- SolveMedia 1.1.0 - plugins.php API Key Manipulation CSRF
-
- 89585
- 51927
- 24364
- http://1337day.com/exploit/20222
-
- CSRF
- 1.1.1
-
-
- SolveMedia 1.1.0 - solvemedia.admin.inc Admin Options Page CSRF
-
- 106320
-
- CSRF
- 1.1.1
-
-
-
-
-
- Welcart e-Commerce 1.3.12 - wp-admin/admin-ajax.php Multiple Parameter DOM-Based XSS
-
- 103956
- 57222
- http://packetstormsecurity.com/files/125513/
- http://www.securityfocus.com/bid/65954
-
- XSS
-
-
- Welcart e-Commerce 1.3.12 - purchase_limit Parameter DOM-based XSS
-
- 103955
- http://packetstormsecurity.com/files/125513/
- http://www.securityfocus.com/bid/65954
-
- XSS
-
-
- Welcart e-Commerce 1.3.12 - wp-admin/admin.php Multiple Parameter SQL Injection
-
- 103954
- http://packetstormsecurity.com/files/125513/
- http://www.securityfocus.com/bid/65954
-
- SQLI
-
-
- Welcart e-Commerce - wp-admin/admin.php Multiple Parameter SQL Injection
-
- 103954
- http://packetstormsecurity.com/files/125513/
- http://www.securityfocus.com/bid/65954
-
- SQLI
-
-
- Welcart e-Commerce - Cross-Site Scripting and Request Forgery Vulnerabilities
-
- 51581
-
- MULTI
-
-
-
-
-
- Knews 1.2.5 - Multilingual Newsletters Cross-Site Request Forgery Vulnerability
-
- 88427
- 51543
- http://www.securityfocus.com/bid/56926
- http://xforce.iss.net/xforce/xfdb/80661
-
- CSRF
- 1.2.6
-
-
- Knews 1.2.5 - Unspecified XSS
-
- 88426
-
- XSS
- 1.2.6
-
-
- Knews 1.1.0 - wysiwyg/fontpicker/index.php ff Parameter XSS
-
- 83643
- 49825
-
- XSS
- 1.1.1
-
-
-
-
-
- Video Lead Form - "errMsg" Cross-Site Scripting Vulnerability
-
- 2012-6312
- 88002
- 51419
-
- XSS
-
-
-
-
-
- WooCommerce SagePay Direct Payment Gateway 0.1.6.6 - pages/3DRedirect.php Multiple Parameter Reflected XSS
-
- 102882
- 56801
-
- XSS
- 0.1.6.7
-
-
- WooCommerce SagePay Direct Payment Gateway 0.1.6.6 - pages/3DCallBack.php Multiple Parameter Reflected XSS
-
- 102746
- 56801
-
- XSS
- 0.1.6.7
-
-
- WooCommerce SagePay Direct Payment Gateway 0.1.6.6 - pages/3DComplete.php Multiple Parameter Reflected XSS
-
- 102747
- 56801
-
- XSS
- 0.1.6.7
-
-
-
-
-
- WooCommerce Predictive Search - index.php rs Parameter XSS
-
- 87890
- 51385
- http://www.securityfocus.com/bid/56703
-
- XSS
- 1.0.6
-
-
-
-
-
- WooCommerce 2.0.17 - hide-wc-extensions-message Parameter Reflected XSS
-
- 98754
- http://packetstormsecurity.com/files/123684/
- http://www.securityfocus.com/bid/63228
-
- XSS
- 2.0.17
-
-
- WooCommerce 2.0.12 - index.php calc_shipping_state Parameter XSS
-
- 95480
- 53930
- http://packetstormsecurity.com/files/122465/
-
- XSS
- 2.0.13
-
-
-
-
-
- WP e-Commerce Predictive Search - "rs" Cross-Site Scripting Vulnerability
-
- 51384
-
- XSS
-
-
-
-
-
- vTiger - CRM Lead Capture Unspecified Vulnerability
-
- 51305
-
- UNKNOWN
- 1.1.0
-
-
-
-
-
- WP-PostViews - "search_input" Cross-Site Scripting Vulnerability
-
- 50982
-
- XSS
-
-
- WP-PostViews 1.62 - Setting Manipulation CSRF
-
- 93096
- 2013-3252
- 53127
-
- CSRF
- 1.63
-
-
-
-
-
- DX-Contribute - Cross-Site Request Forgery Vulnerability
-
- 51082
-
- CSRF
-
-
-
-
-
- MailPoet (Wysija Newsletters) - Remote File Upload
-
- 2014-4725
- http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html
- http://www.openwall.com/lists/oss-security/2014/07/02/1
- exploit/unix/webapp/wp_wysija_newsletters_upload
-
- UPLOAD
- 2.6.8
-
-
- Wysija Newsletters 2.2 - SQL Injection Vulnerability
-
- 89924
- 2013-1408
- https://www.htbridge.com/advisory/HTB23140
- http://packetstormsecurity.com/files/120089/
- http://seclists.org/bugtraq/2013/Feb/29
- http://cxsecurity.com/issue/WLB-2013020039
-
- SQLI
- 2.2.1
-
-
- Wysija Newsletters - swfupload Cross-Site Scripting Vulnerability
-
- 51249
- http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html
-
- XSS
- 2.1.7
-
-
-
-
-
- Hitasoft FLV Player - "id" SQL Injection Vulnerability
-
- 51179
-
- SQLI
-
-
-
-
-
- Spider Calendar 1.3.0 - Multiple Vulnerabilities
-
- 93584
- 25723
- 53481
-
- MULTI
-
-
- Spider Calendar 1.1.0 - "many_sp_calendar" Cross-Site Scripting Vulnerability
-
- 86604
- 50981
-
- XSS
- 1.1.1
-
-
- Spider Calendar 1.0.1 - front_end/spidercalendarbig.php date Parameter XSS
-
- 85897
- 50812
- 21715
- http://packetstormsecurity.org/files/117078/
-
- XSS
- 1.1.3
-
-
- Spider Calendar 1.0.1 - spidercalendarbig_seemore.php calendar_id Parameter SQL Injection
-
- 85898
- 50812
- 21715
- http://packetstormsecurity.org/files/117078/
-
- SQLI
- 1.1.3
-
-
-
-
-
- Dynamic Font Replacement 1.3 - SQL Injection Vulnerability
-
- http://1337day.com/exploit/20239
-
- SQLI
-
-
-
-
-
- Zingiri Form Builder - "error" Cross-Site Scripting Vulnerability
-
- 50983
-
- XSS
- 1.2.1
-
-
-
-
-
- White Label CMS - Cross-Site Request Forgery Vulnerability
-
- 50487
-
- CSRF
- 1.5.1
-
-
-
-
-
- Download Shortcode - "file" Arbitrary File Disclosure Vulnerability
-
- 50924
-
- LFI
- 0.2.1
-
-
-
-
-
- eShop Magic 0.1 - eshop-magic/download.php file Parameter Traversal Arbitrary File Access
-
- 86155
- 50933
- http://xforce.iss.net/xforce/xfdb/79222
-
- LFI
- 0.2
-
-
-
-
-
- Pinterest "Pin It" Button Lite 1.3.1 - Multiple Unspecified Vulnerabilities
-
- 85956
- 50868
-
- MULTI
- 1.4.0
-
-
-
-
-
- CSS Plus 1.3.1 - Unspecified Vulnerabilities
-
- 85875
- 50793
-
- UNKNOWN
- 1.3.2
-
-
-
-
-
- Multisite plugin Manager 3.1.1 - Two Cross-Site Scripting Vulnerabilities
-
- 85818
- 50762
-
- XSS
- 3.1.2
-
-
-
-
-
- ABC Test - "id" Cross-Site Scripting Vulnerability
-
- http://scott-herbert.com/?p=142
- 85773
- 50608
-
- XSS
-
-
-
-
-
- Token Manager 1.0.2 - "tid" Cross-Site Scripting Vulnerabilities
-
- 85738
- 50722
-
- XSS
-
-
-
-
-
- Sexy Add Template 1.0 - PHP Code Execution CSRF
-
- 85730
- 50709
-
- CSRF
-
-
-
-
-
- Notices Ticker 5.0 - Cross-Site Request Forgery Vulnerability
-
- 85729
- 50717
- http://packetstormsecurity.org/files/116774/
-
- CSRF
-
-
-
-
-
- MF Gig Calendar 0.9.4.1 - URL Cross-Site Scripting Vulnerability
-
- 85682
- 2012-4242
- 50571
- http://packetstormsecurity.org/files/116713/
-
- XSS
-
-
-
-
-
- WP-TopBar 4.02 - wp-topbar.php wptbbartext Parameter XSS
-
- 85659
- 50693
- 21393
-
- XSS
- 4.03
-
-
- WP-TopBar 4.02 - TopBar Message Manipulation CSRF
-
- 85660
- 50693
- 21393
-
- CSRF
- 4.03
-
-
- wp-topbar <= 3.04 - XSS in ZeroClipboard.swf
-
- http://1337day.com/exploit/20396
-
- XSS
-
-
-
-
-
- HD Webplayer - Two SQL Injection Vulnerabilities
-
- 87832
- 50466
-
- SQLI
-
-
-
-
-
- Cloudsafe365 - Multiple Vulnerabilities
-
- 50392
-
- MULTI
- 1.47
-
-
-
-
-
- Vitamin 1.0 - add_headers.php path Parameter Traversal Arbitrary File Access
-
- 2012-6651
- 84463
- 50176
-
- LFI
- 1.1
-
-
- Vitamin 1.0 - minify.php path Parameter Traversal Arbitrary File Access
-
- 2012-6651
- 84464
- 50176
-
- LFI
- 1.1
-
-
-
-
-
- Featured Post with thumbnail 1.4 - Unspecified timthumb Vulnerability
-
- 84460
- 50161
-
- UNKNOWN
- 1.5
-
-
-
-
-
- WP Lead Management 3.0.0 - Script Insertion Vulnerabilities
-
- 84462
- 20270
- 50166
-
- XSS
-
-
-
-
-
- XVE Various Embed - JW Player Multiple Cross-Site Scripting Vulnerabilities
-
- 50173
-
- XSS
- 1.0.4
-
-
-
-
-
- G-Lock Double Opt-in Manager - Two Security Bypass Vulnerabilities
-
- 84434
- 50100
- http://packetstormsecurity.org/files/115173/
-
- AUTHBYPASS
-
-
-
-
-
- Backend Localization 1.6.1 - options-general.php kau-boys_backend_localization_language Parameter XSS
-
- 84418
- 50099
-
- XSS
- 2.0
-
-
- Backend Localization 1.6.1 - wp-login.php kau-boys_backend_localization_language Parameter XSS
-
- 84419
- 50099
-
- XSS
- 2.0
-
-
-
-
-
- Flexi Quote Rotator - Cross-Site Request Forgery and SQL Injection Vulnerabilities
-
- 49910
-
- MULTI
- 0.9.2
-
-
-
-
-
- Get Off Malicious Scripts - Cross-Site Scripting Vulnerability
-
- 50030
-
- XSS
- 1.2.07.20
-
-
-
-
-
- Cimy User Extra Fields - Arbitrary File Upload Vulnerability
-
- 49975
-
- UPLOAD
- 2.3.9
-
-
-
-
-
- Nmedia Users File Uploader - Arbitrary File Upload Vulnerability
-
- 49996
-
- UPLOAD
- 2.0
-
-
-
-
-
- wp-explorer-gallery - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/20251
-
- UPLOAD
-
-
-
-
-
- accordion - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/20254
-
- UPLOAD
-
-
-
-
-
- wp-catpro - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/20256
-
- UPLOAD
-
-
-
-
-
- RLSWordPressSearch - register.php agentid Parameter SQL Injection
-
- 89824
- http://packetstormsecurity.com/files/119938/
-
- SQLI
-
-
-
-
-
- wordpress-simple-shout-box - SQL Injection
-
- http://cxsecurity.com/issue/WLB-2013010235
-
- SQLI
-
-
-
-
-
- portfolio-slideshow-pro v3 - SQL Injection
-
- http://cxsecurity.com/issue/WLB-2013010236
-
- SQLI
-
-
-
-
-
- Simple History - RSS Feed "rss_secret" Disclosure Weakness
-
- 89640
- 51998
- http://www.securityfocus.com/bid/57628
-
- UNKNOWN
- 1.0.8
-
-
-
-
-
- p1m media manager - SQL Injection Vulnerability
-
- http://1337day.com/exploit/20270
-
- SQLI
-
-
-
-
-
- wp-table-reloaded <= 1.9.3 - zeroclipboard.swf id Parameter XSS
-
- 89754
- 2013-1463
- 52027
- http://packetstormsecurity.com/files/119968/
- http://seclists.org/bugtraq/2013/Feb/28
- http://www.securityfocus.com/bid/57664
-
- XSS
- 1.9.4
-
-
-
-
-
- Gallery - "load" Remote File Inclusion Vulnerability
-
- 89753
- 2012-4919
- 51347
- http://www.securityfocus.com/bid/57650
-
- RFI
-
-
-
-
-
- ForumConverter - SQL Injection Vulnerability
-
- http://1337day.com/exploit/20275
-
- SQLI
-
-
-
-
-
- Newsletter - SQL Injection Vulnerability
-
- http://1337day.com/exploit/20287
-
- SQLI
- 3.0.9
-
-
- Newsletter 3.2.6 - "alert" Cross-Site Scripting Vulnerability
-
- 93421
- 53398
- http://packetstormsecurity.com/files/121634/
- http://www.securityfocus.com/bid/59856
- http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5141.php
-
- XSS
- 3.2.7
-
-
-
-
-
- CommentLuv 2.92.3 - Cross Site Scripting Vulnerability
-
- 89925
- 2013-1409
- https://www.htbridge.com/advisory/HTB23138
- http://packetstormsecurity.com/files/120090/
- http://seclists.org/bugtraq/2013/Feb/30
- http://cxsecurity.com/issue/WLB-2013020040
- 52092
-
- XSS
- 2.92.4
-
-
-
-
-
- wp-forum - SQL Injection
-
- http://cxsecurity.com/issue/WLB-2013020035
-
- SQLI
-
-
-
-
-
- WP ecommerce Shop Styling 1.7.2 - generate-pdf.php dompdf Parameter Remote File Inclusion
-
- 89921
- 2013-0724
- 51707
-
- RFI
- 1.8
-
-
-
-
-
- Audio Player - player.swf playerID Parameter XSS
-
- 89963
- 2013-1464
- http://packetstormsecurity.com/files/120129/
- http://seclists.org/bugtraq/2013/Feb/35
- 52083
-
- XSS
- 2.0.4.6
-
-
-
-
-
- CKEditor 4.0 - Arbitrary File Upload Exploit
-
- http://1337day.com/exploit/20318
-
- UPLOAD
-
-
-
-
-
- myftp-ftp-like-plugin-for-wordpress v2 - SQL Injection
-
- http://cxsecurity.com/issue/WLB-2013020061
-
- SQLI
-
-
-
-
-
- Password Protected 1.4 - Login Process redirect_to Parameter Arbitrary Site Redirect
-
- 90559
-
- REDIRECT
-
-
-
-
-
- Contact Form 3.34 - contact_form.php cntctfrm_contact_message Parameter XSS
-
- 90502
- 52179
-
- XSS
- 3.35
-
-
- Contact Form 3.36 - contact_form.php cntctfrm_contact_email Parameter XSS
-
- 90503
- 52250
-
- XSS
-
-
-
-
-
- smart-flv - jwplayer.swf XSS
-
- 90606
- 2013-1765
- http://www.openwall.com/lists/oss-security/2013/02/24/7
- http://packetstormsecurity.com/files/115100/
-
- XSS
-
-
-
-
-
- Google Alert And Twitter 3.1.5 - XSS Exploit, SQL Injection
-
- http://1337day.com/exploit/20433
-
- MULTI
-
-
-
-
-
- PHP Shell Plugin
-
- https://github.com/wpscanteam/wpscan/issues/138
- http://plugins.svn.wordpress.org/php-shell/trunk/shell.php
-
- RCE
-
-
-
-
-
- Marekkis Watermark 0.9.2 - wp-admin/options-general.php pfad Parameter XSS
-
- 90362
- 2013-1758
- 52227
- http://packetstormsecurity.com/files/120378/
- http://seclists.org/bugtraq/2013/Feb/83
-
- XSS
-
-
-
-
-
- Responsive Logo Slideshow - URL and Image Field XSS
-
- 90406
- 2013-1759
- http://packetstormsecurity.com/files/120379/
- http://seclists.org/bugtraq/2013/Feb/84
-
- XSS
-
-
-
-
-
- zopim-live-chat <= 1.2.5 - XSS in ZeroClipboard
-
- 90374
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- ed2k-link-selector <= 1.1.7 - XSS in ZeroClipboard
-
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- wppygments <= 0.3.2 - XSS in ZeroClipboard
-
- 90374
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- copy-in-clipboard <= 0.8 - XSS in ZeroClipboard
-
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- search-and-share 0.9.3 - SearchAndShare.php Direct Request Path Disclosure
-
- 93260
- http://packetstormsecurity.com/files/121595/
- http://seclists.org/fulldisclosure/2013/May/49
-
- FPD
-
-
- search-and-share <= 0.9.3 - XSS in ZeroClipboard
-
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- placester <= 0.3.12 - XSS in ZeroClipboard
-
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- drp-coupon <= 2.1 - XSS in ZeroClipboard
-
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- coupon-code-plugin <= 2.1 - XSS in ZeroClipboard
-
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- q2w3-inc-manager <= 2.3.1 - XSS in ZeroClipboard
-
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- scorerender <= 0.3.4 - XSS in ZeroClipboard
-
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- wp-link-to-us <= 2.0 - XSS in ZeroClipboard
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- buckets <= 0.1.9.2 - XSS in ZeroClipboard
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- java-trackback <= 0.2 - XSS in ZeroClipboard
-
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- slidedeck2 2.3.3 - Unspecified File Inclusion
-
- 105132
-
- UNKNOWN
- 2.3.5
-
-
- slidedeck2 <= 2.1.20130228 - XSS in ZeroClipboard
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- wp-clone-by-wp-academy <= 2.1.1 - XSS in ZeroClipboard
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- tiny-url <= 1.3.2 - XSS in ZeroClipboard
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- thethe-layout-grid <= 1.0.0 - XSS in ZeroClipboard.
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- paypal-digital-goods-monetization-powered-by-cleeng <= 2.2.13 - XSS in ZeroClipboard
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- mobileview <= 1.0.7 - XSS in ZeroClipboard
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- jaspreetchahals-coupons-lite <= 2.1 - XSS in ZeroClipboard
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- geshi-source-colorer <= 0.13 - XSS in ZeroClipboard
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- click-to-copy-grab-box <= 0.1.1 - XSS in ZeroClipboard
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- cleeng <= 2.3.2 - XSS in ZeroClipboard
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- bp-code-snippets <= 2.0 - XSS in ZeroClipboard
-
- http://www.openwall.com/lists/oss-security/2013/03/10/2
- http://1337day.com/exploit/20396
- 2013-1808
-
- XSS
-
-
-
-
-
- snazzy-archives <= 1.7.1 - swf/tagcloud.swf tagcloud Parameter XSS
-
- 91127
- 2009-4168
- 52527
- http://www.openwall.com/lists/oss-security/2013/03/10/3
-
- XSS
- 1.7.2
-
-
-
-
-
- vkontakte-api - vkontakte-api/swf/tagcloud.swf tagcloud Parameter XSS
-
- 91128
- 2009-4168
- 52539
- http://seclists.org/oss-sec/2013/q1/616
- http://www.openwall.com/lists/oss-security/2013/03/11/1
-
- XSS
-
-
-
-
-
- Terillion Reviews < 1.2 - Profile Id Field XSS
-
- 91123
- 2013-2501
- http://packetstormsecurity.com/files/120730/
- http://www.securityfocus.com/bid/58415
- http://xforce.iss.net/xforce/xfdb/82727
-
- XSS
-
-
-
-
-
- o2s-gallery - Cross Site Scripting Vulnerability
-
- http://1337day.com/exploit/20516
-
- XSS
-
-
-
-
-
- bp-gallery 1.2.5 - Cross Site Scripting Vulnerability
-
- http://1337day.com/exploit/20518
-
- XSS
-
-
-
-
-
- Simply Poll 1.4.1 - wp-admin/admin.php question Parameter XSS
-
- 91446
- 24850
- http://packetstormsecurity.com/files/120833/
-
- XSS
-
-
- Simply Poll 1.4.1 - wp-admin/admin.php Poll Manipulation CSRF
-
- 91447
- 52681
- 24850
- http://packetstormsecurity.com/files/120833/
-
- CSRF
-
-
-
-
-
- Occasions 1.0.4 - Manipulation CSRF
-
- 91489
- 24858
- 52651
- http://packetstormsecurity.com/files/120871/
-
- CSRF
-
-
- Occasions 1.0.4 - occasions/occasions.php occ_content1 Parameter XSS
-
- 91490
- 24858
- http://packetstormsecurity.com/files/120871/
-
- XSS
-
-
-
-
-
- Mathjax Latex 1.1 - Setting Manipulation CSRF
-
- 91737
- 24889
- http://packetstormsecurity.com/files/120931/
- http://1337day.com/exploit/20566
-
- CSRF
- 1.2
-
-
-
-
-
- WP-Banners-Lite 1.4.0 - XSS vulnerability
-
- http://packetstormsecurity.com/files/120928/
- http://seclists.org/fulldisclosure/2013/Mar/209
- http://threatpost.com/en_us/blogs/xss-flaw-wordpress-plugin-allows-injection-malicious-code-032513
-
- XSS
-
-
-
-
-
- Backupbuddy - importbuddy.php Direct Request Remote Backup File Disclosure
-
- 91631
- 2013-2741
- http://packetstormsecurity.com/files/120923/
- http://seclists.org/fulldisclosure/2013/Mar/206
-
- AUTHBYPASS
-
-
- Backupbuddy - importbuddy.php step Parameter Manipulation Authentication Bypass
-
- 91890
- 2013-2743
- http://packetstormsecurity.com/files/120923/
- http://seclists.org/fulldisclosure/2013/Mar/206
-
- AUTHBYPASS
-
-
- Backupbuddy - importbuddy.php step Parameter Remote PHP Information Disclosure
-
- 91891
- 2013-2744
- http://packetstormsecurity.com/files/120923/
- http://seclists.org/fulldisclosure/2013/Mar/206
- http://archives.neohapsis.com/archives/fulldisclosure/2013-03/0205.html
-
- UNKNOWN
-
-
- Backupbuddy - importbuddy.php Restore Operation Persistence Weakness
-
- 91892
- 2013-2742
- http://packetstormsecurity.com/files/120923/
- http://seclists.org/fulldisclosure/2013/Mar/206
-
- AUTHBYPASS
-
-
-
-
-
- FuneralPress 1.1.6 - Persistent XSS
-
- 24914
- 2013-3529
- 91868
- http://seclists.org/fulldisclosure/2013/Mar/282
-
- XSS
-
-
-
-
-
- chikuncount - ofc_upload_image.php Arbitrary File Upload Vulnerability
-
- 24492
- exploit/unix/webapp/open_flash_chart_upload_exec
-
- UPLOAD
-
-
-
-
-
- open-flash-chart-core - ofc_upload_image.php Arbitrary File Upload Vulnerability
-
- 24492
- 37903
- 2009-4140
- exploit/unix/webapp/open_flash_chart_upload_exec
-
- UPLOAD
- 0.5
-
-
-
-
-
- spamtask - ofc_upload_image.php Arbitrary File Upload Vulnerability
-
- 24492
- exploit/unix/webapp/open_flash_chart_upload_exec
-
- UPLOAD
-
-
-
-
-
- php-analytics - ofc_upload_image.php Arbitrary File Upload Vulnerability
-
- 24492
- exploit/unix/webapp/open_flash_chart_upload_exec
-
- UPLOAD
-
-
-
-
-
- seo-spy-google - ofc_upload_image.php Arbitrary File Upload Vulnerability
-
- 24492
- exploit/unix/webapp/open_flash_chart_upload_exec
-
- UPLOAD
-
-
-
-
-
- wp-seo-spy-google - ofc_upload_image.php Arbitrary File Upload Vulnerability
-
- 24492
- exploit/unix/webapp/open_flash_chart_upload_exec
-
- UPLOAD
-
-
-
-
-
- podPress 8.8.10.13 - players/1pixelout/1pixelout_player.swf playerID Parameter XSS
-
- 91129
- 2013-2714
- 52544
- http://packetstormsecurity.com/files/121011/
-
- XSS
- 8.8.10.17
-
-
-
-
-
- fbsurveypro - XSS Vulnerability
-
- http://1337day.com/exploit/20623
-
- XSS
-
-
-
-
-
- timelineoptinpro - XSS Vulnerability
-
- http://1337day.com/exploit/20620
-
- XSS
-
-
-
-
-
- kioskprox - XSS Vulnerability
-
- http://1337day.com/exploit/20624
-
- XSS
-
-
-
-
-
- bigcontact - SQLI
-
- http://plugins.trac.wordpress.org/changeset/689798
-
- SQLI
- 1.4.7
-
-
-
-
-
- drawblog - CSRF
-
- http://plugins.trac.wordpress.org/changeset/691178
-
- CSRF
- 0.81
-
-
-
-
-
- Social Media Widget - malicious code
-
- https://plugins.trac.wordpress.org/changeset?reponame=&old=691839@social-media-widget/trunk&new=693941@social-media-widget/trunk
- http://slashdot.org/submission/2592777/top-wordpress-widget-sold-off-turned-into-seo-spambot
-
- UNKNOWN
- 4.0.2
-
-
- Social Media Widget 4.0 - social-widget.php MITM Weakness Arbitrary Code Injection
-
- 92312
- 2013-1949
- 53020
- http://seclists.org/oss-sec/2013/q2/10
-
- UNKNOWN
- 4.0.1
-
-
-
-
-
- facebook-members 5.0.4 - Setting Manipulation CSRF
-
- 92642
- 52962
- 2013-2703
-
- CSRF
- 5.0.5
-
-
-
-
-
- foursquare-checkins - CSRF
-
- 92641
- 2013-2709
- 53151
-
- CSRF
- 1.3
-
-
-
-
-
- Formidable Forms 1.06.03 - ofc_upload_image.php Shell Upload Remote Code Execution
-
- 106985
- http://www.securityfocus.com/bid/67390
- http://packetstormsecurity.com/files/126583/
-
- RCE
-
-
- formidable Pro - Unspecified Vulnerabilities
-
- 53121
-
- UNKNOWN
- 1.06.09
-
-
-
-
-
- All in one webmaster 8.2.3 - Script Insertion CSRF
-
- 92640
- 52877
- 2013-2696
-
- CSRF
- 8.2.4
-
-
-
-
-
- background-music 1.0 - jPlayer.swf XSS
-
- 53057
-
- XSS
-
-
-
-
-
- haiku-minimalist-audio-player <= 1.1.0 - jPlayer.swf XSS
-
- 92254
- 51336
-
- XSS
- 1.1.0
-
-
-
-
-
- jammer <= 0.2 - jPlayer.swf XSS
-
- 92254
- 53106
-
- XSS
-
-
-
-
-
- SyntaxHighlighter Evolved 3.1.9 - Unspecified XSS
-
- 106587
-
- XSS
- 3.1.10
-
-
- SyntaxHighlighter Evolved 3.1.5 - clipboard.swf Unspecified XSS
-
- 92848
- 53235
-
- XSS
- 3.1.6
-
-
-
-
-
- top-10 1.9.2 - Setting Manipulation CSRF
-
- 92849
- 53205
-
- CSRF
- 1.9.3
-
-
-
-
-
- Easy AdSense Lite 6.06 - Setting Manipulation CSRF
-
- 92910
- 2013-2702
- 52953
-
- CSRF
- 6.10
-
-
-
-
-
- uk-cookie - XSS
-
- 87561
- http://seclists.org/bugtraq/2012/Nov/50
- 2012-5856
-
- XSS
-
-
- uk-cookie - CSRF
-
- http://www.openwall.com/lists/oss-security/2013/06/06/10
- 94032
- 2013-2180
-
- CSRF
-
-
-
-
-
- wp-cleanfix - Remote Command Execution, CSRF and XSS
-
- https://github.com/wpscanteam/wpscan/issues/186
- http://wordpress.org/support/topic/plugin-wp-cleanfix-remote-code-execution-warning
- 93450
- 53395
- 93468
- 2013-2108
- 2013-2109
-
- MULTI
- 3.0.2
-
-
-
-
-
- Mail On Update 5.1.0 - Email Option Manipulation CSRF
-
- 93452
- 53449
- http://www.openwall.com/lists/oss-security/2013/05/16/8
-
- CSRF
- 5.2.0
-
-
-
-
-
- Advanced XML Reader 0.3.4 - XML External Entity (XXE) Injection
-
- http://packetstormsecurity.com/files/121492/
-
- XXE
-
-
- Advanced XML Reader 0.1.1 - XML External Entity (XXE) Data Parsing Arbitrary File Disclosure
-
- 92904
- http://seclists.org/bugtraq/2013/May/5
-
- XXE
-
-
-
-
-
- Related Posts by Zemanta 1.3.1 - Cross-Site Request Forgery Vulnerability
-
- 93364
- 2013-3477
- 53321
-
- CSRF
- 1.3.2
-
-
-
-
-
- WordPress Related Posts 2.6.1 - Cross-Site Request Forgery Vulnerability
-
- 93362
- 2013-3476
- 53279
-
- CSRF
- 2.7.2
-
-
-
-
-
- Related Posts 2.7.1 - Cross-Site Request Forgery Vulnerability
-
- 93363
- 2013-3257
- 53122
- http://www.securityfocus.com/bid/59836
-
- CSRF
- 2.7.2
-
-
-
-
-
- WP Print Friendly 3.3.7 - wp-admin/options.php printfriendly_option custom_image Parameter XSS
-
- 103874
- http://packetstormsecurity.com/files/125420/
-
- XSS
- 0.5.3
-
-
- WP Print Friendly <= 0.5.2 - Security Bypass Vulnerability
-
- 93243
- 53371
-
- UNKNOWN
- 0.5.3
-
-
-
-
-
- Contextual Related Posts 1.8.10.1 - contextual-related-posts.php Multiple Parameter SQL Injection
-
- 104655
- 2014-3937
- http://www.securityfocus.com/bid/67853
-
- SQLI
- 1.8.10.2
-
-
- Contextual Related Posts 1.8.6 - Cross-Site Request Forgery Vulnerability
-
- 93088
- 2013-2710
- 52960
-
- CSRF
- 1.8.7
-
-
-
-
-
- Calendar 1.3.2 - Entry Addition CSRF
-
- 93025
- 2013-2698
- 52841
-
- CSRF
- 1.3.3
-
-
-
-
-
- Feedweb 2.4 - feedweb_settings.php _wp_http_referer Parameter DOM-based XSS
-
- 103788
- 57108
- http://www.securityfocus.com/bid/65800
-
- XSS
-
-
- Feedweb 1.8.8 - widget_remove.php wp_post_id Parameter XSS
-
- 91951
- 2013-3720
- 52855
- http://www.securityfocus.com/bid/58771
-
- XSS
- 1.9
-
-
-
-
-
- WP-Print 2.51 - Setting Manipulation CSRF
-
- 92053
- 2013-2693
- 52878
- http://www.securityfocus.com/bid/58900
-
- CSRF
- 2.52
-
-
-
-
-
- Traffic Analyzer 3.3.2 - js/ta_loaded.js.php aoid Parameter XSS
-
- 92197
- 2013-3526
- 52929
- http://packetstormsecurity.com/files/121167/
-
- XSS
-
-
-
-
-
- WP-DownloadManager 1.60 - Script Insertion CSRF
-
- 92119
- 2013-2697
- 52863
- http://www.securityfocus.com/bid/58937
-
- CSRF
- 1.61
-
-
-
-
-
- Digg Digg 5.3.4 - Setting Manipulation CSRF
-
- 93544
- 2013-3258
- 53120
- http://www.securityfocus.com/bid/60046
- http://xforce.iss.net/xforce/xfdb/84418
-
- CSRF
- 5.3.5
-
-
-
-
-
- SS Quiz - Multiple Unspecified Vulnerabilities
-
- 93531
- 53378
- http://wordpress.org/plugins/ssquiz/changelog/
-
- UNKNOWN
- 2.0
-
-
-
-
-
- FunCaptcha 0.3.2- Setting Manipulation CSRF
-
- 92272
- 53021
- http://wordpress.org/extend/plugins/funcaptcha/changelog/
-
- CSRF
- 0.3.3
-
-
- FunCaptcha 0.4.3 - wp_funcaptcha_admin_activate.php URI XSS
-
- 100392
- 55863
-
- XSS
- 0.4.4
-
-
-
-
-
- xili-language - index.php lang Parameter XSS
-
- 93233
- 53364
-
- XSS
- 2.8.6
-
-
-
-
-
- WordPress SEO - Security issue which allowed any user to reset settings
-
- http://wordpress.org/plugins/wordpress-seo/changelog/
-
- UNKNOWN
- 1.4.5
-
-
- WordPress SEO 1.14.15 - index.php s Parameter Reflected XSS
-
- 97885
- http://packetstormsecurity.com/files/123028/
-
- XSS
-
-
- WordPress SEO 1.4.6 - Reset Settings Feature Access Restriction Bypass
-
- 92147
- 52949
-
- UNKNOWN
-
-
-
-
-
- Under Construction 1.09 - Authenticated Single Page Viewing Unspecified Issue
-
- 102507
-
- UNKNOWN
- 1.10
-
-
- Under Construction 1.08 - Setting Manipulation CSRF
-
- http://wordpress.org/plugins/underconstruction/changelog/
- 93857
- 52881
- 2013-2699
-
- CSRF
- 1.09
-
-
-
-
-
- ADIF Log Search Widget - XSS Arbitrary Vulnerability
-
- http://packetstormsecurity.com/files/121777/
- 93721
- 53599
-
- XSS
-
-
-
-
-
- Exploit Scanner - FPD and Security bypass vulnerabilities
-
- http://seclists.org/fulldisclosure/2013/May/216
- 93799
-
- MULTI
-
-
-
-
-
- GA Universal 1.0 - Setting Manipulation CSRF
-
- 92237
- 52976
- http://wordpress.org/plugins/ga-universal/changelog/
-
- CSRF
- 1.0.1
-
-
-
-
-
- Export to text - Remote File Inclusion Vulnerability
-
- 51348
- 93715
-
- RFI
- 2.3
-
-
-
-
-
- qTranslate 2.5.34 - Setting Manipulation CSRF
-
- 93873
- 2013-3251
- 53126
-
- CSRF
-
-
-
-
-
- Image slider with description - Unspecified Vulnerability
-
- 53588
- 93691
-
- UNKNOWN
- 7.0
-
-
-
-
-
- User Role Editor - Cross-Site Request Forgery Vulnerability
-
- 53593
- 93699
- 25721
-
- CSRF
- 3.14
-
-
-
-
-
- EELV Newsletter 3.4.3 - lettreinfo.php Unspecified XSS
-
- 104875
-
- XSS
- 3.5.0
-
-
- EELV Newsletter - Cross-Site Scripting Vulnerability
-
- 53546
- 93685
-
- XSS
- 3.3.1
-
-
-
-
-
- Frontier Post - Publishing Posts Security Bypass
-
- 53474
- 93639
-
- UNKNOWN
-
-
-
-
-
- Spider Catalog - Cross-Site Scripting and SQL Injection Vulnerabilities
-
- 53491
- 93591
- 93593
- 93594
- 93595
- 93596
- 93597
- 93598
-
- MULTI
-
-
-
-
-
- Spider Event Calendar - Security Bypass, Cross-Site Scripting and SQLi Vulnerabilities
-
- 53481
- 93582
- 93583
- 93584
- 93585
- 93586
- 93587
- 93588
-
- MULTI
-
-
-
-
-
- AntiVirus 1.0 - PHP Backdoor Detection Bypass
-
- 95134
- http://packetstormsecurity.com/files/121833/
- http://seclists.org/fulldisclosure/2013/Jun/0
-
- UNKNOWN
-
-
- AntiVirus 1.0 - uninstall.php Direct Request Path Disclosure
-
- 95135
- http://packetstormsecurity.com/files/121833/
- http://seclists.org/fulldisclosure/2013/Jun/0
-
- FPD
- 1.1
-
-
-
-
-
- WP Maintenance Mode 1.8.7 - Setting Manipulation CSRF
-
- 94450
- 2013-3250
- 53125
-
- CSRF
- 1.8.8
-
-
-
-
-
- Ultimate Auction 1.0 - CSRF Vulnerability
-
- 94407
- 26240
-
- CSRF
-
-
-
-
-
- Leaflet Maps Marker - Multiple security issues
-
- 49845
- http://www.mapsmarker.com/2012/06/06/leaflet-maps-marker-v2-4-is-available/
-
- MULTI
- 2.4
-
-
- Leaflet Maps Marker - Tag Multiple Parameter SQL Injection
-
- 94388
- 53855
- http://www.mapsmarker.com/2013/05/24/v3-5-4-with-lots-of-translation-updates-bugfixes-is-available/
-
- SQLI
- 3.5.4
-
-
-
-
-
- Leaflet Maps Marker Pro - SQLI, XSS, Shell Upload, file delete
-
- http://www.mapsmarker.com/2014/03/26/pro-v1-5-8-with-wordpress-3-9-compatibility-improvements-based-on-a-security-audit-by-the-city-of-vienna-is-available/
-
- MULTI
- 1.5.8
-
-
-
-
-
- Xorbin Analog Flash Clock 1.0 - Flash-based XSS
-
- http://packetstormsecurity.com/files/122222/
- 2013-4692
-
- XSS
-
-
-
-
-
- Xorbin Digital Flash Clock 1.0 - Flash-based XSS
-
- http://packetstormsecurity.com/files/122223/
- 2013-4693
-
- XSS
-
-
-
-
-
- Dropdown Menu Widget 1.9.1 - Script Insertion CSRF
-
- 94771
- 2013-2704
- 52958
-
- CSRF
-
-
-
-
-
- BuddyPress Extended Friendship Request - wp-admin/admin-ajax.php friendship_request_message Parameter XSS
-
- 94807
- 2013-4944
- 54048
-
- XSS
- 1.0.2
-
-
-
-
-
- wp-private-messages - /wp-admin/profile.php msgid Parameter SQL Injection
-
- 94702
-
- SQLI
-
-
-
-
-
- Stream Video Player <= 1.4.0 - Setting Manipulation CSRF
-
- 94466
- 2013-2706
- 52954
-
- CSRF
-
-
-
-
-
- Duplicator - installer.cleanup.php package Parameter XSS
-
- 95627
- 2013-4625
- http://packetstormsecurity.com/files/122535/
-
- XSS
- 0.4.5
-
-
-
-
-
- Citizen Space 1.0 - Script Insertion CSRF
-
- 95570
- 54256
-
- CSRF
- 1.1
-
-
-
-
-
- Spicy Blogroll - spicy-blogroll-ajax.php Multiple Parameter Remote File Inclusion
-
- 95557
- 26804
- http://packetstormsecurity.com/files/122396/
-
- RFI
-
-
-
-
-
- Pie Register - wp-login.php Multiple Parameter XSS
-
- 95160
- 2013-4954
- 54123
- http://www.securityfocus.com/bid/61140
- http://xforce.iss.net/xforce/xfdb/85604
-
- XSS
- 1.31
-
-
-
-
-
- Xhanch my Twitter - CSRF in admin/setting.php
-
- 96027
- 53133
- 2013-3253
-
- CSRF
- 2.7.7
-
-
-
-
-
- SexyBookmarks - Setting Manipulation CSRF
-
- 95908
- 2013-3256
- 53138
-
- CSRF
- 6.1.5.0
-
-
-
-
-
- HMS Testimonials 2.0.10 - CSRF
-
- http://wordpress.org/plugins/hms-testimonials/changelog/
- 2013-4240
- 96107
- 96108
- 96109
- 96110
- 96111
- 54402
- 27531
- http://packetstormsecurity.com/files/122761/
-
- CSRF
- 2.0.11
-
-
- HMS Testimonials 2.0.10 - XSS
-
- http://wordpress.org/plugins/hms-testimonials/changelog/
- 2013-4241
- 96107
- 96108
- 96109
- 96110
- 96111
- 54402
- 27531
- http://packetstormsecurity.com/files/122761/
-
- XSS
- 2.0.11
-
-
-
-
-
- IndiaNIC Testimonial 2.2 - Setting Manipulation CSRF
-
- 96792
- 2013-5672
- 28054
- http://packetstormsecurity.com/files/123036/
- http://seclists.org/fulldisclosure/2013/Sep/5
-
- CSRF
-
-
- IndiaNIC Testimonial 2.2 - testimonial.php custom_query Parameter SQL Injection
-
- 96793
- 2013-5673
- 28054
- http://packetstormsecurity.com/files/123036/
- http://seclists.org/fulldisclosure/2013/Sep/5
-
- SQLI
-
-
- IndiaNIC Testimonial 2.2 - iNIC_testimonial_save Action Multiple Parameter XSS
-
- 96795
- 28054
- http://packetstormsecurity.com/files/123036/
- http://seclists.org/fulldisclosure/2013/Sep/5
-
- XSS
-
-
-
-
-
- Usernoise 3.7.8 - Feedback Submission summary Field XSS
-
- 96000
- 27403
- http://packetstormsecurity.com/files/122701/
-
- XSS
- 3.7.9
-
-
-
-
-
- platinum_seo_pack.php - s Parameter Reflected XSS
-
- 97263
- 2013-5918
-
- 1.3.8
- XSS
-
-
-
-
-
- Design Approval System 3.6 - XSS Vulnerability
-
- 97192
- 97279
- 54704
- http://seclists.org/bugtraq/2013/Sep/54
- http://packetstormsecurity.com/files/123227/
- 2013-5711
-
- 3.7
- XSS
-
-
-
-
-
- Event Easy Calendar 1.0.0 - Multiple Administrator Action CSRF
-
- 97042
- http://packetstormsecurity.com/files/123132/
-
- CSRF
-
-
- Event Easy Calendar 1.0.0 - Multiple Unspecified XSS
-
- 97041
- http://packetstormsecurity.com/files/123132/
-
- XSS
-
-
-
-
-
- Bradesco - falha.php URI Reflected XSS
-
- 97624
- 2013-5916
- http://packetstormsecurity.com/files/123356/
-
- XSS
-
-
-
-
-
- Social Hashtags 2.0.0 - New Post Title Field Stored XSS
-
- 98027
- http://packetstormsecurity.com/files/123485/
-
- XSS
-
-
-
-
-
- Simple Flickr Display - Username Field Stored XSS
-
- 97991
-
- XSS
-
-
-
-
-
- Lazy SEO 1.1.9 - lazyseo.php File Upload Arbitrary Code Execution
-
- 97662
- 2013-5961
- 28452
- http://packetstormsecurity.com/files/123349/
- http://xforce.iss.net/xforce/xfdb/87384
-
- UPLOAD
-
-
-
-
-
- SEO Watcher - Open Flash Chart Arbitrary File Creation Vulnerability
-
- http://packetstormsecurity.com/files/123493/
- 55162
-
- UPLOAD
-
-
-
-
-
- All in One SEO Pack <= 2.1.5 - aioseop_functions.php new_meta Parameter XSS
-
- 107640
- http://blog.sucuri.net/2014/05/vulnerability-found-in-the-all-in-one-seo-pack-wordpress-plugin.html
-
- 2.1.6
- XSS
-
-
- All in One SEO Pack <= 2.1.5 - Unspecified Privilege Escalation
-
- 107641
- http://blog.sucuri.net/2014/05/vulnerability-found-in-the-all-in-one-seo-pack-wordpress-plugin.html
-
- 2.1.6
- AUTHBYPASS
-
-
- All in One SEO Pack <= 2.0.3 - XSS Vulnerability
-
- 98023
- 2013-5988
- http://archives.neohapsis.com/archives/bugtraq/2013-10/0006.html
- http://packetstormsecurity.com/files/123490/
- http://www.securityfocus.com/bid/62784
- http://seclists.org/bugtraq/2013/Oct/8
- 55133
-
- 2.0.3.1
- XSS
-
-
-
-
-
- Simple Dropbox Upload - Arbitrary File Upload Vulnerability
-
- http://packetstormsecurity.com/files/123235/
- http://xforce.iss.net/xforce/xfdb/87166
- 97457
- 54856
- 2013-5963
-
- 1.8.8.1
- UPLOAD
-
-
-
-
-
- WP Ultimate Email Marketer - Multiple Vulnerabilities
-
- 97648
- 97649
- 97650
- 97651
- 97652
- 97653
- 97654
- 97655
- 97656
- 2013-3263
- 2013-3264
- 53170
- http://www.securityfocus.com/bid/62621
-
- MULTI
-
-
-
-
-
- mb.miniAudioPlayer 1.4.2 - TinyMCE Popup Unspecified Issue
-
- 101718
-
- UNKNOWN
- 1.4.3
-
-
- miniAudioPlayer 1.3.8 - maplayertinymce.php Multiple Parameter XSS
-
- 97768
- 54979
- http://packetstormsecurity.com/files/123372/
- http://www.securityfocus.com/bid/62629
-
- XSS
-
-
-
-
-
- Custom Website Data 1.2 - Record Deletion CSRF
-
- 101642
- 54823
-
- CSRF
- 1.3
-
-
- Custom Website Data 1.0 - wp-admin/admin.php ref Parameter XSS
-
- 97668
- 54865
- http://www.securityfocus.com/bid/62624
-
- XSS
- 1.1
-
-
-
-
-
- Complete Gallery Manager 3.3.3 - Arbitrary File Upload Vulnerability
-
- 97481
- 54894
- 2013-5962
- 28377
- http://packetstormsecurity.com/files/123303/
- http://xforce.iss.net/xforce/xfdb/87172
-
- 3.3.4
- UPLOAD
-
-
-
-
-
- LBG Zoominoutslider - add_banner.php name Parameter Stored XSS
-
- 97887
- 54983
- http://packetstormsecurity.com/files/123367/
-
- XSS
-
-
- LBG Zoominoutslider - settings_form.php Multiple Parameter Stored XSS
-
- 99339
- http://packetstormsecurity.com/files/123914/
- http://seclists.org/fulldisclosure/2013/Nov/30
-
- XSS
-
-
- LBG Zoominoutslider - add_playlist_record.php Multiple Parameter Stored XSS
-
- 99340
- http://packetstormsecurity.com/files/123914/
- http://seclists.org/fulldisclosure/2013/Nov/30
-
- XSS
-
-
- LBG Zoominoutslider - add_banner.php Unspecified XSS
-
- 99320
- http://packetstormsecurity.com/files/123367/
-
- XSS
-
-
- LBG Zoominoutslider - Multiple Script Direct Request Path Disclosure
-
- 99341
- http://seclists.org/fulldisclosure/2013/Nov/30
-
- FPD
-
-
-
-
-
- Woopra - Remote Code Execution
-
- http://packetstormsecurity.com/files/123525/
-
- RCE
-
-
-
-
-
- fGallery_Plus - fim_rss.php album Parameter Reflected XSS
-
- 97625
- http://packetstormsecurity.com/files/123347/
- http://seclists.org/bugtraq/2013/Sep/105
- http://seclists.org/bugtraq/2013/Sep/107
- http://seclists.org/bugtraq/2013/Sep/108
-
- XSS
-
-
-
-
-
- NOSpamPTI 2.1 - wp-comments-post.php comment_post_ID Parameter SQL Injection
-
- 97528
- 28485
- 2013-5917
- http://packetstormsecurity.com/files/123331/
-
- SQLI
-
-
-
-
-
- Comment Attachment 1.0 - XSS Vulnerability
-
- 2013-6010
- 97600
- http://packetstormsecurity.com/files/123327/
- http://www.securityfocus.com/bid/62438
-
- XSS
-
-
-
-
-
- Mukioplayer 1.6 - SQL Injection
-
- 97609
- http://packetstormsecurity.com/files/123231/
-
- SQLI
-
-
-
-
-
- Encrypted Blog 0.0.6.2 - encrypt_blog_form.php redirect_to Parameter Arbitrary Site Redirect
-
- 97881
- http://packetstormsecurity.com/files/122992/
-
- UNKNOWN
-
-
- Encrypted Blog 0.0.6.2 - encrypt_blog_form.php redirect_to Parameter Reflected XSS
-
- 97882
- http://packetstormsecurity.com/files/122992/
-
- XSS
-
-
-
-
-
- Simple Login Registration 1.0.1 - XSS
-
- 96660
- 54583
- http://packetstormsecurity.com/files/122963/
-
- XSS
-
-
-
-
-
- Post Gallery - XSS
-
- http://packetstormsecurity.com/files/122957/
-
- XSS
-
-
-
-
-
- ProPlayer 4.7.9.1 - SQL Injection
-
- 25605
- 93564
-
- SQLI
-
-
-
-
-
- Booking Calendar 4.1.4 - CSRF Vulnerability
-
- 96088
- 27399
- 54461
- http://packetstormsecurity.com/files/122691/
- http://wpbookingcalendar.com/
-
- CSRF
- 4.1.6
-
-
-
-
-
- ThinkIT <= 0.3 - wp-admin/admin.php Contact Form Deletion CSRF
-
- 96514
- 54592
- 27751
- http://packetstormsecurity.com/files/122898/
-
- CSRF
-
-
- ThinkIT <= 0.2 - wp-admin/admin.php toitcf_current_id Parameter XSS
-
- 96515
- 54592
- 27751
- http://packetstormsecurity.com/files/122898/
-
- XSS
- 0.3
-
-
-
-
-
- Quick Contact Form 6.2 - Unspecified XSS
-
- 101782
-
- XSS
- 6.3
-
-
- Quick Contact Form 6.0 - Persistent XSS
-
- 98279
- 28808
- 55172
- http://packetstormsecurity.com/files/123549/
- http://quick-plugins.com/quick-contact-form/
-
- XSS
- 6.1
-
-
-
-
-
- Quick Paypal Payments 3.0 - Payment Sending Multiple Parameter XSS
-
- 98715
- 55292
- http://packetstormsecurity.com/files/123662/
-
- XSS
-
-
-
-
-
- Email Newsletter 8.0 - 'option' Parameter Information Disclosure Vulnerability
-
- 83541
- 49758
- http://www.securityfocus.com/bid/53850
-
- FPD
-
-
- Email Newsletter 8.0 - csv/export.php Direct Request Information Disclosure
-
- 82812
- http://packetstormsecurity.org/files/113322/
-
- UNKNOWN
-
-
-
-
-
- IndiaNIC FAQs Manager 1.0 - Blind SQL Injection
-
- 91623
- 24868
- http://packetstormsecurity.com/files/120911/
-
- SQLI
-
-
- IndiaNIC FAQs Manager 1.0 - Ask Question Form question Parameter XSS
-
- 91624
- 24867
- 52780
- http://packetstormsecurity.com/files/120910/
-
- XSS
-
-
- IndiaNIC FAQs Manager 1.0 - CAPTCHA Value Disclosure
-
- 91625
- 24867
- http://packetstormsecurity.com/files/120910/
-
- UNKNOWN
-
-
- IndiaNIC FAQs Manager 1.0 - FAQ Setting Manipulation CSRF
-
- 91626
- 52780
- 24867
- http://packetstormsecurity.com/files/120910/
-
- CSRF
-
-
-
-
-
- Booking System - events_facualty_list.php eid Parameter Reflected XSS
-
- 96740
- http://packetstormsecurity.com/files/122289/
-
- XSS
-
-
- Booking System 1.2 - dopbs-backend-forms.php booking_form_id Parameter SQL injection
-
- 107204
- 2014-3210
- http://www.securityfocus.com/archive/1/532168
-
- SQLI
- 1.3
-
-
-
-
-
- JS Restaurant - popup.php restuarant_id Parameter SQL Injection
-
- 96743
- http://packetstormsecurity.com/files/122316/
-
- SQLI
-
-
-
-
-
- FlagEm - flagit.php cID Parameter XSS
-
- 98226
- http://www.securityfocus.com/bid/61401
- http://xforce.iss.net/xforce/xfdb/85925
- http://packetstormsecurity.com/files/122505/
-
- XSS
-
-
-
-
-
- Chat - message Parameter XSS
-
- 95984
- 54403
-
- XSS
-
-
-
-
-
- Shareaholic - Unspecified CSRF
-
- 96321
- 54529
-
- CSRF
- 7.0.3.4
-
-
-
-
-
- Page Showcaser Boxes - Title Field Stored XSS
-
- 97579
-
- XSS
-
-
-
-
-
- A Forms 1.4.0 - a-forms.php a_form_tracking_page FunctionMultiple Parameters SQL Injection
-
- 96404
-
- SQLI
- 1.4.2
-
-
- A Forms 1.4.0 - Form Submission CSRF
-
- 96381
- 54489
-
- CSRF
- 1.4.1
-
-
- A Forms 1.4.0 - a-forms.php a_form_shortcode Function Multiple Parameter XSS
-
- 96410
- 54489
-
- XSS
- 1.4.2
-
-
- A Forms 1.4.0 - a-forms.php aform_css_file_selector() Function css_file_selection Parameter XSS
-
- 96809
- 54489
-
- XSS
- 1.4.2
-
-
- A Forms 1.4.0 - a-forms.php add_field_to_section Function Multiple Parameter XSS
-
- 96810
- 54489
-
- XSS
- 1.4.2
-
-
- A Forms 1.4.0 - a-forms.php a_form_initial_page Function Multiple Parameter XSS
-
- 96811
- 54489
-
- XSS
- 1.4.2
-
-
- A Forms 1.4.0 - a-forms.php a_form_page Function Multiple Parameter XSS
-
- 96812
- 54489
-
- XSS
- 1.4.2
-
-
- A Forms 1.4.0 - a-forms.php a_form_section_page Function message Parameter XSS
-
- 96813
- 54489
-
- XSS
- 1.4.2
-
-
- A Forms 1.4.0 - a-forms.php a_form_tracking_page Function Multiple Parameter XSS
-
- 96814
- 54489
-
- XSS
- 1.4.2
-
-
-
-
-
- ShareThis 7.0.3 - Setting Manipulation CSRF
-
- 96884
- 2013-3479
- 53135
- http://www.securityfocus.com/bid/62154
-
- CSRF
- 7.0.6
-
-
-
-
-
- Simple Flash Video 1.7 - Cross Site Scripting
-
- 98371
- http://packetstormsecurity.com/files/123562/
- http://www.securityfocus.com/bid/62950
-
- XSS
-
-
-
-
-
- Landing Pages 1.2.3 - Unspecified Issue
-
- 102442
-
- UNKNOWN
- 1.3.1
-
-
- Landing Pages 1.2.1 - module.utils.php post Parameter SQL Injection
-
- 98334
- 2013-6243
- 55192
- http://www.securityfocus.com/bid/62942
- http://xforce.iss.net/xforce/xfdb/87803
-
- SQLI
- 1.2.3
-
-
- Landing Pages 1.2.1 - module.redirect-ab-testing.php permalink_name Parameter SQL Injection
-
- 102407
-
- SQLI
- 1.2.3
-
-
-
-
-
- Cart66 1.5.1.14 - admin.php cart66-products Page Product Manipulation CSRF
-
- 98352
- 2013-5977
- 28959
- 55265
- http://packetstormsecurity.com/files/123587/
-
- CSRF
- 1.5.1.15
-
-
- Cart66 - admin.php cart66-products Page Multiple Field Stored XSS
-
- 98353
- 2013-5978
- 28959
- http://packetstormsecurity.com/files/123587/
-
- XSS
- 1.5.1.15
-
-
-
-
-
- Wise Search Widget 1.1 - s Parameter Reflected XSS
-
- 97989
-
- XSS
-
-
-
-
-
- Catholic Liturgical Calendar Widget 0.0.1 - Title Field Stored XSS
-
- 98026
-
- XSS
- 0.0.2
-
-
-
-
-
- Zenphoto 1.4.5.2 - wordpress_import.php wp_prefix Function SQL Injection
-
- 98091
- http://packetstormsecurity.com/files/123501/
- http://www.securityfocus.com/bid/62815
- http://seclists.org/bugtraq/2013/Oct/20
-
- SQLI
- 1.4.5.4
-
-
-
-
-
- Group Documents 1.2.1 - Document Upload Multiple Field Stored XSS
-
- 103475
- http://seclists.org/fulldisclosure/2014/Feb/170
-
- XSS
- 1.2.2
-
-
- Group Documents 1.2.1 - bp-group-documents-settings.php file Parameter Remote Path Traversal File Location Manipulation
-
- 103476
- http://seclists.org/fulldisclosure/2014/Feb/170
-
- UNKNOWN
- 1.2.2
-
-
- Group Documents 1.2.1 - Document Property Manipulation CSRF
-
- 103477
- http://seclists.org/fulldisclosure/2014/Feb/170
-
- CSRF
- 1.2.2
-
-
- Group Documents 1.2 - File Uploading Multiple Parameter Stored XSS
-
- 98246
- 55130
- http://www.securityfocus.com/bid/62886
-
- XSS
- 1.2.2
-
-
-
-
-
- AB Categories Search Widget 0.1 - s Parameter Reflected XSS
-
- 97987
-
- XSS
-
-
-
-
-
- SL User Create 0.2.4 - LSL script Secret String Weakness Information Disclosure
-
- 98456
- 55262
- http://www.securityfocus.com/bid/63009
-
- UNKNOWN
- 0.2.5
-
-
-
-
-
- Spider Video Player 2.1 - settings.php theme Parameter SQL Injection
-
- 92264
- 2013-3532
- http://packetstormsecurity.com/files/121250/
- http://www.securityfocus.com/bid/59021
- http://xforce.iss.net/xforce/xfdb/83374
-
- SQLI
-
-
- Spider Video Player 2.1 - settings.php s_v_player_id Parameter Reflected XSS
-
- 100848
- http://packetstormsecurity.com/files/124353/
-
- XSS
-
-
-
-
-
- Finalist - vote.php id Parameter Reflected XSS
-
- 98665
- http://packetstormsecurity.com/files/123597/
-
- XSS
-
-
- Finalist - vote.php id Parameter SQL Injection
-
- 98665
- http://packetstormsecurity.com/files/120951/
-
- SQLI
-
-
-
-
-
- Dexs PM System 1.0.1 - Private Message subject Parameter Stored XSS
-
- 98668
- 55296
- 28970
- http://packetstormsecurity.com/files/123634/
- http://www.securityfocus.com/bid/63021
-
- XSS
-
-
-
-
-
- Video Metabox 1.1 - Persistent XSS Vulnerability Disclosure
-
- 98641
- 55257
- http://www.securityfocus.com/bid/63172
- http://securityundefined.com/wordpress-video-metabox-plugin-persistent-xss-vulnerability-disclosure/
-
- XSS
- 1.1.1
-
-
-
-
-
- WP Realty - MySQL Time Based Injection
-
- 98748
- 29021
- http://packetstormsecurity.com/files/123655/
- http://www.securityfocus.com/bid/63217
-
- SQLI
-
-
- WP Realty - index_ext.php listing_id Parameter Reflected XSS
-
- 101583
- http://packetstormsecurity.com/files/124418/
-
- XSS
-
-
-
-
-
- Feed - news_dt.php nid Parameter SQL Injection
-
- 94804
- http://packetstormsecurity.com/files/122260/
-
- SQLI
-
-
-
-
-
- Social Sharing Toolkit 2.1.1 - Setting Manipulation CSRF
-
- 98717
- 2013-2701
- 52951
- http://www.securityfocus.com/bid/63198
-
- CSRF
-
-
- Social Sharing Toolkit 2.1.1 - Unspecified XSS
-
- 98931
- 2013-6280
-
- XSS
- 2.1.2
-
-
-
-
-
- Videowall - index.php page_id Parameter Reflected XSS
-
- 98765
- http://packetstormsecurity.com/files/123693/
- http://seclists.org/bugtraq/2013/Oct/98
-
- XSS
-
-
-
-
-
- Really simple Facebook Twitter share buttons 2.10.4 - Settings Page Manipulation CSRF
-
- 97190
- 54707
- http://www.securityfocus.com/bid/62268
-
- CSRF
- 2.10.5
-
-
-
-
-
- Car Demon 1.0.1 - /wp-admin/edit.php Multiple Parameter XSS
-
- 90365
- 51088
-
- XSS
-
-
- Car Demon 1.0.1 - /wp-admin/post.php Multiple Parameter XSS
-
- 90366
- 51088
-
- XSS
-
-
-
-
-
- Blue Wrench Video Widget 1.0.2 - admin.php bw-videos Page Multiple Action CSRF
-
- 2013-6797
- 98922
- 55456
- http://securityundefined.com/wordpress-plugin-blue-wrench-video-widget-csrf-persistent-xss-0day-disclosure/
-
- CSRF
-
-
- Blue-Wrench-Video-Widget 1.0.2 - admin.php bw-videos Page Multiple Parameter Stored XSS
-
- 2013-6797
- 98923
- 55456
- http://securityundefined.com/wordpress-plugin-blue-wrench-video-widget-csrf-persistent-xss-0day-disclosure/
-
- XSS
-
-
-
-
-
- MailUp 1.3.2 - ajax.functions.php Ajax Function Call Handling XSS Weakness
-
- 91274
- 2013-0731
- 2013-2640
- 51917
-
- XSS
- 1.3.3
-
-
-
-
-
- WP Online Store 1.3.1 - index.php slug Parameter Traversal Local File Inclusion
-
- 90243
- 50836
-
- LFI
- 1.3.2
-
-
- WP Online Store 1.3.1 - index.php Multiple Parameter Traversal Arbitrary File Access
-
- 90244
- 50836
-
- UNKNOWN
- 1.3.2
-
-
-
-
-
- Payment Gateways Caller for WP e-Commerce 0.1.0 - load_merchant Parameter Traversal Local file Inclusion
-
- 98916
- http://packetstormsecurity.com/files/123744/
-
- LFI
- 0.1.1
-
-
-
-
-
- Easy Photo Album 1.1.5 - Album Information Disclosure
-
- 98802
-
- AUTHBYPASS
- 1.1.6
-
-
-
-
-
- Hungred Post Thumbnail - hpt_file_upload.php File Upload PHP Code Execution
-
- 82830
- http://packetstormsecurity.com/files/113402/
- http://www.securityfocus.com/bid/53898
-
- RCE
-
-
-
-
-
- Spreadsheet - /dhtmlxspreadsheet/codebase/spreadsheet.php page Parameter Reflected XSS
-
- 98831
- 2013-6281
- 55396
- http://packetstormsecurity.com/files/123699/
- http://www.securityfocus.com/bid/63256
-
- XSS
-
-
-
-
-
- Tweet Blender 4.0.1 - Unspecified XSS
-
- 98978
- 2013-6342
- 55780
- http://packetstormsecurity.com/files/124047/
-
- XSS
- 4.0.2
-
-
-
-
-
- WordPress SB Uploader 3.9 - Arbitrary File Upload Vulnerability
-
- http://packetstormsecurity.com/files/119159/
-
- UPLOAD
-
-
-
-
-
- Connections Business Directory 0.7.9.3 - includes/template/class.template-parts.php Pagination URL Handling XSS
-
- 106558
-
- XSS
- 0.7.9.4
-
-
- Connections <= 0.7.1.5 - Unspecified Security Vulnerability
-
- 2011-5254
- http://www.securityfocus.com/bid/51204
-
- XSS
- 0.7.1.5
-
-
-
-
-
- Gallery Bank 2.0.19 - edit-album.php album_id Parameter Reflected XSS
-
- 99045
- 55443
- http://packetstormsecurity.com/files/123924/
- http://www.securityfocus.com/bid/63382
-
- XSS
- 2.0.20
-
-
- Gallery Bank 2.0.19 - Multiple Unspecified Issues
-
- 99046
- 55443
- http://www.securityfocus.com/bid/63382
-
- UNKNOWN
- 2.0.20
-
-
- Gallery Bank 2.0.19 - album-gallery-bank-class.php recordsArray Parameter Reflected XSS
-
- 99345
- 55443
- http://www.securityfocus.com/bid/63385
- http://seclists.org/fulldisclosure/2013/Nov/38
-
- XSS
- 2.0.20
-
-
-
-
-
- Rockhoist Ratings 1.2.2 - wp-admin/admin-ajax.php postID Parameter SQL Injection
-
- 99195
- 55445
- http://www.securityfocus.com/bid/63441
-
- SQLI
-
-
-
-
-
- Checkout Plugin - File Upload Remote Code Execution
-
- 99225
- http://packetstormsecurity.com/files/123866/
-
- RCE
-
-
-
-
-
- MobileChief - jQuery Validation Cross-Site Scripting Vulnerability
-
- 55501
- http://packetstormsecurity.com/files/123809/
-
- XSS
-
-
-
-
-
- Facebook Survey Pro - timeline/index.php id Parameter SQL Injection
-
- 87817
- 22853
- http://packetstormsecurity.com/files/118238/
- http://www.securityfocus.com/bid/56595
- http://xforce.iss.net/xforce/xfdb/80141
-
- SQLI
-
-
-
-
-
- Live Comment Preview 2.0.2 - Comment Field Preview XSS
-
- 92944
-
- XSS
-
-
-
-
-
- Polldaddy Polls and Rating 2.0.24 - polldaddy-org.php unique_id Ratings Shortcode XSS
-
- 108640
- 2014-4856
- 59323
- http://www.securityfocus.com/bid/68512
-
- XSS
- 2.0.25
-
-
- Polldaddy Polls and Rating 2.0.23 - polldaddy-org.php polldaddy-ratings-title-filter Parameter Reflected XSS
-
- 108641
- http://www.securityfocus.com/bid/68512
-
- XSS
- 2.0.24
-
-
- Polldaddy Polls and Ratings 2.0.20 - Cross-Site Request Forgery Vulnerability
-
- 99515
- 55464
- http://www.securityfocus.com/bid/63557
-
- CSRF
- 2.0.21
-
-
-
-
-
- Jigoshop 1.8 - Multiple Script Direct Request Path Disclosure
-
- 99485
-
- FPD
-
-
-
-
-
- FCChat 2.2.11-2.2.13 - Upload.php Arbitrary File Upload Vulnerability
-
- http://www.securityfocus.com/bid/53855
-
- UPLOAD
-
-
-
-
-
- Another WordPress Classifieds - Unspecified Image Upload Vulnerability
-
- http://www.securityfocus.com/bid/52861
-
- UPLOAD
-
-
-
-
-
- Picturesurf Gallery 1.2 - upload.php Arbitrary File Upload Vulnerability
-
- http://www.securityfocus.com/bid/53894
-
- UPLOAD
-
-
-
-
-
- Social Slider <= 5.6.5 - social-slider-2/ajax.php rA Parameter SQL Injection
-
- 74421
- 45549
- 17617
-
- SQLI
- 6.0.0
-
-
-
-
-
- Redirection 2.3.3 - view/admin/item.php URL Handling Reflected XSS
-
- 101774
-
- XSS
- 2.3.4
-
-
- Redirection - view/admin/log_item.php Non-existent Posts Referer HTTP Header XSS
-
- 2011-4562
- 76092
- 77447
- 46310
-
- XSS
- 2.2.10
-
-
- Redirection - wp-admin/tools.php id Parameter XSS
-
- 74783
- 45782
-
- XSS
- 2.2.9
-
-
-
-
-
- eShop - wp-admin/admin.php Multiple Parameter XSS
-
- 74464
- 45553
- http://seclists.org/bugtraq/2011/Aug/52
- http://www.htbridge.ch/advisory/multiple_xss_in_eshop_for_wordpress.html
-
- XSS
- 6.2.9
-
-
-
-
-
- All in One Adsense YPN 2.0.1 - all-in-one-adsense-and-ypn.php Unspecified XSS
-
- 74900
- 45579
-
- XSS
-
-
- All in One Adsense YPN 2.0.1 - all-in-one-adsense-and-ypn.php Direct Request AdSense Account Manipulation
-
- 74899
- 45579
-
- XSS
-
-
-
-
-
- Search N Save - SearchNSave/error_log Direct Request Path Disclosure
-
- 95196
- 54078
-
- FPD
-
-
-
-
-
- TagGator - 'tagid' Parameter SQL Injection Vulnerability
-
- http://www.securityfocus.com/bid/52908
-
- SQLI
-
-
-
-
-
- Uploadify Integration 0.9.6 - Multiple Cross Site Scripting Vulnerabilities
-
- 81093
- 81094
- 81095
- http://www.securityfocus.com/bid/52944
-
- XSS
-
-
-
-
-
- WPsc MijnPress - 'rwflush' Parameter Cross Site Scripting Vulnerability
-
- http://www.securityfocus.com/bid/53302
-
- XSS
-
-
-
-
-
- Leaflet Maps Marker 3.5.2 - Two SQL Injection Vulnerabilities
-
- 53855
-
- SQLI
- 3.5.3
-
-
-
-
-
- XML Sitemap Generator 3.2.8 - XML File Overwrite Arbitrary Code Execution
-
- 89411
- http://packetstormsecurity.com/files/119357/
-
- RCE
-
-
-
-
-
- Spam Free Plugin 1.9.2 - Multiple Script Direct Request Path Disclosure
-
- 88954
- http://xforce.iss.net/xforce/xfdb/81007
-
- FPD
-
-
- Spam Free Plugin 1.9.2 - IP Blocklist Restriction Bypass
-
- 88955
- http://xforce.iss.net/xforce/xfdb/81006
- http://packetstormsecurity.com/files/119274/
-
- AUTHBYPASS
-
-
-
-
-
- Editorial Calendar 2.6 - Post Title XSS
-
- 90226
-
- XSS
- 2.7
-
-
- Editorial Calendar 2.6 - Permission Verification Arbitrary Calendar Post Deletion
-
- 90227
- 52218
-
- AUTHBYPASS
- 2.7
-
-
- Editorial Calendar 2.6 - Post Query Multiple Filter SQL Injection
-
- 90228
-
- SQLI
-
-
-
-
-
- ShareYourCart 1.6.1 - SDK Multiple Unspecified Path Disclosure
-
- 81618
- 2012-4332
- 48960
-
- UNKNOWN
- 1.7.1
-
-
-
-
-
- ALO EasyMail Newsletter 2.4.7 - Multiple Unspecified XSS
-
- 82324
- 49320
-
- XSS
- 2.4.8
-
-
-
-
-
- Contact Form 7 <= 3.7.1 - Security Bypass Vulnerability
-
- 2014-2265
- http://www.securityfocus.com/bid/66381/
-
- AUTHBYPASS
- 3.7.2
-
-
- Contact Form 7 & Old WP Versions - Crafted File Extension Upload Remote Code Execution
-
- 102776
- http://packetstormsecurity.com/files/125018/
- http://seclists.org/fulldisclosure/2014/Feb/0
-
- RCE
-
-
- Contact Form 7 <= 3.5.2 - Arbitrary File Upload Remote Code Execution
-
- 100189
- http://packetstormsecurity.com/files/124154/
-
- UPLOAD
- 3.5.3
-
-
-
-
-
- Store Locator <= 2.6.1 - Cross-Site Request Forgery Vulnerability
-
- 100485
- 55276
-
- CSRF
- 2.12
-
-
-
-
-
- Optinfirex - lp/index.php id Parameter Reflected XSS
-
- 100435
- http://packetstormsecurity.com/files/124188/
-
- XSS
-
-
-
-
-
- Amerisale-Re - Remote Shell Upload
-
- http://packetstormsecurity.com/files/124992/
-
- UPLOAD
-
-
- Amerisale-Re - netriesdetail/upload.php edit Parameter Reflected XSS
-
- 100434
- http://packetstormsecurity.com/files/124187/
- http://xforce.iss.net/xforce/xfdb/89263
-
- XSS
-
-
-
-
-
- JS MultiHotel 2.2.1 - includes/show_image.php file Parameter Remote File Inclusion DoS
-
- 105185
- http://packetstormsecurity.com/files/125959/
- http://seclists.org/fulldisclosure/2014/Mar/428
-
- RFI
-
-
- JS MultiHotel 2.2.1 - includes/delete_img.php path Parameter Reflected XSS
-
- 105186
- http://packetstormsecurity.com/files/125959/
- http://seclists.org/fulldisclosure/2014/Mar/428
- http://www.securityfocus.com/bid/66529
-
- XSS
-
-
- JS MultiHotel 2.2.1 - Multiple Script Direct Request Path Disclosure
-
- 105187
- http://packetstormsecurity.com/files/125959/
- http://seclists.org/fulldisclosure/2014/Mar/428
-
- FPD
-
-
- JS MultiHotel 2.2.1 - includes/timthumb.php src Parameter Direct Request Path Disclosure
-
- 105119
- http://seclists.org/fulldisclosure/2014/Mar/413
- http://www.securityfocus.com/bid/66529
-
- FPD
-
-
- JS MultiHotel 2.2.1 - refreshDate.php roomid Parameter Reflected XSS
-
- 100575
- 55919
- http://packetstormsecurity.com/files/124239/
- http://www.securityfocus.com/bid/64045
-
- XSS
-
-
-
-
-
- DZS Video Gallery - ajax.php source Parameter Reflected XSS
-
- 103283
- 56904
- http://packetstormsecurity.com/files/125179/
-
- RCE
-
-
- DZS Video Gallery - upload.php File Upload Remote Code Execution
-
- 100620
- 29834
-
- RCE
-
-
- DZS Video Gallery 3.1.3 - Remote File Disclosure
-
- 100750
- http://packetstormsecurity.com/files/124317/
-
- FPD
-
-
- DZS Video Gallery - preview_allchars.swf logoLink Parameter Reflected XSS
-
- 107521
- 2014-3923
- http://packetstormsecurity.com/files/126846/
- http://www.securityfocus.com/bid/67698
- http://seclists.org/fulldisclosure/2014/May/157
-
- XSS
-
-
- DZS Video Gallery - deploy/preview_skin_overlay.swf logoLink Parameter Reflected XSS
-
- 107522
- 2014-3923
- http://packetstormsecurity.com/files/126846/
- http://www.securityfocus.com/bid/67698
- http://seclists.org/fulldisclosure/2014/May/157
-
- XSS
-
-
- DZS Video Gallery - deploy/preview.swf logoLink Parameter Reflected XSS
-
- 107523
- 2014-3923
- http://packetstormsecurity.com/files/126846/
- http://www.securityfocus.com/bid/67698
- http://seclists.org/fulldisclosure/2014/May/157
-
- XSS
-
-
- DZS Video Gallery - preview_skin_rouge.swf logoLink Parameter Reflected XSS
-
- 107524
- 2014-3923
- http://packetstormsecurity.com/files/126846/
- http://www.securityfocus.com/bid/67698
- http://seclists.org/fulldisclosure/2014/May/157
-
- XSS
-
-
-
-
-
- AskApache Firefox Adsense 3.0 - Unspecified CSRF
-
- 100662
- 2013-6992
- https://www.htbridge.com/advisory/HTB23188
-
- CSRF
-
-
-
-
-
- Ad-minister 0.6 - Unspecified XSS
-
- 100663
- 2013-6993
- http://packetstormsecurity.com/files/124604/
- https://www.htbridge.com/advisory/HTB23187
-
- XSS
-
-
-
-
-
- TDO Mini Forms 0.13.9 - tdomf-upload-inline.php File Upload Remote Code Execution
-
- 100847
- http://packetstormsecurity.com/files/124352/
-
- RCE
-
-
-
-
-
- HuskerPortfolio 0.3 - huskerPortfolio.php File Upload CSRF
-
- 100845
- http://packetstormsecurity.com/files/124359/
-
- CSRF
-
-
-
-
-
- FormCraft - form.php id Parameter SQL Injection
-
- 100877
- 56044
- http://packetstormsecurity.com/files/124343/
-
- SQLI
-
-
-
-
-
- Zarzadzanie Kontem - ajaxfilemanager.php File Upload Arbitrary Code Execution
-
- 87834
- http://packetstormsecurity.com/files/118322/
-
- UPLOAD
-
-
-
-
-
- Ads Box - iframe_ampl.php count Parameter SQL Injection
-
- 88257
- http://packetstormsecurity.com/files/118342/
- http://www.securityfocus.com/bid/56681
- http://xforce.iss.net/xforce/xfdb/80256
-
- SQLI
-
-
-
-
-
- Broken Link Checker 1.9.1 - Bulk Action Form URL Handling XSS
-
- 101059
- 56053
-
- XSS
- 1.9.2
-
-
- Broken Link Checker 1.9.1 - Sort Direction Query Argument Handling XSS
-
- 101066
- 56053
-
- XSS
- 1.9.2
-
-
-
-
-
- Easy Career Openings - jobid Parameter SQL Injection
-
- 100677
- http://packetstormsecurity.com/files/124309/
-
- SQLI
-
-
-
-
-
- Q and A 1.0.6.2 - Multiple Scripts Direct Request Path Disclosure
-
- 100793
-
- FPD
-
-
-
-
-
- Meta Slider 2.5 - metaslider.php id Parameter XSS
-
- 108611
- 2014-4846
- http://packetstormsecurity.com/files/127288/
- http://www.securityfocus.com/bid/68283
-
- XSS
-
-
- Meta Slider 2.1.6 - Multiple Script Direct Request Path Disclosure
-
- 100794
-
- FPD
-
-
-
-
-
- Custom Tables 3.4.4 - iframe.php key Parameter XSS
-
- 83646
- 49823
-
- XSS
-
-
-
-
-
- WP Socializer 2.4.2 - admin/wpsr-services-selector.php val Parameter XSS
-
- 83645
- 49824
-
- XSS
-
-
-
-
-
- church_admin 0.33.4.5 - includes/validate.php id Parameter XSS
-
- 83644
- 49827
-
- XSS
-
-
-
-
-
- PHPFreeChat 0.2.8 - lib/csstidy-1.2/css_optimiser.php url Parameter XSS
-
- 83642
- 49826
-
- XSS
-
-
-
-
-
- Artiss Code Embed 2.0.1 - wp-admin/admin.php suffix Parameter XSS
-
- 83686
- 49848
-
- XSS
- 2.0.2
-
-
-
-
-
- Dewplayer - dewplayer-vinyl.swf xml Parameter XML File Handling XSS
-
- 101353
- http://packetstormsecurity.com/files/124582/
- http://www.securityfocus.com/bid/64506
- http://seclists.org/fulldisclosure/2013/Dec/192
-
- XSS
-
-
- Dewplayer - dewplayer-vinyl-en.swf xml Parameter XML File Handling XSS
-
- 101352
- http://packetstormsecurity.com/files/124582/
- http://www.securityfocus.com/bid/64506
- http://seclists.org/fulldisclosure/2013/Dec/192
-
- XSS
-
-
- Dewplayer <= 1.2 - dewplayer.php Direct Request Path Disclosure Weakness
-
- 101440
- http://seclists.org/fulldisclosure/2013/Dec/209
-
- FPD
-
-
-
-
-
- Advanced Dewplayer - dewplayer-vinyl.swf xml Parameter XML File Handling XSS
-
- 101353
- http://packetstormsecurity.com/files/124582/
- http://www.securityfocus.com/bid/64506
- http://seclists.org/fulldisclosure/2013/Dec/192
-
- XSS
-
-
- Dewplayer - dewplayer-vinyl-en.swf xml Parameter XML File Handling XSS
-
- 101352
- http://packetstormsecurity.com/files/124582/
- http://www.securityfocus.com/bid/64506
- http://seclists.org/fulldisclosure/2013/Dec/192
-
- XSS
-
-
- Advanced Dewplayer <= 1.2 - dewplayer.php Direct Request Path Disclosure Weakness
-
- 101440
- http://seclists.org/fulldisclosure/2013/Dec/209
-
- FPD
-
-
- Advanced Dewplayer <= 1.2 - download-file.php dew_file Parameter Traversal Arbitrary File Access
-
- 101513
- 55941
- http://seclists.org/oss-sec/2013/q4/566
-
- UNKNOWN
-
-
-
-
-
- SEM WYSIWYG - Arbitrary File Upload
-
- http://packetstormsecurity.com/files/115789/
-
- UPLOAD
-
-
-
-
-
- Recommend a friend 2.0.2 - inc/raf_form.php current_url Parameter Reflected XSS
-
- 101487
- 56209
- 2013-7276
- http://packetstormsecurity.com/files/124587/
-
- XSS
-
-
-
-
-
- Securimage-WP 3.2.4 - siwp_test.php URI XSS
-
- 93259
- 53376
- http://packetstormsecurity.com/files/121588/
- http://xforce.iss.net/xforce/xfdb/84186
-
- XSS
-
-
-
-
-
- Amazon Affiliate Link Localizer 1.8.2 - amazon_affiliate_link_localizer.php amzn_com Parameter XSS
-
- 100783
- http://www.dfcode.org/code.php?id=27
-
- XSS
-
-
-
-
-
- MaxButtons 1.19.0 - includes/maxbuttons-button-css.php Authentication Bypass
-
- 101773
- 56272
-
- AUTHBYPASS
- 1.20.0
-
-
-
-
-
- April's Super Functions Pack 1.4.7 - readme.php page Parameter Reflected XSS
-
- 101807
- 55576
-
- XSS
- 1.4.8
-
-
-
-
-
- WordPress Connect 2.0.3 - Editor Pages Unspecified XSS
-
- 101716
- 56238
-
- XSS
-
-
-
-
-
- Page Layout Builder 1.3.4 - includes/layout-settings.php layout_settings_id Parameter Reflected XSS
-
- 101723
- 56214
-
- XSS
- 1.3.6
-
-
- Page Layout Builder 1.3.4 - Unspecified Issue
-
- 101724
- 56214
-
- UNKNOWN
- 1.3.6
-
-
-
-
-
- Foliopress WYSIWYG - Unspecified XSS
-
- 101726
- 56261
-
- XSS
- 2.6.8.5
-
-
-
-
-
- intouch 2.0 - intouch.js.php intouch_failure Parameter Reflected XSS
-
- 101822
- http://packetstormsecurity.com/files/124687/
- http://www.securityfocus.com/bid/64680
-
- XSS
-
-
-
-
-
- Nmedia MailChimp 3.1 - api_mailchimp/postToMailChimp.php abs_path Parameter XSS
-
- 83083
- 49538
-
- XSS
- 3.2
-
-
-
-
-
- NS Utilities 1.0 - Unspecified Remote Issue
-
- 82944
- 49476
-
- UNKNOWN
- 1.1
-
-
-
-
-
- Spiffy XSPF Player 0.1 - playlist.php playlist_id Parameter SQL Injection
-
- 92258
- 2013-3530
- http://packetstormsecurity.com/files/121204/
- http://www.securityfocus.com/bid/58976
- http://xforce.iss.net/xforce/xfdb/83345
-
- SQLI
-
-
-
-
-
- Easy Media Gallery 1.2.29 - wp-admin/edit.php Multiple Parameter Stored XSS
-
- 103779
- http://packetstormsecurity.com/files/125396/
- http://www.securityfocus.com/bid/65804
-
- XSS
-
-
- Easy Media Gallery 1.2.25 - includes/emg-settings.php spg_add_admin Function Admin User Creation CSRF
-
- 101941
- 56408
- http://incolumitas.com/2013/12/17/exploiting-wordpress-plugins-using-insecure-admin-forms-no-3-example-exploit-included/
-
- CSRF
- 1.2.27
-
-
-
-
-
- WP-Members 2.8.9 - profile.php Multiple Parameter Stored XSS
-
- 101946
- 56271
- http://packetstormsecurity.com/files/124720/
- http://www.securityfocus.com/bid/64713
-
- XSS
- 2.8.10
-
-
- WP-Members 2.8.9 - wp-login.php register Action Multiple Parameter Reflected XSS
-
- 101947
- 56271
- http://packetstormsecurity.com/files/124720/
- http://www.securityfocus.com/bid/64713
-
- XSS
- 2.8.10
-
-
-
-
-
- mb.YTPlayer for background videos 1.7.2 - TinyMCE Popup Unspecified Issue
-
- 101718
- 56270
-
- UNKNOWN
- 1.7.3
-
-
-
-
-
- Keyring 1.5 - OAuth Example Page XSS
-
- 56367
-
- XSS
-
-
-
-
-
- AVChat Video Chat 1.4.1 - index_popup.php Multiple Parameters Reflected XSS
-
- 102206
- 56447
-
- XSS
- 1.4.2
-
-
-
-
-
- GroupDocs Comparison 1.0.2 - grpdocscomparison.php Multiple Parameter XSS
-
- 102297
-
- XSS
- 1.0.3
-
-
-
-
-
- GroupDocs Signature 1.2.0 - grpdocs-dialog.php Multiple Parameter XSS
-
- 102298
-
- XSS
- 1.2.1
-
-
- GroupDocs Signature 1.2.0 - options.php Multiple Parameter XSS
-
- 102299
-
- XSS
- 1.2.1
-
-
-
-
-
- GroupDocs Viewer 1.4.1 - options.php Multiple Parameter XSS
-
- 102299
-
- XSS
- 1.4.2
-
-
- GroupDocs Viewer 1.4.1 - grpdocs-dialog.php Multiple Parameter XSS
-
- 102300
-
- XSS
- 1.4.2
-
-
-
-
-
- GroupDocs Document Annotation 1.3.8 - options.php Multiple Parameter XSS
-
- 102299
-
- XSS
- 1.3.9
-
-
- GroupDocs Document Annotation 1.3.8 - grpdocs-dialog.php Multiple Parameter XSS
-
- 102301
-
- XSS
- 1.3.9
-
-
-
-
-
- Manage Calameo Publications 1.1.0 - thickbox_content.php attachment_id Parameter Reflected XSS
-
- 102433
- 56428
-
- XSS
- 1.1.1
-
-
-
-
-
- SS Downloads 1.4.4.1 - services/getfile.php file Parameter XSS
-
- 102501
-
- XSS
- 1.5
-
-
- SS Downloads 1.4.4.1 - ss-downloads.php Multiple Variables XSS
-
- 102502
-
- XSS
- 1.5
-
-
- SS Downloads 1.4.4.1 - templates/download.php Multiple Parameters Reflected XSS
-
- 102503
- 56428
-
- XSS
- 1.5
-
-
- SS Downloads 1.4.4.1 - templates/register.php Multiple Parameter Reflected XSS
-
- 102504
- 56428
-
- XSS
- 1.5
-
-
- SS Downloads 1.4.4.1 - templates/emailsent.php Multiple Parameter Reflected XSS
-
- 102537
- 56532
-
- XSS
- 1.5
-
-
- SS Downloads 1.4.4.1 - templates/emailform.php Multiple Parameter Reflected XSS
-
- 102538
- 56532
- http://packetstormsecurity.com/files/124958/
-
- XSS
- 1.5
-
-
- SS Downloads 1.4.4.1 - templates/emailandnameform.php Multiple Parameter Reflected XSS
-
- 102539
- 56532
-
- XSS
- 1.5
-
-
-
-
-
- Global Flash Galleries - popup.php id Parameter SQL Injection
-
- 104907
-
- SQLI
-
-
- Global Flash Galleries - swfupload.php Unauthenticated Image Upload Weakness
-
- 102423
- http://packetstormsecurity.com/files/124850/
- http://www.securityfocus.com/bid/65060
-
- UPLOAD
-
-
-
-
-
- Social Connect 0.10.1 - diagnostics/test.php testing Parameter Reflected XSS
-
- 102411
- 56587
-
- XSS
- 0.10.2
-
-
-
-
-
- Let Them Unsubscribe 1.0 - let-them-unsubscribe.php Multiple Unspecified Issues
-
- 102500
- 56659
-
- MULTI
- 1.1
-
-
-
-
-
- SEO Friendly Images 2.7.4 - seo-friendly-images.php Add Page CSRF
-
- 101789
-
- CSRF
- 2.7.5
-
-
- SEO Friendly Images 2.7.4 - seo-friendly-images.php Multiple Parameters XSS
-
- 101790
-
- XSS
- 2.7.5
-
-
-
-
-
- Social Ring 1.0 - share.php url Parameter Reflected XSS
-
- 102424
- http://packetstormsecurity.com/files/124851/
-
- XSS
- 1.1.9
-
-
-
-
-
- GRAND FlAGallery Skins - compact_music_player/gallery.php playlist Parameter SQL Injection
-
- 93581
- http://packetstormsecurity.com/files/121699/
-
- SQLI
-
-
-
-
-
- Contus Video Gallery - index.php playid Parameter SQL Injection
-
- 93369
- 2013-3478
- 51344
- http://www.securityfocus.com/bid/59845
- http://xforce.iss.net/xforce/xfdb/84239
-
- SQLI
-
-
-
-
-
- WebEngage 2.0.0 - callback.php Multiple Parameter Reflected XSS
-
- 102560
- 56700
-
- XSS
- 2.0.1
-
-
- WebEngage 2.0.0 - renderer.php Multiple Parameter Reflected XSS
-
- 102561
- 56700
-
- XSS
- 2.0.1
-
-
- WebEngage 2.0.0 - resize.php height Parameter XSS
-
- 102562
- 56700
-
- XSS
- 2.0.1
-
-
-
-
-
- Fetch Tweets 1.3.3.6 - class/FetchTweets_Event_.php Missing Permission Check Unspecified Issue
-
- 102578
-
- UNKNOWN
-
-
-
-
-
- Seo Link Rotator - pusher.php title Parameter Reflected XSS
-
- 102594
- 56710
- http://packetstormsecurity.com/files/124959/
-
- XSS
-
-
-
-
-
- Nokia Maps and Places 1.6.6 - place.html href Parameter Reflected XSS
-
- 102669
- 2014-1750
- 56604
-
- XSS
- 1.6.7
-
-
-
-
-
- Easy Webinar - get_widget.php wid Parameter SQL Injection
-
- 86754
- 22300
-
- SQLI
- 1.6.7
-
-
-
-
-
- WP Social Invitations <=1.4.4.2 - test.php Multiple Parameter Reflected XSS
-
- 102741
- 56711
-
- XSS
- 1.4.4.3
-
-
-
-
-
- Infusionsoft Gravity Forms Add-on 1.5.6 - Unspecified XSS
-
- 102742
-
- XSS
- 1.5.7
-
-
-
-
-
- Comment Control 0.3.0 - comment-control.php type Parameter SQL Injection
-
- 102581
-
- SQLI
- 0.3.1
-
-
-
-
-
- WPtouch 3.x - Insecure Nonce Generation
-
- http://blog.sucuri.net/2014/07/disclosure-insecure-nonce-generation-in-wptouch.html
- exploit/unix/webapp/wp_wptouch_file_upload
-
- UPLOAD
- 3.4.3
-
-
- WPtouch 1.9.27 - 'wptouch_redirect' Parameter URI Redirection Vulnerability
-
- http://www.securityfocus.com/bid/48348
-
- UNKNOWN
- 1.9.30
-
-
- WPtouch 1.9.19.4 - wp-content/plugins/wptouch/include/adsense-new.php wptouch_settings Parameter XSS
-
- 69538
- 2010-4779
- 42438
- http://www.securityfocus.com/bid/45139
-
- XSS
- 1.9.20
-
-
- WPtouch 1.9.8 - ajax/file_upload.php Crafted Content-Type File Upload Remote Code Execution
-
- 102582
-
- RCE
- 1.9.8.1
-
-
- WPtouch 1.9.8 - include/submit.php Multiple Parameter SQL Injection
-
- 102583
-
- SQLI
- 1.9.8.1
-
-
-
-
-
- Better Search 1.2.1 - admin.inc.php Setting Manipulation CSRF
-
- 102584
-
- CSRF
- 1.3
-
-
-
-
-
- Very Simple Contact Form 1.1 - Unspecified Issue
-
- 102798
-
- UNKNOWN
- 1.2
-
-
-
-
-
- Stop User Enumeration 1.2.4 - POST Request Protection Bypass
-
- 102799
- 56643
- http://packetstormsecurity.com/files/125035/
- http://seclists.org/fulldisclosure/2014/Feb/3
-
- UNKNOWN
-
-
-
-
-
- Delightful Downloads 1.3.1.1 - meta-boxes.php dedo_meta_boxes_save Function Multiple Action Authorization Bypass
-
- 102932
-
- AUTHBYPASS
- 1.3.2
-
-
- Delightful Downloads 1.3.1.1 - includes/functions.php User-Agent HTTP Header Stored XSS
-
- 102928
-
- XSS
- 1.3.2
-
-
-
-
-
- Mobiloud 1.9.0 - comments/disqus_count.php shortname Parameter Reflected XSS
-
- 102898
-
- XSS
- 1.9.1
-
-
- Mobiloud 1.9.0 - comments/disqus.php shortname Parameter Reflected XSS
-
- 102899
-
- XSS
- 1.9.1
-
-
-
-
-
- all_in_one_carousel 1.2.20 - /tpl/add_carousel.php id Parameter Reflected XSS
-
- 103351
- 56962
- http://seclists.org/bugtraq/2014/Feb/38
-
- XSS
-
-
-
-
-
- Frontend Uploader - Unspecified File Upload Remote Code Execution
-
- 103454
- 31570
-
- RCE
-
-
-
-
-
- Acunetix WP Security 4.0.3 - /wp-admin/admin.php wps-database Page Backup Generation CSRF Weakness
-
- 103467
- http://packetstormsecurity.com/files/125218/
-
- CSRF
-
-
-
-
-
- Aryo Activity Log - Full Path Disclosure
-
- https://github.com/KingYes/wordpress-aryo-activity-log/pull/27
-
- FPD
- 2.0.4
-
-
-
-
-
- WP jQuery Spam 1.1 - dynamic.php id Parameter Reflected XSS
-
- 103579
-
- XSS
- 1.2
-
-
-
-
-
- Media File Renamer v1.7.0 - Persistent XSS
-
- 2014-2040
- http://packetstormsecurity.com/files/125378/
- http://www.vapid.dhs.org/advisories/wordpress/plugins/MediaFileRenamer-1.7.0/
-
- XSS
-
-
-
-
-
- Flash Player Widget - dewplayer.swf Content Spoofing
-
- http://www.openwall.com/lists/oss-security/2013/12/30/5
-
- UNKNOWN
-
-
-
-
-
- Alpine PhotoTile For Instagram 1.2.6.5 - wp-admin/options-general.php general_lightbox_params Parameter XSS Weakness
-
- 103822
- 57198
- http://packetstormsecurity.com/files/125418/
-
- XSS
-
-
-
-
-
- Widget Control Powered By Everyblock 1.0.1 - wp-admin/admin.php idDropdown Parameter XSS Weakness
-
- 103831
- 57203
- http://packetstormsecurity.com/files/125421/
-
- XSS
-
-
-
-
-
- Search Everything 8.1.0 - options.php Unspecified CSRF
-
- 106733
-
- CSRF
- 8.1.1
-
-
- Search Everything 7.0.4 - Unspecified Issue
-
- 104058
-
- SQLI
- 8.0
-
-
- Search Everything 7.0.2 - search-everything.php s Parameter SQL Injection
-
- 103718
- 56802
- http://www.securityfocus.com/bid/65765
- 2014-2316
-
- SQLI
- 7.0.3
-
-
-
-
-
- Zedity 2.5 - wp-admin/admin-ajax.php zedity_ajax Action zaction Parameter XSS
-
- 103789
- 57026
- http://www.securityfocus.com/bid/65799
-
- XSS
-
-
- Zedity 2.4 - Cross Site Scripting
-
- http://packetstormsecurity.com/files/125402/
-
- XSS
-
-
-
-
-
- WP Post to PDF 2.3.1 - wp-admin/options.php wpptopdf headerFontSize Parameter XSS
-
- 103872
- http://packetstormsecurity.com/files/125432/
-
- XSS
-
-
-
-
-
- BSK PDF Manager 1.3.2 - wp-admin/admin.php Multiple Parameter SQL Injection
-
- 108913
- 2014-4944
- http://packetstormsecurity.com/files/127407/
- http://www.securityfocus.com/bid/68488
-
- SQLI
-
-
- BSK PDF Manager 1.3 - wp-admin/admin.php Multiple Parameter XSS
-
- 103873
- http://packetstormsecurity.com/files/125422/
-
- XSS
-
-
-
-
-
- MP3-jPlayer 1.8.7 - wp-admin/options-general.php Multiple Parameter XSS
-
- 103875
- http://packetstormsecurity.com/files/125417/
-
- XSS
-
-
- MP3-jPlayer 1.8.3 - jPlayer.swf XSS
-
- 92254
-
- 1.8.4
- XSS
-
-
-
-
-
- Google Analytics MU 2.3 - google-analytics-mu-network.php Analytics Code Manipulation CSRF
-
- 103937
- 56157
- http://packetstormsecurity.com/files/125514/
- http://seclists.org/fulldisclosure/2014/Mar/20
- http://www.securityfocus.com/bid/65926
-
- CSRF
- 2.4
-
-
-
-
-
- Repagent - dewplayer-vinyl.swf xml Parameter XML File Handling XSS
-
- 101353
- http://packetstormsecurity.com/files/124582/
- http://www.securityfocus.com/bid/64506
- http://seclists.org/fulldisclosure/2013/Dec/192
-
- XSS
-
-
- Repagent - dewplayer-vinyl-en.swf xml Parameter XML File Handling XSS
-
- 101352
- http://packetstormsecurity.com/files/124582/
- http://www.securityfocus.com/bid/64506
- http://seclists.org/fulldisclosure/2013/Dec/192
-
- XSS
-
-
-
-
-
- LayerSlider 4.6.1 - wp-admin/admin.php Style Editing CSRF
-
- 104393
- 57930
- http://packetstormsecurity.com/files/125637/
-
- CSRF
-
-
- LayerSlider 4.6.1 - LayerSlider/editor.php skin Parameter Remote Path Traversal File Access
-
- 104394
- 57309
- http://packetstormsecurity.com/files/125637/
-
- AUTHBYPASS
-
-
-
-
-
- XCloner 3.1.0 - Multiple Actions CSRF
-
- 2014-2340
- 2014-2579
- 104402
- 57362
- 32701
- http://packetstormsecurity.com/files/125991/
- https://www.htbridge.com/advisory/HTB23206
- https://www.htbridge.com/advisory/HTB23207
-
- CSRF
- 3.1.1
-
-
-
-
-
- GuiForm 1.4.10 - class/class-ajax.php Entry Saving CSRF
-
- 104399
-
- CSRF
- 1.5.0
-
-
-
-
-
- ClickDesk - Live Chat Widget Multiple Field XSS
-
- 104037
- http://packetstormsecurity.com/files/125528/
- http://www.securityfocus.com/bid/65971
-
- XSS
-
-
-
-
-
- Duplicate Post 2.5 - duplicate-post-admin.php User Login Cookie Value SQL Injection
-
- 104669
-
- SQLI
- 2.6
-
-
- Duplicate Post 2.5 - options-general.php post Parameter Reflected XSS
-
- 104670
-
- XSS
- 2.6
-
-
-
-
-
- mTouch Quiz 3.0.6 - question.php quiz Parameter Reflected XSS
-
- 104667
- http://www.securityfocus.com/bid/66306
-
- XSS
- 3.0.7
-
-
- mTouch Quiz 3.0.6 - question.php quiz Parameter SQL Injection
-
- 104668
- http://www.securityfocus.com/bid/66306
-
- SQLI
- 3.0.7
-
-
-
-
-
- Simple Retail Menus 4.0.1 - includes/actions.php targetmenu Parameter SQL Injection
-
- 104680
-
- SQLI
- 4.1
-
-
- Simple Retail Menus 4.0.1 - includes/mode-edit.php targetmenu Parameter SQL Injection
-
- 104682
-
- SQLI
- 4.1
-
-
-
-
-
- User Domain Whitelist 1.4 - user-domain-whitelist.php domain_whitelist Parameter Stored XSS
-
- 104681
- 57490
-
- XSS
-
-
- User Domain Whitelist 1.4 - user-domain-whitelist.php Domain Whitelisting Manipulation CSRF
-
- 104683
- 57490
-
- CSRF
- 1.5
-
-
-
-
-
- Subscribe To Comments Reloaded 140204 - options/index.php manager_page Parameter Stored XSS Weakness
-
- 104698
- 57015
- http://www.securityfocus.com/bid/66288
-
- XSS
- 140219
-
-
- Subscribe To Comments Reloaded 140204 - options/index.php Admin Settings Manipulation CSRF
-
- 104699
- 57015
- http://www.securityfocus.com/bid/66288
-
- CSRF
- 140219
-
-
-
-
-
- Analytics360 1.2.1 - analytics360.php Multiple Action CSRF
-
- 104743
-
- CSRF
- 1.2.2
-
-
- Analytics360 1.2 - analytics360.php a360_error Parameter Reflected XSS
-
- 104744
-
- XSS
- 1.2.1
-
-
-
-
-
- The Events Calendar 3.0 - lib/template-classes/month.php tribe-bar-search Parameter Reflected XSS
-
- 104785
-
- XSS
- 3.0.1
-
-
-
-
-
- Form Maker 1.6.4 - front_end_form_maker.php Unspecified XSS
-
- 104870
-
- XSS
- 1.6.6
-
-
-
-
-
- ZooEffect 1.08 - wp-1pluginjquery.php HTTP Referer Header Reflected XSS
-
- 104876
-
- XSS
- 1.09
-
-
-
-
-
- Google Analytics Dashboard 2.0.4 - gad-admin-pages-posts.php pid Parameter SQL Injection
-
- 104877
-
- SQLI
- 2.0.5
-
-
-
-
-
- blogVault 1.08 - Missing Account Empty Secret Key Generation
-
- 107570
-
- BYPASS
- 1.09
-
-
- blogVault 1.05 - admin.php blogVault Key Setting CSRF
-
- 104906
-
- SQLI
- 1.06
-
-
-
-
-
- Captcha 2.12-3.8.1 - captcha bypass
-
- http://www.antoine-cervoise.fr/2014/03/27/contournement-du-plugin-captcha-pour-wordpress-v-3-8-1-et-anterieures/
- https://github.com/cervoise/pentest-scripts/blob/master/web/cms/captcha-bypass/wordpress-plugins/captcha/bypass-3.8.1-and-previous.php
-
- BYPASS
- 3.8.2
-
-
-
-
-
- WP HTML Sitemap 1.2 - wp-html-sitemap.html Sitemap Deletion CSRF
-
- 105084
- http://packetstormsecurity.com/files/125933/
- http://seclists.org/fulldisclosure/2014/Mar/400
- https://security.dxw.com/advisories/csrf-vulnerability-in-wp-html-sitemap-1-2/
-
- CSRF
-
-
-
-
-
- Groups 1.4.5 - Negated Role Capability Handling Elevated Privilege Issue
-
- 104940
-
- AUTHBYPASS
- 1.4.6
-
-
-
-
-
- HTML5 jQuery Audio Player 2.3 - playlist/add_playlist.php Multiple Parameter Stored XSS Weakness
-
- 104951
-
- XSS
- 2.4
-
-
- HTML5 jQuery Audio Player 2.3 - playlist/add_playlist.php id Parameter SQL Injection
-
- 104952
-
- SQLI
- 2.4
-
-
-
-
-
- ShrimpTest 1.0b2 - plugins/metric-conversion.php Multiple Unspecified XSS
-
- 104956
-
- XSS
- 1.0b3
-
-
- ShrimpTest 1.0b2 - plugins/plugin-notification.php Unspecified XSS
-
- 104957
-
- XSS
- 1.0b3
-
-
- ShrimpTest 1.0b2 - plugins/variant-shortcode.php Unspecified XSS
-
- 104958
-
- XSS
- 1.0b3
-
-
- ShrimpTest 1.0b2 - admin/experiments.php Multiple Unspecified XSS
-
- 104959
-
- XSS
- 1.0b3
-
-
- ShrimpTest 1.0b2 - admin/experiment-new.php Multiple Unspecified XSS
-
- 104960
-
- XSS
- 1.0b3
-
-
-
-
-
- ActiveHelper LiveHelp Server 3.2.2 - server/import/status.php Multiple Parameter SQL Injection
-
- 104990
-
- SQLI
- 3.4.0
-
-
- ActiveHelper LiveHelp Server 3.2.2 - server/import/tracker.php Multiple Parameter SQL Injection
-
- 104991
-
- SQLI
- 3.4.0
-
-
- ActiveHelper LiveHelp Server 3.2.2 - server/import/javascript.php Multiple Vector SQL Injection
-
- 104992
-
- SQLI
- 3.4.0
-
-
- ActiveHelper LiveHelp Server 3.2.2 - server/frames.php DEPARTMENT Parameter SQL Injection
-
- 104993
-
- SQLI
- 3.4.0
-
-
-
-
-
- Springboard Video Quick Publish 0.2.6 - videolist.php paged Parameter Reflected XSS
-
- 105992
-
- XSS
- 0.2.7
-
-
- Springboard Video Quick Publish 0.2.6 - springboardvideo.php video_id Parameter XSS
-
- 105993
-
- XSS
- 0.2.7
-
-
- Springboard Video Quick Publish 0.2.6 - sb_search.php paged Parameter Reflected XSS
-
- 105994
-
- XSS
- 0.2.7
-
-
- Springboard Video Quick Publish 0.2.4 - Unspecified Issue
-
- 105007
-
- UNKNOWN
- 0.2.5
-
-
-
-
-
- IgnitionDeck 1.1 - Purchase Form Unspecified XSS
-
- 105008
-
- XSS
- 1.2
-
-
-
-
-
- Ajax Pagination 1.1 - wp-admin/admin-ajax.php loop Parameter Local File Inclusion
-
- 105087
- 32622
- http://packetstormsecurity.com/files/125929/
- http://seclists.org/fulldisclosure/2014/Mar/398
-
- LFI
-
-
-
-
-
- TT Guest Post Submit 1.0.0 - tt-guest-post-submit-submit.php rootpath Parameter Remote File Inclusion
-
- 105120
-
- RFI
- 1.0.1
-
-
-
-
-
- WordPress-to-Lead for Salesforce CRM 1.0.4 - ov_plugin_tools.php textinput Function XSS
-
- 105146
-
- XSS
- 1.0.5
-
-
- WordPress-to-Lead for Salesforce CRM 1.0.1 - salesforce.php salesforce_form_shortcode Function Error Message Handling XSS
-
- 105148
-
- XSS
- 1.0.2
-
-
- WordPress-to-Lead for Salesforce CRM 1.0 - salesforce.php Multiple Parameter XSS
-
- 105147
-
- XSS
- 1.0.1
-
-
-
-
-
- Disable Comments 1.0.3 - disable_comments_settings.php Comment Status Manipulation CSRF
-
- 105245
- 2014-2550
- 57613
- http://www.securityfocus.com/bid/66564
-
- CSRF
- 1.0.4
-
-
-
-
-
- WP Business intelligence lite <= 1.0.6 - Remote Code Execution Exploit
-
- 57590
- http://packetstormsecurity.com/files/125927/
- http://cxsecurity.com/issue/WLB-2014030243
-
- RCE
- 1.1
-
-
-
-
-
- Barclaycart - Shell Upload
-
- http://packetstormsecurity.com/files/125552/
-
- UPLOAD
-
-
-
-
-
- Premium Gallery Manager - Shell Upload
-
- http://packetstormsecurity.com/files/125586/
-
- UPLOAD
-
-
-
-
-
- Jetpack <= 2.9.2 - class.jetpack.php XML-RPC Access Control Bypass
-
- 105714
- 2014-0173
- 57729
- http://jetpack.me/2014/04/10/jetpack-security-update/
-
- BYPASS
- 2.9.3
-
-
-
-
-
- Lazyest Gallery <= 1.1.20 - EXIF Script Insertion Vulnerability
-
- 2014-2333
- 105680
- 57746
-
- XSS
- 1.1.21
-
-
- Lazyest Gallery 1.1.7 - Crafted Folder Name Unspecified Issue
-
- 105728
-
- UNKNOWN
- 1.1.8
-
-
- Lazyest Gallery 0.10.4.3 - Multiple File/Directory Insecure Permissions Local Content Manipulation
-
- 105818
-
- UNKNOWN
- 0.10.4.4
-
-
- Lazyest Gallery 0.4.2 - Multiple Unspecified Issues
-
- 107400
-
- MULTI
-
-
-
-
-
- Post Expirator <= 2.1.1 - Cross-Site Request Forgery Vulnerability
-
- 57503
-
- CSRF
- 2.1.2
-
-
-
-
-
- Quick Page Post Redirect 5.0.4 - redirect-updates.php quickppr_redirects Parameter Stored XSS
-
- 105707
- 2014-2598
- 57883
- 32867
- http://www.securityfocus.com/bid/66790
- https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/
-
- XSS
- 5.0.5
-
-
- Quick Page Post Redirect 5.0.4 - redirect-updates.php Multiple Admin Function CSRF
-
- 105708
- 2014-2598
- 57883
- 32867
- http://www.securityfocus.com/bid/66790
- https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/
-
- CSRF
- 5.0.5
-
-
-
-
-
- Twitget 3.3.1 - twitget.php Twitter Setting Manipulation CSRF
-
- 105705
- 2014-2559
- 32868
- https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1/
-
- CSRF
- 3.3.3
-
-
- Twitget 3.3.1 - twitget.php twitget_consumer_key Parameter Stored XSS
-
- 105704
- 2014-2559
- 32868
- https://security.dxw.com/advisories/csrfxss-vulnerability-in-twitget-3-3-1/
-
- XSS
- 3.3.3
-
-
-
-
-
- HK Exif Tags 1.11 - hk_exif_tags.php hk_exif_tags_images_process Function EXIF Tags Handling Stored XSS
-
- 105725
- 57753
-
- XSS
- 1.12
-
-
-
-
-
- Unconfirmed <= 1.2.4 - unconfirmed.php s Parameter Reflected XSS
-
- 105722
- 57838
-
- XSS
- 1.2.5
-
-
-
-
-
- LiveOptim 1.4.3 - Configuration Setting Manipulation CSRF
-
- 105986
- 57990
- http://www.securityfocus.com/bid/66939
-
- CSRF
- 1.4.4
-
-
-
-
-
- Conditional CAPTCHA 3.6 - wp-conditional-captcha.php Settings Page CSRF
-
- 106014
-
- CSRF
- 3.6.1
-
-
-
-
-
- JS External Link Info 1.21 - redirect.php blog Parameter XSS
-
- 106125
- http://packetstormsecurity.com/files/126238/
- http://www.securityfocus.com/bid/66999
-
- XSS
-
-
-
-
-
- Simple Fields 1.1.6 - inc-admin-options.php Admin Functions CSRF
-
- 106316
-
- CSRF
- 1.2
-
-
- Simple Fields 0.3.5 - simple_fields.php wp_abspath Parameter Remote File Inclusion
-
- 106622
-
- RFI
- 0.3.6
-
-
-
-
-
- Work The Flow File Upload 1.2.1 - wp-admin/admin-ajax.php accept_file_types Parameter Manipulation File Upload Restriction Bypass
-
- 106366
- 58216
- http://www.securityfocus.com/bid/67083
- http://packetstormsecurity.com/files/126333/
-
- RCE
-
-
-
-
-
- File Gallery 1.7.9 - Settings Page create_function Function Remote Command Execution
-
- 106417
- 2014-2558
- 58216
- http://www.securityfocus.com/bid/67120
-
- RCE
- 1.7.9.2
-
-
-
-
-
- NextCellent Gallery 1.9.13 - admin/manage-images.php Multiple Field Stored XSS Weakness
-
- 106474
- http://www.securityfocus.com/bid/67085
-
- XSS
- 1.9.18
-
-
-
-
-
- WP Affiliate Manager - login.php msg Parameter XSS
-
- 106533
- http://packetstormsecurity.com/files/126424/
-
- XSS
-
-
-
-
-
- Query Interface 1.1 - Multiple Unspecified Issues
-
- 106642
-
- MULTI
- 1.2
-
-
-
-
-
- Photo-Gallery - UploadHandler.php File Upload CSRF
-
- 106732
- http://packetstormsecurity.com/files/126521/
-
- CSRF
-
-
-
-
-
- iMember360is 3.9.001 - XSS / Disclosure / Code Execution
-
- http://1337day.com/exploit/22184
-
- MULTI
- 3.9.002
-
-
-
-
-
- Acumbamail 1.0.4 - acumbamail.class.php callAPI() Function MitM Information Disclosure
-
- 106711
- 67220
- http://www.securityfocus.com/bid/67220
-
- UNKNOWN
- 1.0.4.1
-
-
-
-
-
- TinyMCE Color Picker 1.1 - tinymce-colorpicker.php Color Saving CSRF
-
- 106854
- 58095
- http://www.securityfocus.com/bid/67333
-
- CSRF
- 1.2
-
-
- TinyMCE Color Picker 1.1 - tinymce-colorpicker.php Missing edit_others_posts Capability Check
-
- 106854
- 58095
- http://www.securityfocus.com/bid/67333
-
- UNKNOWN
- 1.2
-
-
-
-
-
- Contact Bank 2.0.19 - Multiple Unspecified Issues
-
- 106868
- 67334
-
- UNKNOWN
- 2.0.20
-
-
-
-
-
- Bonuspressx - ar_submit.php n Parameter XSS
-
- 106931
- http://packetstormsecurity.com/files/126595/
-
- XSS
-
-
-
-
-
- Profile Builder 1.1.59 - front-end/wppb.recover.password.php Password Recovery Bypass
-
- 106986
- 58511
- http://www.securityfocus.com/bid/67331
-
- AUTHBYPASS
- 1.1.60
-
-
-
-
-
- Basic Google Maps Placemarks 1.10.2 - settings.php Multiple Fields Stored XSS Weakness
-
- 107121
-
- XSS
- 1.10.3
-
-
-
-
-
- Simple Popup - popup.php z Parameter XSS
-
- 107294
- 2014-3921
- http://packetstormsecurity.com/files/126763/
- http://www.securityfocus.com/bid/67562
-
- XSS
-
-
-
-
-
- bib2html 0.9.3 - /OSBiB/create/index.php styleShortName Parameter XSS
-
- 107296
- 2014-3870
- http://packetstormsecurity.com/files/126782/
- http://www.securityfocus.com/bid/67589
-
- XSS
-
-
-
-
-
- Conversion Ninja - /lp/index.php id Parameter XSS
-
- 2014-4017
- 107297
- http://packetstormsecurity.com/files/126781/
- http://www.securityfocus.com/bid/67590
-
- XSS
-
-
-
-
-
- Cool Video Gallery 1.8 - admin/gallery-details.php Multiple Actions CSRF
-
- 107354
-
- CSRF
- 1.9
-
-
- Cool Video Gallery 1.8 - admin/gallery-manage.php Gallery Deletion CSRF
-
- 107355
-
- CSRF
- 1.9
-
-
- Cool Video Gallery 1.8 - admin/gallery-settings.php Gallery Settings Manipulation CSRF
-
- 107356
-
- CSRF
- 1.9
-
-
- Cool Video Gallery 1.8 - admin/gallery-sort.php Gallery Sort Order Manipulation CSRF
-
- 107357
-
- CSRF
- 1.9
-
-
- Cool Video Gallery 1.8 - admin/player-settings.php Player Settings Manipulation CSRF
-
- 107358
-
- CSRF
- 1.9
-
-
- Cool Video Gallery 1.8 - admin/plugin-uninstall.php Plugin Uninstallation CSRF
-
- 107359
-
- CSRF
- 1.9
-
-
- Cool Video Gallery 1.8 - admin/video-sitemap.php XML Video Sitemap Generation CSRF
-
- 107360
-
- CSRF
- 1.9
-
-
- Cool Video Gallery 1.8 - lib/core.php Multiple Actions CSRF
-
- 107361
-
- CSRF
- 1.9
-
-
-
-
-
- GTranslate 1.0.12 - gtranslate.php Widget Code Editing CSRF
-
- 107399
-
- CSRF
- 1.0.13
-
-
-
-
-
- World of Warcraft Armory Table 0.2.5 - WoWArmoryTable.php page Parameter Reflected XSS
-
- 107479
- 58596
- http://www.securityfocus.com/bid/67628
-
- XSS
- 0.2.6
-
-
-
-
-
- Participants Database 1.5.4.8 - pdb-signup CSV_type Action query Parameter SQL Injection
-
- 107626
- 2014-3961
- 58816
- http://www.exploit-db.com/exploits/33613
- http://packetstormsecurity.com/files/126878/
- http://www.securityfocus.com/bid/67769
- http://www.securityfocus.com/bid/67938
-
- SQLI
- 1.5.4.9
-
-
-
-
-
- Popup Images - popup-images/popup.php z Parameter XSS
-
- 107627
- http://packetstormsecurity.com/files/126872/
-
- XSS
-
-
-
-
-
- Centrora Security 3.2.1 - Multiple Admin Actions CSRF
-
- 107658
-
- CSRF
- 3.3.0
-
-
-
-
-
- Lively Chat Support 1.0.29 - Unspecified Issue
-
- 107689
-
- UNKNOWN
- 1.0.30
-
-
-
-
-
- Featured Comments 1.2.1 - wp-admin/admin-ajax.php Comment Status Manipulation CSRF
-
- 107844
- 2014-4163
- https://security.dxw.com/advisories/csrf-in-featured-comments-1-2-1-allows-an-attacker-to-set-and-unset-comment-statuses/
- http://www.securityfocus.com/bid/67955
- http://packetstormsecurity.com/files/127023/
-
- CSRF
-
-
-
-
-
- wp-football 1.1 - templates/template_worldCup_preview.php league Parameter Reflected XSS
-
- 108336
- http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/
-
- XSS
-
-
- wp-football 1.1 - templates/template_default_preview.php league Parameter Reflected XSS
-
- 108337
- http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/
-
- XSS
-
-
- wp-football 1.1 - football_phases_list.php id Parameter Reflected XSS
-
- 108338
- http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/
-
- XSS
-
-
- wp-football 1.1 - football_matches_phase.php id Parameter Reflected XSS
-
- 108339
- http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/
-
- XSS
-
-
- wp-football 1.1 - football_matches_load.php id_league Parameter Reflected XSS
-
- 108340
- http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/
-
- XSS
-
-
- wp-football 1.1 - football_matches_list.php id Parameter Reflected XSS
-
- 108341
- http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/
-
- XSS
-
-
- wp-football 1.1 - football_groups_list.php id Parameter Reflected XSS
-
- 108342
- http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/
-
- XSS
-
-
- wp-football 1.1 - football-functions.php f Parameter Reflected XSS
-
- 108343
- http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/
-
- XSS
-
-
- wp-football 1.1 - football_criteria.php league Parameter Reflected XSS
-
- 108344
- http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/
-
- XSS
-
-
- wp-football 1.1 - football_classification.php league Parameter Reflected XSS
-
- 108345
- http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- Member Approval 131109 - wp-admin/options-general.php Option Manipulation CSRF
-
- 107845
- 2014-3850
- http://www.securityfocus.com/bid/67952
- http://packetstormsecurity.com/files/127024/
-
- CSRF
-
-
-
-
-
- JW Player 2.1.2 - wp-admin/admin.php Player Deletion CSRF
-
- 2014-4030
- 107846
- http://www.securityfocus.com/bid/67954
- http://packetstormsecurity.com/files/127025/
-
- CSRF
-
-
-
-
-
- AdminOnline - download.php file Parameter Remote Path Traversal File Access
-
- 108024
- http://packetstormsecurity.com/files/127046/
-
- AUTHBYPASS
-
-
-
-
-
- Ruven Toolkit 1.1 - tinymce/popup.php popup Parameter Reflected XSS
-
- 108312
-
- XSS
-
-
-
-
-
- Verification Code for Comments 2.1.0 - vcc.js.php Multiple Parameter Reflected XSS
-
- 108313
- 2014-4565
- http://codevigilant.com/disclosure/wp-plugin-verification-code-for-comments-a3-cross-site-scripting-xss
-
- XSS
-
-
-
-
-
- wpcb 2.4.8 - facture.php id Parameter Reflected XSS
-
- 108407
- 2014-4581
- http://www.securityfocus.com/bid/68357
-
- XSS
-
-
-
-
-
- WP App Maker 1.0.16.4 - icons-launcher.php uid Parameter Reflected XSS
-
- 108408
- 2014-4578
-
- XSS
-
-
-
-
-
- wp-amasin-the-amazon-affiliate-shop 0.9.6 - reviews.php url Parameter Local File Inclusion
-
- 108501
- 2014-4577
-
- LFI
-
-
-
-
-
- Cross RSS 1.7 - proxy.php rss Parameter Local File Inclusion
-
- 108502
- 2014-4941
- http://www.securityfocus.com/bid/68555
- http://codevigilant.com/disclosure/wp-plugin-cross-rss-local-file-inclusion/
-
- LFI
-
-
-
-
-
- Hot Files < 1.0.0 - Cross-site scripting (XSS) vulnerability in tpls/editmedia.php
-
- 2014-4588
- 108720
-
- XSS
-
-
-
-
-
- Yahoo Updates < 1.0 - XSS vulnerabilities in yupdates_application.php
-
- 2014-4603
- http://codevigilant.com/disclosure/wp-plugin-yahoo-updates-for-wordpress-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- Toolpage 1.6.1 - XSS vulnerability in includes/getTipo.php
-
- 2014-4560
- 108704
- http://codevigilant.com/disclosure/wp-plugin-toolpage-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- Cloak and Encrypt < 2.0 - XSS vulnerability in go.php
-
- 2014-4563
- 108895
- http://codevigilant.com/disclosure/wp-plugin-url-cloak-encrypt-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- Validated < 1.0.2 - XSS vulnerability in check.php
-
- 108659
- 2014-4564
- http://www.securityfocus.com/bid/68320
- http://codevigilant.com/disclosure/wp-plugin-validated-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- Verwei.se WordPress Twitter < 1.0 2 - XSS vulnerability in res/fake_twitter/frame.php
-
- 2014-4566
- http://codevigilant.com/disclosure/wp-plugin-verweise-wordpress-twitter-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- Easy Banners 1.4 - XSS vulnerability in wp-admin/options-general.php
-
- 108626
- 2014-4723
- http://packetstormsecurity.com/files/127293/
- http://www.securityfocus.com/bid/68281
-
- XSS
-
-
-
-
-
- Custom Banners plugin 1.2.2.2 - XSS vulnerability in custom_banners_registered_name parameter to wp-admin/options.php
-
- 108683
- 2014-4724
- http://packetstormsecurity.com/files/127291/
- http://www.securityfocus.com/bid/68279
-
- XSS
-
-
-
-
-
- Video Posts Webcam Recorder plugin < 1.55.4 - XSS vulnerability in posts/videowhisper/r_logout.php
-
- 2014-4568
- http://codevigilant.com/disclosure/wp-plugin-video-posts-webcam-recorder-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- ZeenShare plugin < 1.0.1 - XSS vulnerability in redirect_to_zeenshare.php via the zs_sid parameter
-
- 2014-4606
- http://codevigilant.com/disclosure/wp-plugin-zeenshare-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- ZdStatistics < 2.0.1 - XSS vulnerability in cal/test.php via the lang parameter
-
- 2014-4605
- 108731
- http://codevigilant.com/disclosure/wp-plugin-zdstats-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- Your Text Manager < 0.3.0 - XSS vulnerability in settings/pwsettings.php via the ytmpw parameter
-
- 2014-4604
- http://codevigilant.com/disclosure/wp-plugin-your-text-manager-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- XEN Carousel < 0.12.2 - XSS vulnerabilities in xencarousel-admin.js.php via path or ajaxpath parameter
-
- 2014-4602
- http://codevigilant.com/disclosure/wp-plugin-xen-carousel-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- WP Silverlight Media Player < 0.8 - XSS vulnerability in uploader.php via the post_id parameter
-
- 2014-4589
- 108721
- http://codevigilant.com/disclosure/wp-plugin-wp-media-player-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- WP Microblogs plugin < 0.4.0 - XSS vulnerability in get.php via the oauth_verifier parameter
-
- 2014-4590
- http://codevigilant.com/disclosure/wp-plugin-wp-microblogs-a3-cross-site-scripting-xss/
-
- XSS
-
-
-
-
-
- WP PHP Widget 1.0.2 - Full Path Disclosure vulnerability
-
- 2013-0721
- 88846
-
- FPD
-
-
-
-
-
- SocialGrid 2.3 - inline-admin.js.php default_services Parameter XSS
-
- 71966
- 44256
- http://seclists.org/bugtraq/2011/Apr/176
-
- XSS
-
-
-
-
-
- EasyCart 2.0.5 - inc/admin/phpinfo.php Direct Request Remote Information Disclosure
-
- 109030
- 2014-4942
- http://www.securityfocus.com/bid/68692
-
- UNKNOWN
- 2.0.6
-
-
-
-
-
- Simple Slider 1.0 - New Image URL Field XSS
-
- 87806
- http://packetstormsecurity.org/files/118309/
- http://xforce.iss.net/xforce/xfdb/80260
- http://seclists.org/bugtraq/2012/Nov/89
-
- XSS
- 1.1
-
-
-
-
-
- BookX 1.7 - includes/bookx_export.php file Parameter Remote Path Traversal File Access
-
- 109022
- 2014-4937
- http://www.securityfocus.com/bid/68556
- http://codevigilant.com/disclosure/wp-plugin-bookx-local-file-inclusion/
-
- LFI
-
-
-
-
-
- WP Rss Poster 1.0.0 - wp-admin/admin.php wrp-add-new Page id Parameter SQL Injection
-
- 109023
- 2014-4938
- http://codevigilant.com/disclosure/wp-plugin-wp-rss-poster-a1-injection/
-
- SQLI
-
-
-
-
-
- BannerMan 0.2.4 - XSS in wp-admin/options-general.php via bannerman_background parameter
-
- 108682
- 2014-4845
- http://packetstormsecurity.com/files/127289/
-
- XSS
-
-
-
-
-
- Random Banner 1.1.2.1 - random-banner/random-banner.php buffercode_RBanner_url_banner1 Parameter XSS
-
- 108627
- 2014-4847
- http://packetstormsecurity.com/files/127292/
- http://www.securityfocus.com/bid/68280
-
- XSS
-
-
-
-
-
- Blogstand Smart Banner 1.0 - blogstand-banner.php bs_blog_id Parameter XSS
-
- 108625
- 2014-4848
- http://packetstormsecurity.com/files/127290/
- http://www.securityfocus.com/bid/68282
-
- XSS
-
-
-
-
-
- Construction Mode 1.8 - under-construction.php wuc_logo Parameter XSS
-
- 108630
- 2014-4854
- 58932
- http://packetstormsecurity.com/files/127287/
- http://www.securityfocus.com/bid/68287
-
- XSS
-
-
-
-
-
- Polylang 1.5.1 - User Description Handling Stored XSS
-
- 108634
- 2014-4855
- 59357
- http://www.securityfocus.com/bid/68509
-
- XSS
- 1.5.2
-
-
- Polylang 1.4.5 - Multiple Unspecified Issues
-
- 108953
-
- MULTI
- 1.5
-
-
-
-
-
- ENL Newsletter 1.0.1 - wp-admin/admin.php enl-add-new Page id Parameter SQL Injection
-
- 109027
- 2014-4939
- http://codevigilant.com/disclosure/wp-plugin-enl-newsletter-a1-injection/
-
- SQLI
-
-
-
-
-
- Tera Charts 0.1 - charts/zoomabletreemap.php fn Parameter Remote Path Traversal File Disclosure
-
- 109029
- 2014-4940
- http://www.securityfocus.com/bid/68662
- http://codevigilant.com/disclosure/wp-plugin-tera-chart-local-file-inclusion/
-
- FPD
- 1.0
-
-
- Tera Charts 0.1 - charts/treemap.php fn Parameter Remote Path Traversal File Disclosure
-
- 109028
- 2014-4940
- http://www.securityfocus.com/bid/68662
- http://codevigilant.com/disclosure/wp-plugin-tera-chart-local-file-inclusion/
-
- FPD
- 1.0
-
-
-
-
-
- Starbox Voting - ajax.php Full Path Disclosure vulnerability
-
- http://seclists.org/bugtraq/2011/Feb/222
-
- FPD
-
-
-
-
-
- Uploadify 1.0 - process_upload.php Arbitrary File Upload
-
- 73444
- http://packetstormsecurity.org/files/98652/
-
- RFI
-
-
-
-
-
- Plg Novana - wp-content/plugins/plg_novana/novana_detail.php id Parameter SQL Injection
-
- 87839
- http://www.securityfocus.com/bid/56661
- http://packetstormsecurity.org/files/118324/
- http://xforce.iss.net/xforce/xfdb/80258
-
- SQLI
-
-
-
-
-
- Paid Memberships Pro 1.4.7 - adminpages/memberslist-csv.php Direct Request Member Personal Information Disclosure
-
- 83760
- 49630
-
- UNKNOWN
- 1.5
-
-
-
-
-
- A Page Flip Book 2.3 - index.php pageflipbook_language Parameter Traversal Local File Inclusion
-
- 2012-6652
- 83667
- 49505
-
- LFI
-
-
-
-
diff --git a/data/theme_vulns.json b/data/theme_vulns.json
new file mode 100644
index 00000000..ef34b2df
--- /dev/null
+++ b/data/theme_vulns.json
@@ -0,0 +1 @@
+[{"crius":{"vulnerabilities":[{"id":89386,"title":"Crius - VideoJS Cross-Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/77","secunia":"53427","created_at":"2014-07-15T17:17:54.348Z","updated_at":"2014-07-15T17:17:54.348Z"}]}},{"source":{"vulnerabilities":[{"id":89387,"title":"Source - VideoJS Cross-Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/77","secunia":"53457","created_at":"2014-07-15T17:17:54.393Z","updated_at":"2014-07-15T17:17:54.393Z"}]}},{"i-love-it":{"vulnerabilities":[{"id":89388,"title":"I Love It - VideoJS Cross-Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/77","secunia":"53548","created_at":"2014-07-15T17:17:54.439Z","updated_at":"2014-07-15T17:17:54.439Z"}]}},{"smartstart":{"vulnerabilities":[{"id":89389,"title":"Smart Start - VideoJS Cross-Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/77","secunia":"53460","created_at":"2014-07-15T17:17:54.485Z","updated_at":"2014-07-15T17:17:54.485Z"}]}},{"covertvideopress":{"vulnerabilities":[{"id":89390,"title":"Covert Videopress - VideoJS Cross-Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/77","secunia":"53494","created_at":"2014-07-15T17:17:54.532Z","updated_at":"2014-07-15T17:17:54.532Z"}]}},{"photolio":{"vulnerabilities":[{"id":89391,"title":"Photolio - VideoJS Cross-Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/77","created_at":"2014-07-15T17:17:54.593Z","updated_at":"2014-07-15T17:17:54.593Z"}]}},{"onepagewebsite":{"vulnerabilities":[{"id":89392,"title":"onepagewebsite - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20027","created_at":"2014-07-15T17:17:54.639Z","updated_at":"2014-07-15T17:17:54.639Z"}]}},{"vithy":{"vulnerabilities":[{"id":89393,"title":"vithy - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20040","created_at":"2014-07-15T17:17:54.683Z","updated_at":"2014-07-15T17:17:54.683Z"},{"id":89394,"title":"vithy - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/19830","created_at":"2014-07-15T17:17:54.725Z","updated_at":"2014-07-15T17:17:54.725Z"},{"id":89395,"title":"vithy - Custom Background Shell Upload","url":"http://packetstormsecurity.com/files/125827/","created_at":"2014-07-15T17:17:54.768Z","updated_at":"2014-07-15T17:17:54.768Z"}]}},{"appius":{"vulnerabilities":[{"id":89396,"title":"appius - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20039","created_at":"2014-07-15T17:17:54.813Z","updated_at":"2014-07-15T17:17:54.813Z"},{"id":89397,"title":"appius - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/19831","created_at":"2014-07-15T17:17:54.854Z","updated_at":"2014-07-15T17:17:54.854Z"},{"id":89398,"title":"appius - Custom Background Shell Upload","url":"http://packetstormsecurity.com/files/125827/","created_at":"2014-07-15T17:17:54.899Z","updated_at":"2014-07-15T17:17:54.899Z"}]}},{"yvora":{"vulnerabilities":[{"id":89399,"title":"yvora - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20038","created_at":"2014-07-15T17:17:54.940Z","updated_at":"2014-07-15T17:17:54.940Z"},{"id":89400,"title":"yvora - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/19834","created_at":"2014-07-15T17:17:54.987Z","updated_at":"2014-07-15T17:17:54.987Z"}]}},{"shotzz":{"vulnerabilities":[{"id":89401,"title":"Shotzz - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20041","created_at":"2014-07-15T17:17:55.032Z","updated_at":"2014-07-15T17:17:55.032Z"},{"id":89402,"title":"Shotzz - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/19829","created_at":"2014-07-15T17:17:55.078Z","updated_at":"2014-07-15T17:17:55.078Z"},{"id":89403,"title":"Shotzz - Custom Background Shell Upload","url":"http://packetstormsecurity.com/files/125827/","created_at":"2014-07-15T17:17:55.124Z","updated_at":"2014-07-15T17:17:55.124Z"}]}},{"dagda":{"vulnerabilities":[{"id":89404,"title":"dagda - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/19832","created_at":"2014-07-15T17:17:55.167Z","updated_at":"2014-07-15T17:17:55.167Z"},{"id":89405,"title":"dagda - Custom Background Shell Upload","url":"http://packetstormsecurity.com/files/125827/","created_at":"2014-07-15T17:17:55.212Z","updated_at":"2014-07-15T17:17:55.212Z"}]}},{"moneymasters":{"vulnerabilities":[{"id":89406,"title":"moneymasters - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20077","created_at":"2014-07-15T17:17:55.259Z","updated_at":"2014-07-15T17:17:55.259Z"},{"id":89407,"title":"moneymasters - File Upload Vulnerability (metasploit)","url":"http://1337day.com/exploit/20076","created_at":"2014-07-15T17:17:55.305Z","updated_at":"2014-07-15T17:17:55.305Z"}]}},{"ovum":{"vulnerabilities":[{"id":89408,"title":"XSS vulnerability in Imediapixel premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html","created_at":"2014-07-15T17:17:55.352Z","updated_at":"2014-07-15T17:17:55.352Z"}]}},{"avanix":{"vulnerabilities":[{"id":89408,"title":"XSS vulnerability in Imediapixel premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html","created_at":"2014-07-15T17:17:55.352Z","updated_at":"2014-07-15T17:17:55.352Z"}]}},{"ebiz":{"vulnerabilities":[{"id":89408,"title":"XSS vulnerability in Imediapixel premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html","created_at":"2014-07-15T17:17:55.352Z","updated_at":"2014-07-15T17:17:55.352Z"}]}},{"ecobiz":{"vulnerabilities":[{"id":89408,"title":"XSS vulnerability in Imediapixel premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html","created_at":"2014-07-15T17:17:55.352Z","updated_at":"2014-07-15T17:17:55.352Z"}]}},{"traject":{"vulnerabilities":[{"id":89409,"title":"XSS vulnerability in Parallelus premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html","created_at":"2014-07-15T17:17:55.546Z","updated_at":"2014-07-15T17:17:55.546Z"},{"id":89610,"title":"testing!!!!123","url":"http://www.example.com","osvdb":"12f345,12345,1234g5","cve":"12345,12345,12345","secunia":"12345,2222,12345,12345","exploitdb":"12345","created_at":"2014-07-29T16:02:58.453Z","updated_at":"2014-07-29T21:03:59.991Z"}]}},{"intersect":{"vulnerabilities":[{"id":89409,"title":"XSS vulnerability in Parallelus premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html","created_at":"2014-07-15T17:17:55.546Z","updated_at":"2014-07-15T17:17:55.546Z"}]}},{"salutation":{"vulnerabilities":[{"id":89409,"title":"XSS vulnerability in Parallelus premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html","created_at":"2014-07-15T17:17:55.546Z","updated_at":"2014-07-15T17:17:55.546Z"}]}},{"unite":{"vulnerabilities":[{"id":89409,"title":"XSS vulnerability in Parallelus premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html","created_at":"2014-07-15T17:17:55.546Z","updated_at":"2014-07-15T17:17:55.546Z"}]}},{"shapeless":{"vulnerabilities":[{"id":89410,"title":"Shapeless - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85919","created_at":"2014-07-15T17:17:55.733Z","updated_at":"2014-07-15T17:17:55.733Z"}]}},{"brisk":{"vulnerabilities":[{"id":89411,"title":"Brisk - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85918","created_at":"2014-07-15T17:17:55.812Z","updated_at":"2014-07-15T17:17:55.812Z"}]}},{"blaze":{"vulnerabilities":[{"id":89412,"title":"Blaze - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85917","created_at":"2014-07-15T17:17:55.886Z","updated_at":"2014-07-15T17:17:55.886Z"}]}},{"eunice":{"vulnerabilities":[{"id":89413,"title":"Eunice - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85916","created_at":"2014-07-15T17:17:55.948Z","updated_at":"2014-07-15T17:17:55.948Z"}]}},{"explicit":{"vulnerabilities":[{"id":89414,"title":"Explicit - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85915","created_at":"2014-07-15T17:17:56.013Z","updated_at":"2014-07-15T17:17:56.013Z"}]}},{"essence":{"vulnerabilities":[{"id":89415,"title":"Essence - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85914","created_at":"2014-07-15T17:17:56.074Z","updated_at":"2014-07-15T17:17:56.074Z"}]}},{"paramount":{"vulnerabilities":[{"id":89416,"title":"Paramount - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85913","created_at":"2014-07-15T17:17:56.142Z","updated_at":"2014-07-15T17:17:56.142Z"}]}},{"picturefactory":{"vulnerabilities":[{"id":89417,"title":"PictureFactory - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85912","created_at":"2014-07-15T17:17:56.212Z","updated_at":"2014-07-15T17:17:56.212Z"}]}},{"sparky":{"vulnerabilities":[{"id":89418,"title":"Sparky - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85911","created_at":"2014-07-15T17:17:56.282Z","updated_at":"2014-07-15T17:17:56.282Z"}]}},{"theagency":{"vulnerabilities":[{"id":89419,"title":"TheAgency - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85910","created_at":"2014-07-15T17:17:56.342Z","updated_at":"2014-07-15T17:17:56.342Z"}]}},{"konzept":{"vulnerabilities":[{"id":89420,"title":"Konzept - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85920","created_at":"2014-07-15T17:17:56.386Z","updated_at":"2014-07-15T17:17:56.386Z"}]}},{"daisho":{"vulnerabilities":[{"id":89421,"title":"Daisho - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85921","created_at":"2014-07-15T17:17:56.429Z","updated_at":"2014-07-15T17:17:56.429Z"}]}},{"choices":{"vulnerabilities":[{"id":89422,"title":"Choices - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86755","created_at":"2014-07-15T17:17:56.484Z","updated_at":"2014-07-15T17:17:56.484Z"}]}},{"brightbox":{"vulnerabilities":[{"id":89423,"title":"Brightbox - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86756","created_at":"2014-07-15T17:17:56.540Z","updated_at":"2014-07-15T17:17:56.540Z"}]}},{"broadscope":{"vulnerabilities":[{"id":89424,"title":"Broadscope - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86757","created_at":"2014-07-15T17:17:56.598Z","updated_at":"2014-07-15T17:17:56.598Z"}]}},{"corona":{"vulnerabilities":[{"id":89425,"title":"Corona - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86758","created_at":"2014-07-15T17:17:56.665Z","updated_at":"2014-07-15T17:17:56.665Z"}]}},{"flashlight":{"vulnerabilities":[{"id":89426,"title":"Flashlight - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86759","created_at":"2014-07-15T17:17:56.720Z","updated_at":"2014-07-15T17:17:56.720Z"}]}},{"coalition":{"vulnerabilities":[{"id":89427,"title":"Coalition - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86760","created_at":"2014-07-15T17:17:56.770Z","updated_at":"2014-07-15T17:17:56.770Z"}]}},{"shoutbox":{"vulnerabilities":[{"id":89428,"title":"Shoutbox - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86761","created_at":"2014-07-15T17:17:56.815Z","updated_at":"2014-07-15T17:17:56.815Z"}]}},{"velvet":{"vulnerabilities":[{"id":89429,"title":"Velvet - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86762","created_at":"2014-07-15T17:17:56.858Z","updated_at":"2014-07-15T17:17:56.858Z"}]}},{"upscale":{"vulnerabilities":[{"id":89430,"title":"Upscale - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86763","created_at":"2014-07-15T17:17:56.900Z","updated_at":"2014-07-15T17:17:56.900Z"}]}},{"expose":{"vulnerabilities":[{"id":89431,"title":"Expose - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86764","created_at":"2014-07-15T17:17:56.946Z","updated_at":"2014-07-15T17:17:56.946Z"}]}},{"abundance":{"vulnerabilities":[{"id":89432,"title":"Abundance - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86765","created_at":"2014-07-15T17:17:56.992Z","updated_at":"2014-07-15T17:17:56.992Z"}]}},{"eunoia":{"vulnerabilities":[{"id":89433,"title":"Eunoia - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86766","created_at":"2014-07-15T17:17:57.048Z","updated_at":"2014-07-15T17:17:57.048Z"}]}},{"wise":{"vulnerabilities":[{"id":89434,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-07-15T17:17:57.113Z","updated_at":"2014-07-15T17:17:57.113Z"}]}},{"webfolio":{"vulnerabilities":[{"id":89434,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-07-15T17:17:57.113Z","updated_at":"2014-07-15T17:17:57.113Z","fixed_in":"2.0"}]}},{"colorbold":{"vulnerabilities":[{"id":89434,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-07-15T17:17:57.113Z","updated_at":"2014-07-15T17:17:57.113Z"}]}},{"rockwell":{"vulnerabilities":[{"id":89434,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-07-15T17:17:57.113Z","updated_at":"2014-07-15T17:17:57.113Z"},{"id":89602,"title":"this is a test","created_at":"2014-07-15T17:26:16.549Z","updated_at":"2014-07-15T17:26:16.549Z"}]}},{"xmas":{"vulnerabilities":[{"id":89434,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-07-15T17:17:57.113Z","updated_at":"2014-07-15T17:17:57.113Z"}]}},{"designpile":{"vulnerabilities":[{"id":89434,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-07-15T17:17:57.113Z","updated_at":"2014-07-15T17:17:57.113Z"}]}},{"alltuts":{"vulnerabilities":[{"id":89434,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-07-15T17:17:57.113Z","updated_at":"2014-07-15T17:17:57.113Z","fixed_in":"2.0"}]}},{"boldy":{"vulnerabilities":[{"id":89434,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-07-15T17:17:57.113Z","updated_at":"2014-07-15T17:17:57.113Z","fixed_in":"2.0"}]}},{"simplo":{"vulnerabilities":[{"id":89434,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-07-15T17:17:57.113Z","updated_at":"2014-07-15T17:17:57.113Z"}]}},{"diary":{"vulnerabilities":[{"id":89434,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-07-15T17:17:57.113Z","updated_at":"2014-07-15T17:17:57.113Z","fixed_in":"2.0"}]}},{"journalcrunch":{"vulnerabilities":[{"id":89434,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-07-15T17:17:57.113Z","updated_at":"2014-07-15T17:17:57.113Z","fixed_in":"2.0"}]}},{"prosume":{"vulnerabilities":[{"id":89434,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-07-15T17:17:57.113Z","updated_at":"2014-07-15T17:17:57.113Z","fixed_in":"2.0"}]}},{"famous":{"vulnerabilities":[{"id":89435,"title":"Famous 2.0.5 - Shell Upload","url":"http://packetstormsecurity.org/files/113842/","created_at":"2014-07-15T17:17:57.726Z","updated_at":"2014-07-15T17:17:57.726Z"}]}},{"deep-blue":{"vulnerabilities":[{"id":89436,"title":"Deep-Blue 1.9.2 - Arbitrary File Upload Vulnerability","url":"http://packetstormsecurity.org/files/113843/","created_at":"2014-07-15T17:17:57.775Z","updated_at":"2014-07-15T17:17:57.775Z"}]}},{"classipress":{"vulnerabilities":[{"id":89437,"title":"Classipress \u003c= 3.1.4 - Stored XSS","url":"http://cxsecurity.com/issue/WLB-2011110001","exploitdb":"18053","created_at":"2014-07-15T17:17:57.819Z","updated_at":"2014-07-15T17:17:57.819Z"}]}},{"merchant":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"smpl":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"drawar":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"sentient":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"whitelight":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"unsigned":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"shelflife":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"olya":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"sliding":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"beveled":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"empire-commerce":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"buro-commerce":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"briefed-commerce":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"wikeasi":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"currents":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"emporium":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"biznizz-commerce":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"kaboodle-commerce":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"inspire-commerce":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"teamster":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"argentum":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"statua-commerce":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"simplicity-commerce":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"canvas-commerce":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"wootique":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"woostore":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"coquette":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"buro":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"swatch":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"announcement":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"empire":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"supportpress":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"editorial":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"statua":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"briefed":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"faultpress":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"kaboodle":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"savinggrace":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"premiere":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"simplicity":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"deliciousmagazine":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"bookclub":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"boldnews":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"placeholder":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"biznizz":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"auld":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"listings":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"elefolio":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"chapters":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"continuum":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"diner":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"skeptical":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"caffeinated":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"crisp":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"sealight":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"estate":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"tma":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"coda":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"inspire":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"apz":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"spectrum":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"diarise":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"boast":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"retreat":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"cityguide":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"canvas":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"postcard":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"delegate":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"mystream":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"optimize":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"backstage":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"bueno":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"digitalfarm":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"headlines":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"therapy":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"rockstar":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"DailyDeal":{"vulnerabilities":[{"id":89439,"title":"DailyDeal - File Upload Remote Code Execution","url":"http://packetstormsecurity.com/files/123748/,http://templatic.com/app-themes/daily-deal-premium-wordpress-app-theme","osvdb":"98924","created_at":"2014-07-15T17:18:01.803Z","updated_at":"2014-07-15T17:18:01.803Z"}]}},{"dailyedition":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"object":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"coffeebreak":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"mainstream":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"featurepitch":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"thejournal":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"aperture":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"metamorphosis":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"bloggingstream":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"thestation":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"groovyvideo":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"irresistible":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"cushy":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"wootube":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"abstract":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"busybee":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"blogtheme":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"typebased":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"overeasy":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"snapshot":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"openair":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"freshnews":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"livewire":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"flashnews":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"},{"id":89440,"title":"Flash News - thumb.php src Parameter XSS","url":"http://packetstormsecurity.com/files/120037/,http://seclists.org/fulldisclosure/2013/Feb/8,http://cxsecurity.com/issue/WLB-2013020010","osvdb":"89887","created_at":"2014-07-15T17:18:03.519Z","updated_at":"2014-07-15T17:18:03.519Z"},{"id":89441,"title":"Flash News - Multiple Script Path Disclosure","url":"http://packetstormsecurity.com/files/120037/,http://seclists.org/fulldisclosure/2013/Feb/8,http://cxsecurity.com/issue/WLB-2013020010","osvdb":"89888","created_at":"2014-07-15T17:18:03.564Z","updated_at":"2014-07-15T17:18:03.564Z"},{"id":89442,"title":"Flash News - includes/test.php a Parameter XSS","url":"http://packetstormsecurity.com/files/120037/,http://seclists.org/fulldisclosure/2013/Feb/8,http://cxsecurity.com/issue/WLB-2013020010","osvdb":"89889","created_at":"2014-07-15T17:18:03.607Z","updated_at":"2014-07-15T17:18:03.607Z"},{"id":89443,"title":"Flash News - includes/test.php Direct Request Information Disclosure","url":"http://packetstormsecurity.com/files/120037/,http://seclists.org/fulldisclosure/2013/Feb/8,http://cxsecurity.com/issue/WLB-2013020010","osvdb":"89890","created_at":"2014-07-15T17:18:03.653Z","updated_at":"2014-07-15T17:18:03.653Z"},{"id":89444,"title":"Flash News - thumb.php src Parameter File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/120037/,http://seclists.org/fulldisclosure/2013/Feb/8,http://cxsecurity.com/issue/WLB-2013020010","osvdb":"89891","created_at":"2014-07-15T17:18:03.695Z","updated_at":"2014-07-15T17:18:03.695Z"},{"id":89445,"title":"Flash News - thumb.php src Parameter Remote DoS","url":"http://packetstormsecurity.com/files/120037/,http://seclists.org/fulldisclosure/2013/Feb/8,http://cxsecurity.com/issue/WLB-2013020010","osvdb":"89892","created_at":"2014-07-15T17:18:03.737Z","updated_at":"2014-07-15T17:18:03.737Z"}]}},{"gazette":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"premiumnews":{"vulnerabilities":[{"id":89438,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-07-15T17:17:57.865Z","updated_at":"2014-07-15T17:17:57.865Z"}]}},{"dt-chocolate":{"vulnerabilities":[{"id":89446,"title":"dt-chocolate - jPlayer XSS","url":"http://packetstormsecurity.com/files/124756/","secunia":"56379","created_at":"2014-07-15T17:18:03.881Z","updated_at":"2014-07-15T17:18:03.881Z"},{"id":89447,"title":"dt-chocolate - Image Open redirect","url":"http://cxsecurity.com/issue/WLB-2013020011","created_at":"2014-07-15T17:18:03.922Z","updated_at":"2014-07-15T17:18:03.922Z"},{"id":89448,"title":"Multiple vulnerabilities in Chocolate WP theme for WordPress","url":"http://seclists.org/fulldisclosure/2013/Jan/215","created_at":"2014-07-15T17:18:03.962Z","updated_at":"2014-07-15T17:18:03.962Z"}]}},{"sandbox":{"vulnerabilities":[{"id":89449,"title":"sandbox - Arbitrary File Upload/FD Vulnerability","url":"http://1337day.com/exploit/20228","created_at":"2014-07-15T17:18:04.018Z","updated_at":"2014-07-15T17:18:04.018Z"}]}},{"clockstone":{"vulnerabilities":[{"id":89450,"title":"Clockstone 1.2 - upload.php Arbitrary File Upload Vulnerability","url":"http://www.exploit-db.com/exploits/23494,http://www.securityfocus.com/bid/56988,http://xforce.iss.net/xforce/xfdb/80725","osvdb":"88622","secunia":"51619","created_at":"2014-07-15T17:18:04.071Z","updated_at":"2014-07-15T17:18:04.071Z"}]}},{"archin":{"vulnerabilities":[{"id":89451,"title":"Archin 3.2 - Cross-Site Scripting and Arbitrary File Upload Vulnerabilities","secunia":"50711","created_at":"2014-07-15T17:18:04.122Z","updated_at":"2014-07-15T17:18:04.122Z"},{"id":89452,"title":"Archin 3.2 - hades_framework/option_panel/ajax.php Configuration Option Manipulation","osvdb":"86991","exploitdb":"21646","created_at":"2014-07-15T17:18:04.170Z","updated_at":"2014-07-15T17:18:04.170Z"}]}},{"purity":{"vulnerabilities":[{"id":89453,"title":"Purity - Multiple Cross-Site Scripting Vulnerabilities","secunia":"50627","created_at":"2014-07-15T17:18:04.220Z","updated_at":"2014-07-15T17:18:04.220Z"}]}},{"pinboard":{"vulnerabilities":[{"id":89454,"title":"Pinboard 1.0.6 - includes/theme-options.php tab Parameter XSS","url":"http://seclists.org/oss-sec/2013/q1/274,http://cxsecurity.com/issue/WLB-2013020062","osvdb":"90070","cve":"2013-0286","secunia":"52079","created_at":"2014-07-15T17:18:04.270Z","updated_at":"2014-07-15T17:18:04.270Z"},{"id":89455,"title":"Pinboard - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124151/","osvdb":"100271","created_at":"2014-07-15T17:18:04.314Z","updated_at":"2014-07-15T17:18:04.314Z"}]}},{"montezuma":{"vulnerabilities":[{"id":89456,"title":"montezuma \u003c= 1.1.3 - XSS in ZeroClipboard.swf","url":"http://1337day.com/exploit/20396","created_at":"2014-07-15T17:18:04.357Z","updated_at":"2014-07-15T17:18:04.357Z"}]}},{"scarlet":{"vulnerabilities":[{"id":89457,"title":"scarlet \u003c= 1.1.3 - XSS in ZeroClipboard.swf","url":"http://1337day.com/exploit/20396","created_at":"2014-07-15T17:18:04.401Z","updated_at":"2014-07-15T17:18:04.401Z"}]}},{"allure-real-estate-theme-for-placester":{"vulnerabilities":[{"id":89458,"title":"allure-real-estate-theme-for-placester \u003c= 0.1.1 - XSS in ZeroClipboard.swf","url":"http://1337day.com/exploit/20396","created_at":"2014-07-15T17:18:04.448Z","updated_at":"2014-07-15T17:18:04.448Z"}]}},{"allure-real-estate-theme-for-real-estate":{"vulnerabilities":[{"id":89459,"title":"allure-real-estate-theme-for-real-estate \u003c= 0.1.1 - XSS in ZeroClipboard.swf","url":"http://1337day.com/exploit/20396","created_at":"2014-07-15T17:18:04.513Z","updated_at":"2014-07-15T17:18:04.513Z"}]}},{"felici":{"vulnerabilities":[{"id":89460,"title":"felici - XSS Vulnerability","url":"http://1337day.com/exploit/20560","created_at":"2014-07-15T17:18:04.586Z","updated_at":"2014-07-15T17:18:04.586Z"},{"id":89461,"title":"felici - Custom Background Shell Upload","url":"http://packetstormsecurity.com/files/125830/","created_at":"2014-07-15T17:18:04.667Z","updated_at":"2014-07-15T17:18:04.667Z"}]}},{"classic":{"vulnerabilities":[{"id":89462,"title":"Classic 1.5 - PHP_SELF XSS","osvdb":"38450","cve":"2007-4483","created_at":"2014-07-15T17:18:04.744Z","updated_at":"2014-07-15T17:18:04.744Z"}]}},{"brilliant":{"vulnerabilities":[{"id":89463,"title":"brilliant - File Upload Vulnerability","url":"http://ruinedsec.wordpress.com/2013/04/03/wordpress-themes-exploits-are-in-action-wpscan/","created_at":"2014-07-15T17:18:04.808Z","updated_at":"2014-07-15T17:18:04.808Z"}]}},{"colormix":{"vulnerabilities":[{"id":89464,"title":"Colormix - Multiple vulnerabilities","url":"http://packetstormsecurity.com/files/121372/,http://seclists.org/fulldisclosure/2013/Apr/172","created_at":"2014-07-15T17:18:04.868Z","updated_at":"2014-07-15T17:18:04.868Z"}]}},{"jobroller":{"vulnerabilities":[{"id":89465,"title":"XSS in jobroller theme","url":"http://cxsecurity.com/issue/WLB-2013060089","created_at":"2014-07-15T17:18:04.931Z","updated_at":"2014-07-15T17:18:04.931Z"}]}},{"ambience":{"vulnerabilities":[{"id":89466,"title":"Xss In wordpress ambience theme","url":"http://www.websecuritywatch.com/wordpress-ambience-xss/","created_at":"2014-07-15T17:18:04.995Z","updated_at":"2014-07-15T17:18:04.995Z"}]}},{"slash-wp":{"vulnerabilities":[{"id":89467,"title":"Slash WP - FPD, XSS and CS vulnerabilities","url":"http://packetstormsecurity.com/files/123748/,http://seclists.org/fulldisclosure/2013/Jun/166","created_at":"2014-07-15T17:18:05.061Z","updated_at":"2014-07-15T17:18:05.061Z"}]}},{"persuasion":{"vulnerabilities":[{"id":89468,"title":"Persuasion - PrettyPhoto DOM XSS","url":"http://www.rafayhackingarticles.net/2013/05/kali-linux-dom-based-xss-writeup.html","created_at":"2014-07-15T17:18:05.119Z","updated_at":"2014-07-15T17:18:05.119Z"},{"id":89469,"title":"Persuasion \u003c= 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://packetstormsecurity.com/files/124547/,http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-07-15T17:18:05.177Z","updated_at":"2014-07-15T17:18:05.177Z","fixed_in":"2.5"},{"id":89470,"title":"Persuasion \u003c= 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://packetstormsecurity.com/files/124547/,http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-07-15T17:18:05.232Z","updated_at":"2014-07-15T17:18:05.232Z","fixed_in":"2.5"}]}},{"More":{"vulnerabilities":[{"id":89471,"title":"MORE+ - PrettyPhoto XSS Vulnerability","url":"http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0177.html","secunia":"54924","created_at":"2014-07-15T17:18:05.291Z","updated_at":"2014-07-15T17:18:05.291Z"}]}},{"silverorchid":{"vulnerabilities":[{"id":89472,"title":"silverOrchid \u003c= 1.5.0 - XSS Vulnerability","url":"http://packetstormsecurity.com/files/122986/","osvdb":"96723","secunia":"54662","created_at":"2014-07-15T17:18:05.361Z","updated_at":"2014-07-15T17:18:05.361Z"}]}},{"Caulk":{"vulnerabilities":[{"id":89473,"title":"Caulk - path disclosure vulnerability","url":"http://packetstormsecurity.com/files/120632/,http://themeforest.net/item/caulk/76108","osvdb":"90889","created_at":"2014-07-15T17:18:05.429Z","updated_at":"2014-07-15T17:18:05.429Z"}]}},{"WPLocalPlaces":{"vulnerabilities":[{"id":89474,"title":"WPLocalPlaces - File Upload Remote Code Execution","url":"http://packetstormsecurity.com/files/123697/","osvdb":"98806","created_at":"2014-07-15T17:18:05.497Z","updated_at":"2014-07-15T17:18:05.497Z"}]}},{"photocrati-theme":{"vulnerabilities":[{"id":89475,"title":"Photocrati 4.7.3 - photocrati-gallery/ecomm-sizes.php prod_id Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124986/","osvdb":"102717","secunia":"56690","created_at":"2014-07-15T17:18:05.556Z","updated_at":"2014-07-15T17:18:05.556Z"},{"id":89476,"title":"Photocrati - Multiple Script Direct Request Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Apr/238","osvdb":"92836","created_at":"2014-07-15T17:18:05.605Z","updated_at":"2014-07-15T17:18:05.605Z"}]}},{"music":{"vulnerabilities":[{"id":89477,"title":"Music - Multiple Script Direct Request Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Apr/238","osvdb":"92837","created_at":"2014-07-15T17:18:05.650Z","updated_at":"2014-07-15T17:18:05.650Z"}]}},{"imperial-fairytale":{"vulnerabilities":[{"id":89478,"title":"Imperial Fairytale - Multiple Script Direct Request Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Apr/238","osvdb":"92838","created_at":"2014-07-15T17:18:05.694Z","updated_at":"2014-07-15T17:18:05.694Z"},{"id":89479,"title":"Imperial Fairytale - jPlayer Cross-Site Scripting Vulnerability","url":"http://seclists.org/oss-sec/2013/q2/177","secunia":"53210","created_at":"2014-07-15T17:18:05.738Z","updated_at":"2014-07-15T17:18:05.738Z"}]}},{"feather12":{"vulnerabilities":[{"id":89480,"title":"Feather12 - Multiple Script Direct Request Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Apr/238","osvdb":"92839","created_at":"2014-07-15T17:18:05.783Z","updated_at":"2014-07-15T17:18:05.783Z"}]}},{"studiozen":{"vulnerabilities":[{"id":89481,"title":"Studio Zen - Multiple Script Direct Request Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Apr/238","osvdb":"92840","created_at":"2014-07-15T17:18:05.826Z","updated_at":"2014-07-15T17:18:05.826Z"},{"id":89482,"title":"Studio Zen - jPlayer Cross-Site Scripting Vulnerability","url":" http://seclists.org/oss-sec/2013/q2/177","secunia":"53212","created_at":"2014-07-15T17:18:05.868Z","updated_at":"2014-07-15T17:18:05.868Z"}]}},{"area53":{"vulnerabilities":[{"id":89483,"title":"AREA53 \u003c= 1.0.5 - File Upload Code Execution","url":"http://www.securityfocus.com/bid/63306,http://1337day.com/exploit/21442","osvdb":"98927","exploitdb":"29068","created_at":"2014-07-15T17:18:05.910Z","updated_at":"2014-07-15T17:18:05.910Z"}]}},{"sahifa":{"vulnerabilities":[{"id":89484,"title":"Sahifa 2.4.0 - Multiple Script Path Disclosure Direct Request Path Disclosure","url":"http://packetstormsecurity.com/files/119191/,http://www.securityfocus.com/bid/57109","osvdb":"88926","created_at":"2014-07-15T17:18:05.954Z","updated_at":"2014-07-15T17:18:05.954Z"},{"id":89485,"title":"Sahifa 2.4.0 - Site Setting Reset CSRF","url":"http://packetstormsecurity.com/files/119191/,http://www.securityfocus.com/bid/57109","osvdb":"88927","created_at":"2014-07-15T17:18:06.001Z","updated_at":"2014-07-15T17:18:06.001Z"}]}},{"simpledark":{"vulnerabilities":[{"id":89486,"title":"SimpleDark 1.2.10 - 's' Parameter Cross Site Scripting Vulnerability","url":"http://www.securityfocus.com/bid/46615","created_at":"2014-07-15T17:18:06.046Z","updated_at":"2014-07-15T17:18:06.046Z"}]}},{"geoplaces4":{"vulnerabilities":[{"id":89487,"title":"GeoPlaces - File Upload Handling Remote Command Execution","url":"http://packetstormsecurity.com/files/123773/","osvdb":"98975","created_at":"2014-07-15T17:18:06.089Z","updated_at":"2014-07-15T17:18:06.089Z"}]}},{"curvo":{"vulnerabilities":[{"id":89488,"title":"Curvo - wp-content/themes/curvo/functions/upload-handler.php File Upload CSRF","url":"http://packetstormsecurity.com/files/123799/,http://packetstormsecurity.com/files/123820/","osvdb":"99043","exploitdb":"29211","created_at":"2014-07-15T17:18:06.141Z","updated_at":"2014-07-15T17:18:06.141Z"}]}},{"MoneyTheme":{"vulnerabilities":[{"id":89489,"title":"Money - wp-content/themes/MoneyTheme/uploads/upload.php File Upload Remote Code Execution","url":"http://packetstormsecurity.com/files/123819/","osvdb":"99187","created_at":"2014-07-15T17:18:06.184Z","updated_at":"2014-07-15T17:18:06.184Z"}]}},{"saico":{"vulnerabilities":[{"id":89490,"title":"Saico - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21440","exploitdb":"29150","created_at":"2014-07-15T17:18:06.224Z","updated_at":"2014-07-15T17:18:06.224Z"}]}},{"ThisWay":{"vulnerabilities":[{"id":89491,"title":"ThisWay - remote shell upload vulnerability","url":"http://packetstormsecurity.com/files/123895/","secunia":"55587","created_at":"2014-07-15T17:18:06.268Z","updated_at":"2014-07-15T17:18:06.268Z"}]}},{"ThinkResponsive":{"vulnerabilities":[{"id":89492,"title":"Think Responsive 1.0 - Arbitrary shell upload vulnerability","url":"http://packetstormsecurity.com/files/123880/","exploitdb":"29332","created_at":"2014-07-15T17:18:06.308Z","updated_at":"2014-07-15T17:18:06.308Z"}]}},{"anthology":{"vulnerabilities":[{"id":89493,"title":"Anthology - Remote File Upload Vulnerability","url":"http://1337day.com/exploit/21460","created_at":"2014-07-15T17:18:06.350Z","updated_at":"2014-07-15T17:18:06.350Z"}]}},{"amoveo":{"vulnerabilities":[{"id":89494,"title":"Amoveo - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21451","created_at":"2014-07-15T17:18:06.391Z","updated_at":"2014-07-15T17:18:06.391Z"}]}},{"switchblade":{"vulnerabilities":[{"id":89495,"title":"Switchblade 1.3 - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21457","osvdb":"88918","exploitdb":"29330","created_at":"2014-07-15T17:18:06.436Z","updated_at":"2014-07-15T17:18:06.436Z"}]}},{"magnitudo":{"vulnerabilities":[{"id":89496,"title":"Magnitudo - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21457","created_at":"2014-07-15T17:18:06.477Z","updated_at":"2014-07-15T17:18:06.477Z"}]}},{"ghost":{"vulnerabilities":[{"id":89497,"title":"Ghost - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21416","created_at":"2014-07-15T17:18:06.525Z","updated_at":"2014-07-15T17:18:06.525Z"}]}},{"RightNow":{"vulnerabilities":[{"id":89498,"title":"Right Now - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21420","created_at":"2014-07-15T17:18:06.566Z","updated_at":"2014-07-15T17:18:06.566Z"}]}},{"ColdFusion":{"vulnerabilities":[{"id":89499,"title":"Cold Fusion - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21431","created_at":"2014-07-15T17:18:06.609Z","updated_at":"2014-07-15T17:18:06.609Z"}]}},{"chameleon":{"vulnerabilities":[{"id":89500,"title":"Chameleon - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21449","created_at":"2014-07-15T17:18:06.649Z","updated_at":"2014-07-15T17:18:06.649Z"}]}},{"kernel-theme":{"vulnerabilities":[{"id":89501,"title":"Kernel Theme - functions/upload-handler.php File Upload Remote Code Execution","url":"http://packetstormsecurity.com/files/123954/","osvdb":"99553","exploitdb":"29482","created_at":"2014-07-15T17:18:06.691Z","updated_at":"2014-07-15T17:18:06.691Z"}]}},{"rockstar-theme":{"vulnerabilities":[{"id":89502,"title":"Rockstar - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21510","exploitdb":"29946","created_at":"2014-07-15T17:18:06.733Z","updated_at":"2014-07-15T17:18:06.733Z"}]}},{"reganto-theme":{"vulnerabilities":[{"id":89503,"title":"Reganto - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21511","exploitdb":"29946","created_at":"2014-07-15T17:18:06.776Z","updated_at":"2014-07-15T17:18:06.776Z"}]}},{"rayoflight-theme":{"vulnerabilities":[{"id":89504,"title":"Ray of Light - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21512","exploitdb":"29946","created_at":"2014-07-15T17:18:06.817Z","updated_at":"2014-07-15T17:18:06.817Z"}]}},{"radial-theme":{"vulnerabilities":[{"id":89505,"title":"Radial - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21513","exploitdb":"29946","created_at":"2014-07-15T17:18:06.858Z","updated_at":"2014-07-15T17:18:06.858Z"}]}},{"oxygen-theme":{"vulnerabilities":[{"id":89506,"title":"Oxygen - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21514","exploitdb":"29946","created_at":"2014-07-15T17:18:06.903Z","updated_at":"2014-07-15T17:18:06.903Z"}]}},{"bulteno-theme":{"vulnerabilities":[{"id":89507,"title":"Bulteno - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21515","exploitdb":"29946","created_at":"2014-07-15T17:18:06.946Z","updated_at":"2014-07-15T17:18:06.946Z"}]}},{"bordeaux-theme":{"vulnerabilities":[{"id":89508,"title":"Bordeaux - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21516","exploitdb":"29946","created_at":"2014-07-15T17:18:06.992Z","updated_at":"2014-07-15T17:18:06.992Z"}]}},{"agritourismo-theme":{"vulnerabilities":[{"id":89509,"title":"Agritourismo - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/124232/","exploitdb":"29946","created_at":"2014-07-15T17:18:07.034Z","updated_at":"2014-07-15T17:18:07.034Z"}]}},{"highlight":{"vulnerabilities":[{"id":89510,"title":"Highlight Powerful Premium - upload-handler.php File Upload CSRF","url":"http://packetstormsecurity.com/files/123974/","osvdb":"99703","secunia":"55671","exploitdb":"29525","created_at":"2014-07-15T17:18:07.079Z","updated_at":"2014-07-15T17:18:07.079Z"}]}},{"euclid":{"vulnerabilities":[{"id":89511,"title":"Euclid - CSRF Vulnerability","url":"http://packetstormsecurity.com/files/124043/,http://1337day.com/exploit/21538","exploitdb":"29667","created_at":"2014-07-15T17:18:07.121Z","updated_at":"2014-07-15T17:18:07.121Z"}]}},{"dimension":{"vulnerabilities":[{"id":89512,"title":"Dimension - CSRF Vulnerability","url":"http://packetstormsecurity.com/files/124042/,http://1337day.com/exploit/21537","exploitdb":"29668","created_at":"2014-07-15T17:18:07.165Z","updated_at":"2014-07-15T17:18:07.165Z"}]}},{"amplus":{"vulnerabilities":[{"id":89513,"title":"Amplus - CSRF Vulnerability","url":"http://packetstormsecurity.com/files/124041/,http://1337day.com/exploit/21535","exploitdb":"29669","created_at":"2014-07-15T17:18:07.211Z","updated_at":"2014-07-15T17:18:07.211Z"}]}},{"make_a_statement":{"vulnerabilities":[{"id":89514,"title":"Make A Statement - CSRF Vulnerability","url":"http://packetstormsecurity.com/files/124044/,http://1337day.com/exploit/21536","exploitdb":"29670","created_at":"2014-07-15T17:18:07.255Z","updated_at":"2014-07-15T17:18:07.255Z"}]}},{"ithemes2":{"vulnerabilities":[{"id":89515,"title":"iThemes2 - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/","osvdb":"100271","created_at":"2014-07-15T17:18:07.295Z","updated_at":"2014-07-15T17:18:07.295Z"}]}},{"suco":{"vulnerabilities":[{"id":89516,"title":"Suco - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124094/","osvdb":"100271","created_at":"2014-07-15T17:18:07.337Z","updated_at":"2014-07-15T17:18:07.337Z"}]}},{"elemin":{"vulnerabilities":[{"id":89517,"title":"Elemin - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124149/","osvdb":"100271","created_at":"2014-07-15T17:18:07.378Z","updated_at":"2014-07-15T17:18:07.378Z"}]}},{"folo":{"vulnerabilities":[{"id":89518,"title":"Folo - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124150/","osvdb":"100271","created_at":"2014-07-15T17:18:07.422Z","updated_at":"2014-07-15T17:18:07.422Z"},{"id":89519,"title":"Folo - Cross Site Scripting","url":"http://packetstormsecurity.com/files/124230/","created_at":"2014-07-15T17:18:07.464Z","updated_at":"2014-07-15T17:18:07.464Z"}]}},{"Bloggie":{"vulnerabilities":[{"id":89520,"title":"Bloggie - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124152/","osvdb":"100271","created_at":"2014-07-15T17:18:07.511Z","updated_at":"2014-07-15T17:18:07.511Z"}]}},{"blogfolio":{"vulnerabilities":[{"id":89521,"title":"Blogfolio - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124156/","osvdb":"100271","created_at":"2014-07-15T17:18:07.553Z","updated_at":"2014-07-15T17:18:07.553Z"}]}},{"OptimizePress":{"vulnerabilities":[{"id":89522,"title":"OptimizePress - File Upload Vulnerability","url":"http://packetstormsecurity.com/files/124246/,http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/","osvdb":"100509","cve":"2013-7102","secunia":"56379","created_at":"2014-07-15T17:18:07.593Z","updated_at":"2014-07-15T17:18:07.593Z","metasploit":"exploit/unix/webapp/php_wordpress_optimizepress"}]}},{"blooog":{"vulnerabilities":[{"id":89523,"title":"Blooog 1.1 - jplayer.swf Cross Site Scripting","url":"http://packetstormsecurity.com/files/124240/,http://xforce.iss.net/xforce/xfdb/89356","osvdb":"92254","cve":"2013-7129","created_at":"2014-07-15T17:18:07.638Z","updated_at":"2014-07-15T17:18:07.638Z"}]}},{"toolbox":{"vulnerabilities":[{"id":89524,"title":"Toolbox 1.4 - flyer.php mls Parameter SQL Injection","url":"http://www.securityfocus.com/bid/56745","osvdb":"88293","created_at":"2014-07-15T17:18:07.681Z","updated_at":"2014-07-15T17:18:07.681Z"}]}},{"oberliga_theme":{"vulnerabilities":[{"id":89525,"title":"Oberliga - team.php team Parameter SQL Injection","url":"http://packetstormsecurity.org/files/118368/,http://xforce.iss.net/xforce/xfdb/80273","osvdb":"88454","created_at":"2014-07-15T17:18:07.724Z","updated_at":"2014-07-15T17:18:07.724Z"}]}},{"cstardesign":{"vulnerabilities":[{"id":89526,"title":"CStar Design 2.0 - flashmoXML.php id Parameter SQL Injection","url":"http://www.securityfocus.com/bid/56694","osvdb":"88291","created_at":"2014-07-15T17:18:07.767Z","updated_at":"2014-07-15T17:18:07.767Z"}]}},{"malmonation":{"vulnerabilities":[{"id":89527,"title":"Malmonation - debate.php id Parameter SQL Injection","url":"http://packetstormsecurity.org/files/118340/,http://xforce.iss.net/xforce/xfdb/80252","osvdb":"87866","created_at":"2014-07-15T17:18:07.819Z","updated_at":"2014-07-15T17:18:07.819Z"}]}},{"lightspeed":{"vulnerabilities":[{"id":89528,"title":"LightSpeed - Valums Uploader Shell Upload Exploit","url":"http://packetstormsecurity.com/files/119241/","created_at":"2014-07-15T17:18:07.865Z","updated_at":"2014-07-15T17:18:07.865Z"}]}},{"eptonic":{"vulnerabilities":[{"id":89529,"title":"Eptonic - Valums Uploader Shell Upload Exploit","url":"http://packetstormsecurity.com/files/119241/","created_at":"2014-07-15T17:18:07.906Z","updated_at":"2014-07-15T17:18:07.906Z"}]}},{"nuance":{"vulnerabilities":[{"id":89530,"title":"Nuance - Valums Uploader Shell Upload Exploit","url":"http://packetstormsecurity.com/files/119241/","created_at":"2014-07-15T17:18:07.952Z","updated_at":"2014-07-15T17:18:07.952Z"}]}},{"dejavu":{"vulnerabilities":[{"id":89531,"title":"DejaVu 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-07-15T17:18:07.994Z","updated_at":"2014-07-15T17:18:07.994Z","fixed_in":"2.5"},{"id":89532,"title":"DejaVu 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-07-15T17:18:08.035Z","updated_at":"2014-07-15T17:18:08.035Z","fixed_in":"2.5"}]}},{"elegance":{"vulnerabilities":[{"id":89533,"title":"Elegance - lib/scripts/dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Access","url":"http://packetstormsecurity.com/files/126989/","osvdb":"108100","created_at":"2014-07-15T17:18:08.077Z","updated_at":"2014-07-15T17:18:08.077Z"},{"id":89534,"title":"Elegance 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-07-15T17:18:08.139Z","updated_at":"2014-07-15T17:18:08.139Z","fixed_in":"2.5"},{"id":89535,"title":"Elegance 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-07-15T17:18:08.186Z","updated_at":"2014-07-15T17:18:08.186Z","fixed_in":"2.5"}]}},{"echelon":{"vulnerabilities":[{"id":89536,"title":"Echelon - media-upload.php Remote File Upload","url":"http://www.securityfocus.com/bid/67080,http://packetstormsecurity.com/files/126327/","osvdb":"106929","created_at":"2014-07-15T17:18:08.267Z","updated_at":"2014-07-15T17:18:08.267Z"},{"id":89537,"title":"Echelon 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-07-15T17:18:08.325Z","updated_at":"2014-07-15T17:18:08.325Z","fixed_in":"2.5"},{"id":89538,"title":"Echelon 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-07-15T17:18:08.378Z","updated_at":"2014-07-15T17:18:08.378Z","fixed_in":"2.5"}]}},{"modular":{"vulnerabilities":[{"id":89539,"title":"Modular 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-07-15T17:18:08.429Z","updated_at":"2014-07-15T17:18:08.429Z","fixed_in":"2.5"},{"id":89540,"title":"Modular 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-07-15T17:18:08.481Z","updated_at":"2014-07-15T17:18:08.481Z","fixed_in":"2.5"}]}},{"fusion":{"vulnerabilities":[{"id":89541,"title":"Fusion 2.1 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-07-15T17:18:08.534Z","updated_at":"2014-07-15T17:18:08.534Z","fixed_in":"2.2"},{"id":89542,"title":"Fusion 2.1 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-07-15T17:18:08.593Z","updated_at":"2014-07-15T17:18:08.593Z","fixed_in":"2.2"}]}},{"method":{"vulnerabilities":[{"id":89543,"title":"Method 2.1 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-07-15T17:18:08.652Z","updated_at":"2014-07-15T17:18:08.652Z","fixed_in":"2.5"},{"id":89544,"title":"Method 2.1 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-07-15T17:18:08.702Z","updated_at":"2014-07-15T17:18:08.702Z","fixed_in":"2.2"}]}},{"myriad":{"vulnerabilities":[{"id":89545,"title":"Myriad 2.0 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-07-15T17:18:08.746Z","updated_at":"2014-07-15T17:18:08.746Z","fixed_in":"2.5"},{"id":89546,"title":"Myriad 2.0 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-07-15T17:18:08.788Z","updated_at":"2014-07-15T17:18:08.788Z","fixed_in":"2.1"}]}},{"construct":{"vulnerabilities":[{"id":89547,"title":"Construct 1.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-07-15T17:18:08.832Z","updated_at":"2014-07-15T17:18:08.832Z","fixed_in":"2.5"},{"id":89548,"title":"Construct 1.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-07-15T17:18:08.873Z","updated_at":"2014-07-15T17:18:08.873Z","fixed_in":"1.5"}]}},{"awake":{"vulnerabilities":[{"id":89549,"title":"Awake 3.3 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-07-15T17:18:08.914Z","updated_at":"2014-07-15T17:18:08.914Z","fixed_in":"2.5"},{"id":89550,"title":"Awake 3.3 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-07-15T17:18:08.968Z","updated_at":"2014-07-15T17:18:08.968Z","fixed_in":"3.4"}]}},{"infocus":{"vulnerabilities":[{"id":89551,"title":"InFocus - lib/scripts/dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Access","url":"http://packetstormsecurity.com/files/126988/","osvdb":"108099","created_at":"2014-07-15T17:18:09.031Z","updated_at":"2014-07-15T17:18:09.031Z"},{"id":89552,"title":"InFocus - prettyPhoto Cross-Site Scripting Vulnerability","url":"http://packetstormsecurity.com/files/124960/","secunia":"56583","created_at":"2014-07-15T17:18:09.077Z","updated_at":"2014-07-15T17:18:09.077Z"},{"id":89553,"title":"InFocus 3.3 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-07-15T17:18:09.119Z","updated_at":"2014-07-15T17:18:09.119Z","fixed_in":"3.4"},{"id":89554,"title":"InFocus 3.3 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-07-15T17:18:09.163Z","updated_at":"2014-07-15T17:18:09.163Z","fixed_in":"3.4"}]}},{"elegant-grunge":{"vulnerabilities":[{"id":89555,"title":"Elegant Grunge 1.0.3 - s Parameter XSS","url":"http://www.securityfocus.com/bid/49869","osvdb":"75942","cve":"2011-3856","created_at":"2014-07-15T17:18:09.208Z","updated_at":"2014-07-15T17:18:09.208Z","fixed_in":"1.0.4"}]}},{"simplebalance":{"vulnerabilities":[{"id":89556,"title":"Simple Balance \u003c= 2.2.1 - index.php s Parameter XSS","url":"http://packetstormsecurity.com/files/106341/","osvdb":"76722","secunia":"46671","created_at":"2014-07-15T17:18:09.254Z","updated_at":"2014-07-15T17:18:09.254Z"}]}},{"codilight":{"vulnerabilities":[{"id":89557,"title":"Codilight Premium 1.0.0 - admin/front-end/options.php reset Parameter XSS","osvdb":"100791","created_at":"2014-07-15T17:18:09.301Z","updated_at":"2014-07-15T17:18:09.301Z"}]}},{"iloveit":{"vulnerabilities":[{"id":89558,"title":"Love It - XSS / Content Spoofing / Path Disclosure","url":"http://packetstormsecurity.com/files/122386/","created_at":"2014-07-15T17:18:09.344Z","updated_at":"2014-07-15T17:18:09.344Z"}]}},{"dandelion":{"vulnerabilities":[{"id":89559,"title":"Dandelion - Arbitry File Upload","url":"http://packetstormsecurity.com/files/125098/","osvdb":"99043","exploitdb":"31424","created_at":"2014-07-15T17:18:09.391Z","updated_at":"2014-07-15T17:18:09.391Z"}]}},{"kiddo":{"vulnerabilities":[{"id":89560,"title":"Kiddo - remote shell upload vulnerability","url":"http://packetstormsecurity.com/files/125138/","secunia":"56874","created_at":"2014-07-15T17:18:09.433Z","updated_at":"2014-07-15T17:18:09.433Z"}]}},{"thecotton_v114":{"vulnerabilities":[{"id":89561,"title":"The Cotton - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/125506/,http://www.securityfocus.com/bid/65958,http://seclists.org/bugtraq/2014/Mar/9","osvdb":"103911","created_at":"2014-07-15T17:18:09.474Z","updated_at":"2014-07-15T17:18:09.474Z"}]}},{"Realestate":{"vulnerabilities":[{"id":89562,"title":"Real Estate - Templatic Theme CSRF File Upload Vulnerability","url":"http://1337day.com/exploit/22091","created_at":"2014-07-15T17:18:09.523Z","updated_at":"2014-07-15T17:18:09.523Z"}]}},{"dailydeal":{"vulnerabilities":[{"id":89563,"title":"Dailydeal - Templatic Theme CSRF File Upload Vulnerability","url":"http://1337day.com/exploit/22091","created_at":"2014-07-15T17:18:09.569Z","updated_at":"2014-07-15T17:18:09.569Z"}]}},{"nightlife":{"vulnerabilities":[{"id":89564,"title":"Nightlife - Templatic Theme CSRF File Upload Vulnerability","url":"http://1337day.com/exploit/22091","created_at":"2014-07-15T17:18:09.611Z","updated_at":"2014-07-15T17:18:09.611Z"}]}},{"5star":{"vulnerabilities":[{"id":89565,"title":"5star - Templatic Theme CSRF File Upload Vulnerability","url":"http://1337day.com/exploit/22091","created_at":"2014-07-15T17:18:09.653Z","updated_at":"2014-07-15T17:18:09.653Z"}]}},{"specialist":{"vulnerabilities":[{"id":89566,"title":"Specialist - Templatic Theme CSRF File Upload Vulnerability","url":"http://1337day.com/exploit/22091","created_at":"2014-07-15T17:18:09.707Z","updated_at":"2014-07-15T17:18:09.707Z"}]}},{"flatshop":{"vulnerabilities":[{"id":89567,"title":"Flatshop - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:09.748Z","updated_at":"2014-07-15T17:18:09.748Z"}]}},{"magazine":{"vulnerabilities":[{"id":89568,"title":"Magazine - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:09.791Z","updated_at":"2014-07-15T17:18:09.791Z"}]}},{"parallax":{"vulnerabilities":[{"id":89569,"title":"Parallax - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:09.835Z","updated_at":"2014-07-15T17:18:09.835Z"}]}},{"bold":{"vulnerabilities":[{"id":89570,"title":"Bold - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:09.878Z","updated_at":"2014-07-15T17:18:09.878Z"}]}},{"metro":{"vulnerabilities":[{"id":89571,"title":"Metro - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:09.924Z","updated_at":"2014-07-15T17:18:09.924Z"}]}},{"pinshop":{"vulnerabilities":[{"id":89572,"title":"Pinshop - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:09.971Z","updated_at":"2014-07-15T17:18:09.971Z"}]}},{"agency":{"vulnerabilities":[{"id":89573,"title":"Agency - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.014Z","updated_at":"2014-07-15T17:18:10.014Z"}]}},{"slide":{"vulnerabilities":[{"id":89574,"title":"Slide - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.059Z","updated_at":"2014-07-15T17:18:10.059Z"}]}},{"postline":{"vulnerabilities":[{"id":89575,"title":"Postline - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.103Z","updated_at":"2014-07-15T17:18:10.103Z"}]}},{"fullscreen":{"vulnerabilities":[{"id":89576,"title":"Fulscreen - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.145Z","updated_at":"2014-07-15T17:18:10.145Z"}]}},{"shopo":{"vulnerabilities":[{"id":89577,"title":"Shopo - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.186Z","updated_at":"2014-07-15T17:18:10.186Z"}]}},{"minshop":{"vulnerabilities":[{"id":89578,"title":"Minshop - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.234Z","updated_at":"2014-07-15T17:18:10.234Z"}]}},{"notes":{"vulnerabilities":[{"id":89579,"title":"Notes - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.280Z","updated_at":"2014-07-15T17:18:10.280Z"}]}},{"shopdock":{"vulnerabilities":[{"id":89580,"title":"Shopdock - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.324Z","updated_at":"2014-07-15T17:18:10.324Z"}]}},{"phototouch":{"vulnerabilities":[{"id":89581,"title":"Phototouch - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.365Z","updated_at":"2014-07-15T17:18:10.365Z"}]}},{"basic":{"vulnerabilities":[{"id":89582,"title":"Basic - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.408Z","updated_at":"2014-07-15T17:18:10.408Z"}]}},{"responz":{"vulnerabilities":[{"id":89583,"title":"Responz - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.453Z","updated_at":"2014-07-15T17:18:10.453Z"}]}},{"simfo":{"vulnerabilities":[{"id":89584,"title":"Simfo - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.499Z","updated_at":"2014-07-15T17:18:10.499Z"}]}},{"grido":{"vulnerabilities":[{"id":89585,"title":"Grido - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.543Z","updated_at":"2014-07-15T17:18:10.543Z"}]}},{"tisa":{"vulnerabilities":[{"id":89586,"title":"Tisa - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.589Z","updated_at":"2014-07-15T17:18:10.589Z"}]}},{"funki":{"vulnerabilities":[{"id":89587,"title":"Funki - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.633Z","updated_at":"2014-07-15T17:18:10.633Z"}]}},{"minblr":{"vulnerabilities":[{"id":89588,"title":"Minblr - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.675Z","updated_at":"2014-07-15T17:18:10.675Z"}]}},{"newsy":{"vulnerabilities":[{"id":89589,"title":"Newsy - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.722Z","updated_at":"2014-07-15T17:18:10.722Z"}]}},{"wumblr":{"vulnerabilities":[{"id":89590,"title":"Wumblr - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.765Z","updated_at":"2014-07-15T17:18:10.765Z"}]}},{"rezo":{"vulnerabilities":[{"id":89591,"title":"Rezo - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.807Z","updated_at":"2014-07-15T17:18:10.807Z"}]}},{"photobox":{"vulnerabilities":[{"id":89592,"title":"Photobox - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.853Z","updated_at":"2014-07-15T17:18:10.853Z"}]}},{"edmin":{"vulnerabilities":[{"id":89593,"title":"Edmin - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.895Z","updated_at":"2014-07-15T17:18:10.895Z"}]}},{"koi":{"vulnerabilities":[{"id":89594,"title":"Koi - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.940Z","updated_at":"2014-07-15T17:18:10.940Z"}]}},{"bizco":{"vulnerabilities":[{"id":89595,"title":"Bizco - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:10.982Z","updated_at":"2014-07-15T17:18:10.982Z"}]}},{"thememin":{"vulnerabilities":[{"id":89596,"title":"Thememin - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:11.030Z","updated_at":"2014-07-15T17:18:11.030Z"}]}},{"wigi":{"vulnerabilities":[{"id":89597,"title":"Wigi - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:11.072Z","updated_at":"2014-07-15T17:18:11.072Z"}]}},{"sidepane":{"vulnerabilities":[{"id":89598,"title":"Sidepane - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-07-15T17:18:11.116Z","updated_at":"2014-07-15T17:18:11.116Z"}]}},{"Sixtees":{"vulnerabilities":[{"id":89599,"title":"Sixtees - Shell Upload","url":"http://packetstormsecurity.com/files/125491/","created_at":"2014-07-15T17:18:11.159Z","updated_at":"2014-07-15T17:18:11.159Z"}]}},{"linenity":{"vulnerabilities":[{"id":89600,"title":"LineNity 1.20 - download.php imgurl Parameter Remote Path Traversal File Access","osvdb":"105767","exploitdb":"32861","created_at":"2014-07-15T17:18:11.203Z","updated_at":"2014-07-15T17:18:11.203Z"}]}},{"SCv1":{"vulnerabilities":[{"id":89601,"title":"SCv1 - download.php file Parameter Traversal Remote File Access","url":"http://packetstormsecurity.com/files/127022/","osvdb":"107940","created_at":"2014-07-15T17:18:11.247Z","updated_at":"2014-07-15T17:18:11.247Z"}]}}]
\ No newline at end of file
diff --git a/data/theme_vulns.xml b/data/theme_vulns.xml
deleted file mode 100644
index 30dad478..00000000
--- a/data/theme_vulns.xml
+++ /dev/null
@@ -1,3596 +0,0 @@
-
-
-
-
-
-
- Crius - VideoJS Cross-Site Scripting Vulnerability
-
- 53427
- http://seclists.org/fulldisclosure/2013/May/77
-
- XSS
-
-
-
-
-
- Source - VideoJS Cross-Site Scripting Vulnerability
-
- 53457
- http://seclists.org/fulldisclosure/2013/May/77
-
- XSS
-
-
-
-
-
- I Love It - VideoJS Cross-Site Scripting Vulnerability
-
- 53548
- http://seclists.org/fulldisclosure/2013/May/77
-
- XSS
-
-
-
-
-
- Smart Start - VideoJS Cross-Site Scripting Vulnerability
-
- 53460
- http://seclists.org/fulldisclosure/2013/May/77
-
- XSS
-
-
-
-
-
- Covert Videopress - VideoJS Cross-Site Scripting Vulnerability
-
- 53494
- http://seclists.org/fulldisclosure/2013/May/77
-
- XSS
-
-
-
-
-
- Photolio - VideoJS Cross-Site Scripting Vulnerability
-
- http://seclists.org/fulldisclosure/2013/May/77
-
- XSS
-
-
-
-
-
- onepagewebsite - Full Path Disclosure vulnerability
-
- http://1337day.com/exploit/20027
-
- FPD
-
-
-
-
-
- vithy - Full Path Disclosure vulnerability
-
- http://1337day.com/exploit/20040
-
- FPD
-
-
- vithy - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/19830
-
- UPLOAD
-
-
- vithy - Custom Background Shell Upload
-
- http://packetstormsecurity.com/files/125827/
-
- UPLOAD
-
-
-
-
-
- appius - Full Path Disclosure vulnerability
-
- http://1337day.com/exploit/20039
-
- FPD
-
-
- appius - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/19831
-
- UPLOAD
-
-
- appius - Custom Background Shell Upload
-
- http://packetstormsecurity.com/files/125827/
-
- UPLOAD
-
-
-
-
-
- yvora - Full Path Disclosure vulnerability
-
- http://1337day.com/exploit/20038
-
- FPD
-
-
- yvora - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/19834
-
- UPLOAD
-
-
-
-
-
- Shotzz - Full Path Disclosure vulnerability
-
- http://1337day.com/exploit/20041
-
- FPD
-
-
- Shotzz - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/19829
-
- UPLOAD
-
-
- Shotzz - Custom Background Shell Upload
-
- http://packetstormsecurity.com/files/125827/
-
- UPLOAD
-
-
-
-
-
- dagda - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/19832
-
- UPLOAD
-
-
- dagda - Custom Background Shell Upload
-
- http://packetstormsecurity.com/files/125827/
-
- UPLOAD
-
-
-
-
-
- moneymasters - Full Path Disclosure vulnerability
-
- http://1337day.com/exploit/20077
-
- FPD
-
-
- moneymasters - File Upload Vulnerability (metasploit)
-
- http://1337day.com/exploit/20076
-
- UPLOAD
-
-
-
-
-
- XSS vulnerability in Imediapixel premium WordPress themes
-
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html
-
- XSS
-
-
-
-
-
- XSS vulnerability in Imediapixel premium WordPress themes
-
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html
-
- XSS
-
-
-
-
-
- XSS vulnerability in Imediapixel premium WordPress themes
-
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html
-
- XSS
-
-
-
-
-
- XSS vulnerability in Imediapixel premium WordPress themes
-
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html
-
- XSS
-
-
-
-
-
- XSS vulnerability in Parallelus premium WordPress themes
-
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html
-
- XSS
-
-
-
-
-
- XSS vulnerability in Parallelus premium WordPress themes
-
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html
-
- XSS
-
-
-
-
-
- XSS vulnerability in Parallelus premium WordPress themes
-
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html
-
- XSS
-
-
-
-
-
- XSS vulnerability in Parallelus premium WordPress themes
-
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html
-
- XSS
-
-
-
-
-
- Shapeless - Unspecified XSS
-
- 85919
- http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html
-
- XSS
-
-
-
-
-
- Brisk - Unspecified XSS
-
- 85918
- http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html
-
- XSS
-
-
-
-
-
- Blaze - Unspecified XSS
-
- 85917
- http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html
-
- XSS
-
-
-
-
-
- Eunice - Unspecified XSS
-
- 85916
- http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html
-
- XSS
-
-
-
-
-
- Explicit - Unspecified XSS
-
- 85915
- http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html
-
- XSS
-
-
-
-
-
- Essence - Unspecified XSS
-
- 85914
- http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html
-
- XSS
-
-
-
-
-
- Paramount - Unspecified XSS
-
- 85913
- http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html
-
- XSS
-
-
-
-
-
- PictureFactory - Unspecified XSS
-
- 85912
- http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html
-
- XSS
-
-
-
-
-
- Sparky - Unspecified XSS
-
- 85911
- http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html
-
- XSS
-
-
-
-
-
- TheAgency - Unspecified XSS
-
- 85910
- http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html
-
- XSS
-
-
-
-
-
- Konzept - Unspecified XSS
-
- 85920
- http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html
-
- XSS
-
-
-
-
-
- Daisho - Unspecified XSS
-
- 85921
- http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html
-
- XSS
-
-
-
-
-
- Choices - Unspecified XSS
-
- 86755
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html
-
- XSS
-
-
-
-
-
- Brightbox - Unspecified XSS
-
- 86756
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html
-
- XSS
-
-
-
-
-
- Broadscope - Unspecified XSS
-
- 86757
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html
-
- XSS
-
-
-
-
-
- Corona - Unspecified XSS
-
- 86758
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html
-
- XSS
-
-
-
-
-
- Flashlight - Unspecified XSS
-
- 86759
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html
-
- XSS
-
-
-
-
-
- Coalition - Unspecified XSS
-
- 86760
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html
-
- XSS
-
-
-
-
-
- Shoutbox - Unspecified XSS
-
- 86761
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html
-
- XSS
-
-
-
-
-
- Velvet - Unspecified XSS
-
- 86762
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html
-
- XSS
-
-
-
-
-
- Upscale - Unspecified XSS
-
- 86763
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html
-
- XSS
-
-
-
-
-
- Expose - Unspecified XSS
-
- 86764
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html
-
- XSS
-
-
-
-
-
- Abundance - Unspecified XSS
-
- 86765
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html
-
- XSS
-
-
-
-
-
- Eunoia - Unspecified XSS
-
- 86766
- http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html
-
- XSS
-
-
-
-
-
- Site5 Wordpress Themes Email Spoofing
-
- http://packetstormsecurity.org/files/114750/
-
- UNKNOWN
-
-
-
-
-
- Site5 Wordpress Themes Email Spoofing
-
- http://packetstormsecurity.org/files/114750/
-
- UNKNOWN
- 2.0
-
-
-
-
-
- Site5 Wordpress Themes Email Spoofing
-
- http://packetstormsecurity.org/files/114750/
-
- UNKNOWN
-
-
-
-
-
- Site5 Wordpress Themes Email Spoofing
-
- http://packetstormsecurity.org/files/114750/
-
- UNKNOWN
-
-
-
-
-
- Site5 Wordpress Themes Email Spoofing
-
- http://packetstormsecurity.org/files/114750/
-
- UNKNOWN
-
-
-
-
-
- Site5 Wordpress Themes Email Spoofing
-
- http://packetstormsecurity.org/files/114750/
-
- UNKNOWN
-
-
-
-
-
- Site5 Wordpress Themes Email Spoofing
-
- http://packetstormsecurity.org/files/114750/
-
- UNKNOWN
- 2.0
-
-
-
-
-
- Site5 Wordpress Themes Email Spoofing
-
- http://packetstormsecurity.org/files/114750/
-
- UNKNOWN
- 2.0
-
-
-
-
-
- Site5 Wordpress Themes Email Spoofing
-
- http://packetstormsecurity.org/files/114750/
-
- UNKNOWN
-
-
-
-
-
- Site5 Wordpress Themes Email Spoofing
-
- http://packetstormsecurity.org/files/114750/
-
- UNKNOWN
- 2.0
-
-
-
-
-
- Site5 Wordpress Themes Email Spoofing
-
- http://packetstormsecurity.org/files/114750/
-
- UNKNOWN
- 2.0
-
-
-
-
-
- Site5 Wordpress Themes Email Spoofing
-
- http://packetstormsecurity.org/files/114750/
-
- UNKNOWN
- 2.0
-
-
-
-
-
- Famous 2.0.5 - Shell Upload
-
- 83013
- http://packetstormsecurity.org/files/113842/
-
- UPLOAD
-
-
-
-
-
- Deep-Blue 1.9.2 - Arbitrary File Upload Vulnerability
-
- 83014
- 49611
- http://packetstormsecurity.org/files/113843/
-
- UPLOAD
-
-
-
-
-
- Classipress <= 3.1.4 - Stored XSS
-
- 2011-5257
- 76712
- 18053
- http://cxsecurity.com/issue/WLB-2011110001
-
- 3.1.5
- XSS
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- DailyDeal - File Upload Remote Code Execution
-
- 98924
- http://packetstormsecurity.com/files/123748/
- http://templatic.com/app-themes/daily-deal-premium-wordpress-app-theme
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
- Flash News - thumb.php src Parameter XSS
-
- 89887
- http://packetstormsecurity.com/files/120037/
- http://seclists.org/fulldisclosure/2013/Feb/8
- http://cxsecurity.com/issue/WLB-2013020010
-
- XSS
-
-
- Flash News - Multiple Script Path Disclosure
-
- 89888
- http://packetstormsecurity.com/files/120037/
- http://seclists.org/fulldisclosure/2013/Feb/8
- http://cxsecurity.com/issue/WLB-2013020010
-
- FPD
-
-
- Flash News - includes/test.php a Parameter XSS
-
- 89889
- http://packetstormsecurity.com/files/120037/
- http://seclists.org/fulldisclosure/2013/Feb/8
- http://cxsecurity.com/issue/WLB-2013020010
-
- XSS
-
-
- Flash News - includes/test.php Direct Request Information Disclosure
-
- 89890
- http://packetstormsecurity.com/files/120037/
- http://seclists.org/fulldisclosure/2013/Feb/8
- http://cxsecurity.com/issue/WLB-2013020010
-
- UNKNOWN
-
-
- Flash News - thumb.php src Parameter File Upload Arbitrary Code Execution
-
- 89891
- http://packetstormsecurity.com/files/120037/
- http://seclists.org/fulldisclosure/2013/Feb/8
- http://cxsecurity.com/issue/WLB-2013020010
-
- UNKNOWN
-
-
- Flash News - thumb.php src Parameter Remote DoS
-
- 89892
- http://packetstormsecurity.com/files/120037/
- http://seclists.org/fulldisclosure/2013/Feb/8
- http://cxsecurity.com/issue/WLB-2013020010
-
- UNKNOWN
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- WooThemes WooFramework Remote Unauthenticated Shortcode Execution
-
- https://gist.github.com/2523147
-
- RCE
-
-
-
-
-
- dt-chocolate - jPlayer XSS
-
- 56379
- http://packetstormsecurity.com/files/124756/
-
- XSS
-
-
- dt-chocolate - Image Open redirect
-
- http://cxsecurity.com/issue/WLB-2013020011
-
- UNKNOWN
-
-
- Multiple vulnerabilities in Chocolate WP theme for WordPress
-
- http://seclists.org/fulldisclosure/2013/Jan/215
-
- MULTI
-
-
-
-
-
- sandbox - Arbitrary File Upload/FD Vulnerability
-
- http://1337day.com/exploit/20228
-
- MULTI
-
-
-
-
-
- Clockstone 1.2 - upload.php Arbitrary File Upload Vulnerability
-
- 88622
- 51619
- http://www.exploit-db.com/exploits/23494
- http://www.securityfocus.com/bid/56988
- http://xforce.iss.net/xforce/xfdb/80725
-
- UPLOAD
-
-
-
-
-
- Archin 3.2 - Cross-Site Scripting and Arbitrary File Upload Vulnerabilities
-
- 50711
-
- MULTI
-
-
- Archin 3.2 - hades_framework/option_panel/ajax.php Configuration Option Manipulation
-
- 86991
- 21646
-
- RCE
-
-
-
-
-
- Purity - Multiple Cross-Site Scripting Vulnerabilities
-
- 50627
-
- XSS
-
-
-
-
-
- Pinboard 1.0.6 - includes/theme-options.php tab Parameter XSS
-
- 90070
- 2013-0286
- 52079
- http://seclists.org/oss-sec/2013/q1/274
- http://cxsecurity.com/issue/WLB-2013020062
-
- XSS
-
-
- Pinboard - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124151/
-
- UPLOAD
-
-
-
-
-
- montezuma <= 1.1.3 - XSS in ZeroClipboard.swf
-
- http://1337day.com/exploit/20396
-
- XSS
-
-
-
-
-
- scarlet <= 1.1.3 - XSS in ZeroClipboard.swf
-
- http://1337day.com/exploit/20396
-
- XSS
-
-
-
-
-
- allure-real-estate-theme-for-placester <= 0.1.1 - XSS in ZeroClipboard.swf
-
- http://1337day.com/exploit/20396
-
- XSS
-
-
-
-
-
- allure-real-estate-theme-for-real-estate <= 0.1.1 - XSS in ZeroClipboard.swf
-
- http://1337day.com/exploit/20396
-
- XSS
-
-
-
-
-
- felici - XSS Vulnerability
-
- http://1337day.com/exploit/20560
-
- XSS
-
-
- felici - Custom Background Shell Upload
-
- http://packetstormsecurity.com/files/125830/
-
- UPLOAD
-
-
-
-
-
- Classic 1.5 - PHP_SELF XSS
-
- 38450
- 2007-4483
-
- XSS
-
-
-
-
-
- brilliant - File Upload Vulnerability
-
- http://ruinedsec.wordpress.com/2013/04/03/wordpress-themes-exploits-are-in-action-wpscan/
-
- UPLOAD
-
-
-
-
-
- Colormix - Multiple vulnerabilities
-
- http://packetstormsecurity.com/files/121372/
- http://seclists.org/fulldisclosure/2013/Apr/172
-
- MULTI
-
-
-
-
-
- XSS in jobroller theme
-
- http://cxsecurity.com/issue/WLB-2013060089
-
- XSS
-
-
-
-
-
- Xss In wordpress ambience theme
-
- http://www.websecuritywatch.com/wordpress-ambience-xss/
-
- XSS
-
-
-
-
-
- Slash WP - FPD, XSS and CS vulnerabilities
-
- http://packetstormsecurity.com/files/123748/
- http://seclists.org/fulldisclosure/2013/Jun/166
-
- MULTI
-
-
-
-
-
- Persuasion - PrettyPhoto DOM XSS
-
- http://www.rafayhackingarticles.net/2013/05/kali-linux-dom-based-xss-writeup.html
-
- XSS
-
-
- Persuasion <= 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion
-
- 101330
- 30443
- http://packetstormsecurity.com/files/124547/
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
- Persuasion <= 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download
-
- 101331
- 56359
- 30443
- http://packetstormsecurity.com/files/124547/
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
-
-
-
- MORE+ - PrettyPhoto XSS Vulnerability
-
- 54924
- http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0177.html
-
- XSS
-
-
-
-
-
- silverOrchid <= 1.5.0 - XSS Vulnerability
-
- 96723
- 54662
- http://packetstormsecurity.com/files/122986/
-
- XSS
-
-
-
-
-
- Caulk - path disclosure vulnerability
-
- 90889
- http://packetstormsecurity.com/files/120632/
- http://themeforest.net/item/caulk/76108
-
- FPD
-
-
-
-
-
- WPLocalPlaces - File Upload Remote Code Execution
-
- 98806
- http://packetstormsecurity.com/files/123697/
-
- RCE
-
-
-
-
-
- Photocrati 4.7.3 - photocrati-gallery/ecomm-sizes.php prod_id Parameter Reflected XSS
-
- 102717
- 56690
- http://packetstormsecurity.com/files/124986/
-
- XSS
-
-
- Photocrati - Multiple Script Direct Request Path Disclosure
-
- 92836
- http://seclists.org/fulldisclosure/2013/Apr/238
-
- FPD
-
-
-
-
-
- Music - Multiple Script Direct Request Path Disclosure
-
- 92837
- http://seclists.org/fulldisclosure/2013/Apr/238
-
- FPD
-
-
-
-
-
- Imperial Fairytale - Multiple Script Direct Request Path Disclosure
-
- 92838
- http://seclists.org/fulldisclosure/2013/Apr/238
-
- FPD
-
-
- Imperial Fairytale - jPlayer Cross-Site Scripting Vulnerability
-
- 53210
- http://seclists.org/oss-sec/2013/q2/177
-
- XSS
-
-
-
-
-
- Feather12 - Multiple Script Direct Request Path Disclosure
-
- 92839
- http://seclists.org/fulldisclosure/2013/Apr/238
-
- FPD
-
-
-
-
-
- Studio Zen - Multiple Script Direct Request Path Disclosure
-
- 92840
- http://seclists.org/fulldisclosure/2013/Apr/238
-
- FPD
-
-
- Studio Zen - jPlayer Cross-Site Scripting Vulnerability
-
- 53212
- http://seclists.org/oss-sec/2013/q2/177
-
- XSS
-
-
-
-
-
- AREA53 <= 1.0.5 - File Upload Code Execution
-
- 98927
- 29068
- http://www.securityfocus.com/bid/63306
- http://1337day.com/exploit/21442
-
- RCE
-
-
-
-
-
- Sahifa 2.4.0 - Multiple Script Path Disclosure Direct Request Path Disclosure
-
- 88926
- http://packetstormsecurity.com/files/119191/
- http://www.securityfocus.com/bid/57109
-
- FPD
-
-
- Sahifa 2.4.0 - Site Setting Reset CSRF
-
- 88927
- http://packetstormsecurity.com/files/119191/
- http://www.securityfocus.com/bid/57109
-
- CSRF
-
-
-
-
-
- SimpleDark 1.2.10 - 's' Parameter Cross Site Scripting Vulnerability
-
- http://www.securityfocus.com/bid/46615
-
- XSS
-
-
-
-
-
- GeoPlaces - File Upload Handling Remote Command Execution
-
- 98975
- http://packetstormsecurity.com/files/123773/
-
- RCE
-
-
-
-
-
- GeoPlaces - File Upload Handling Remote Command Execution
-
- 98975
- http://packetstormsecurity.com/files/123773/
-
- RCE
-
-
-
-
-
- Curvo - wp-content/themes/curvo/functions/upload-handler.php File Upload CSRF
-
- 99043
- 29211
- http://packetstormsecurity.com/files/123799/
- http://packetstormsecurity.com/files/123820/
-
- CSRF
-
-
-
-
-
- Money - wp-content/themes/MoneyTheme/uploads/upload.php File Upload Remote Code Execution
-
- 99187
- http://packetstormsecurity.com/files/123819/
-
- RCE
-
-
-
-
-
- Saico - Arbitrary File Upload Vulnerability
-
- 29150
- http://1337day.com/exploit/21440
-
- UPLOAD
-
-
-
-
-
- ThisWay - remote shell upload vulnerability
-
- 55587
- http://packetstormsecurity.com/files/123895/
-
- RCE
-
-
-
-
-
- Think Responsive 1.0 - Arbitrary shell upload vulnerability
-
- 29332
- http://packetstormsecurity.com/files/123880/
-
- RCE
-
-
-
-
-
- Anthology - Remote File Upload Vulnerability
-
- http://1337day.com/exploit/21460
-
- UPLOAD
-
-
-
-
-
- Amoveo - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/21451
-
- UPLOAD
-
-
-
-
-
- Switchblade 1.3 - Arbitrary File Upload Vulnerability
-
- 88918
- 29330
- http://1337day.com/exploit/21457
-
- UPLOAD
-
-
-
-
-
- Magnitudo - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/21457
-
- UPLOAD
-
-
-
-
-
- Ghost - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/21416
-
- UPLOAD
-
-
-
-
-
- Right Now - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/21420
-
- UPLOAD
-
-
-
-
-
- Cold Fusion - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/21431
-
- UPLOAD
-
-
-
-
-
- Chameleon - Arbitrary File Upload Vulnerability
-
- http://1337day.com/exploit/21449
-
- UPLOAD
-
-
-
-
-
- Kernel Theme - functions/upload-handler.php File Upload Remote Code Execution
-
- 99553
- 29482
- http://packetstormsecurity.com/files/123954/
-
- RCE
-
-
-
-
-
- Rockstar - Remote File Upload Vulnerability
-
- 29946
- http://packetstormsecurity.com/files/123999/
- http://packetstormsecurity.com/files/124232/
- http://1337day.com/exploit/21510
-
- UPLOAD
-
-
-
-
-
- Reganto - Remote File Upload Vulnerability
-
- 29946
- http://packetstormsecurity.com/files/123999/
- http://packetstormsecurity.com/files/124232/
- http://1337day.com/exploit/21511
-
- UPLOAD
-
-
-
-
-
- Ray of Light - Remote File Upload Vulnerability
-
- 29946
- http://packetstormsecurity.com/files/123999/
- http://packetstormsecurity.com/files/124232/
- http://1337day.com/exploit/21512
-
- UPLOAD
-
-
-
-
-
- Radial - Remote File Upload Vulnerability
-
- 29946
- http://packetstormsecurity.com/files/123999/
- http://packetstormsecurity.com/files/124232/
- http://1337day.com/exploit/21513
-
- UPLOAD
-
-
-
-
-
- Oxygen - Remote File Upload Vulnerability
-
- 29946
- http://packetstormsecurity.com/files/123999/
- http://packetstormsecurity.com/files/124232/
- http://1337day.com/exploit/21514
-
- UPLOAD
-
-
-
-
-
- Bulteno - Remote File Upload Vulnerability
-
- 29946
- http://packetstormsecurity.com/files/123999/
- http://packetstormsecurity.com/files/124232/
- http://1337day.com/exploit/21515
-
- UPLOAD
-
-
-
-
-
- Bordeaux - Remote File Upload Vulnerability
-
- 29946
- http://packetstormsecurity.com/files/123999/
- http://packetstormsecurity.com/files/124232/
- http://1337day.com/exploit/21516
-
- UPLOAD
-
-
-
-
-
- Agritourismo - Remote File Upload Vulnerability
-
- 29946
- http://packetstormsecurity.com/files/124232/
-
- UPLOAD
-
-
-
-
-
- Highlight Powerful Premium - upload-handler.php File Upload CSRF
-
- 99703
- 55671
- 29525
- http://packetstormsecurity.com/files/123974/
-
- CSRF
-
-
-
-
-
- Euclid - CSRF Vulnerability
-
- 29667
- http://packetstormsecurity.com/files/124043/
- http://1337day.com/exploit/21538
-
- CSRF
-
-
-
-
-
- Dimension - CSRF Vulnerability
-
- 29668
- http://packetstormsecurity.com/files/124042/
- http://1337day.com/exploit/21537
-
- CSRF
-
-
-
-
-
- Amplus - CSRF Vulnerability
-
- 29669
- http://packetstormsecurity.com/files/124041/
- http://1337day.com/exploit/21535
-
- CSRF
-
-
-
-
-
- Make A Statement - CSRF Vulnerability
-
- 29670
- http://packetstormsecurity.com/files/124044/
- http://1337day.com/exploit/21536
-
- CSRF
-
-
-
-
-
- iThemes2 - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
-
- UPLOAD
-
-
-
-
-
- Suco - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124094/
-
- UPLOAD
-
-
-
-
-
- Elemin - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124149/
-
- UPLOAD
-
-
-
-
-
- Folo - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124150/
-
- UPLOAD
-
-
- Folo - Cross Site Scripting
-
- http://packetstormsecurity.com/files/124230/
-
- XSS
-
-
-
-
-
- Bloggie - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124152/
-
- UPLOAD
-
-
-
-
-
- Blogfolio - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124156/
-
- UPLOAD
-
-
-
-
-
- OptimizePress - File Upload Vulnerability
-
- 100509
- 2013-7102
- 56379
- http://packetstormsecurity.com/files/124246/
- http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/
- exploit/unix/webapp/php_wordpress_optimizepress
-
- UPLOAD
- 1.6
-
-
-
-
-
- Blooog 1.1 - jplayer.swf Cross Site Scripting
-
- http://packetstormsecurity.com/files/124240/
- http://xforce.iss.net/xforce/xfdb/89356
- 2013-7129
- 92254
-
- XSS
-
-
-
-
-
-
- Toolbox 1.4 - flyer.php mls Parameter SQL Injection
-
- 88293
- http://www.securityfocus.com/bid/56745
-
- SQLI
-
-
-
-
-
- Oberliga - team.php team Parameter SQL Injection
-
- 88454
- http://packetstormsecurity.org/files/118368/
- http://xforce.iss.net/xforce/xfdb/80273
-
- SQLI
-
-
-
-
-
- CStar Design 2.0 - flashmoXML.php id Parameter SQL Injection
-
- 88291
- http://www.securityfocus.com/bid/56694
-
- SQLI
-
-
-
-
-
- Malmonation - debate.php id Parameter SQL Injection
-
- 87866
- http://packetstormsecurity.org/files/118340/
- http://xforce.iss.net/xforce/xfdb/80252
-
- SQLI
-
-
-
-
-
- LightSpeed - Valums Uploader Shell Upload Exploit
-
- http://packetstormsecurity.com/files/119241/
-
- UPLOAD
-
-
-
-
-
-
- Eptonic - Valums Uploader Shell Upload Exploit
-
- http://packetstormsecurity.com/files/119241/
-
- UPLOAD
-
-
-
-
-
-
- Nuance - Valums Uploader Shell Upload Exploit
-
- http://packetstormsecurity.com/files/119241/
-
- UPLOAD
-
-
-
-
-
- DejaVu 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion
-
- 101330
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
- DejaVu 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download
-
- 101331
- 56359
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
-
-
-
- Elegance - lib/scripts/dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Access
-
- 108100
- http://packetstormsecurity.com/files/126989/
-
- RFI
-
-
- Elegance 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion
-
- 101330
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
- Elegance 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download
-
- 101331
- 56359
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
-
-
-
- Echelon - media-upload.php Remote File Upload
-
- 106929
- http://www.securityfocus.com/bid/67080
- http://packetstormsecurity.com/files/126327/
-
- UPLOAD
-
-
- Echelon 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion
-
- 101330
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
- Echelon 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download
-
- 101331
- 56359
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
-
-
-
- Modular 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion
-
- 101330
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
- Modular 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download
-
- 101331
- 56359
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
-
-
-
- Fusion 2.1 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion
-
- 101330
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.2
-
-
- Fusion 2.1 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download
-
- 101331
- 56359
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.2
-
-
-
-
-
- Method 2.1 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion
-
- 101330
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
- Method 2.1 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download
-
- 101331
- 56359
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.2
-
-
-
-
-
- Myriad 2.0 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion
-
- 101330
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
- Myriad 2.0 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download
-
- 101331
- 56359
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.1
-
-
-
-
-
- Construct 1.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion
-
- 101330
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
- Construct 1.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download
-
- 101331
- 56359
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 1.5
-
-
-
-
-
- Awake 3.3 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion
-
- 101330
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 2.5
-
-
- Awake 3.3 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download
-
- 101331
- 56359
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 3.4
-
-
-
-
-
- InFocus - lib/scripts/dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Access
-
- 108099
- http://packetstormsecurity.com/files/126988/
-
- RFI
-
-
- InFocus - prettyPhoto Cross-Site Scripting Vulnerability
-
- 56583
- http://packetstormsecurity.com/files/124960/
-
- XSS
-
-
- InFocus 3.3 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion
-
- 101330
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 3.4
-
-
- InFocus 3.3 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download
-
- 101331
- 56359
- 30443
- http://www.securityfocus.com/bid/64501
-
- UNKNOWN
- 3.4
-
-
-
-
-
- Elegant Grunge 1.0.3 - s Parameter XSS
-
- 75942
- 2011-3856
- http://www.securityfocus.com/bid/49869
-
- XSS
- 1.0.4
-
-
-
-
-
- Simple Balance <= 2.2.1 - index.php s Parameter XSS
-
- 76722
- 46671
- http://packetstormsecurity.com/files/106341/
-
- XSS
-
-
-
-
-
- Codilight Premium 1.0.0 - admin/front-end/options.php reset Parameter XSS
-
- 100791
-
- XSS
-
-
-
-
-
- Love It - XSS / Content Spoofing / Path Disclosure
-
- http://packetstormsecurity.com/files/122386/
-
- MULTI
-
-
-
-
-
- Dandelion - Arbitry File Upload
-
- 99043
- 31424
- http://packetstormsecurity.com/files/125098/
-
- UPLOAD
-
-
-
-
-
- Kiddo - remote shell upload vulnerability
-
- http://packetstormsecurity.com/files/125138/
- 56874
-
- UPLOAD
-
-
-
-
-
- The Cotton - Remote File Upload Vulnerability
-
- 103911
- http://packetstormsecurity.com/files/125506/
- http://www.securityfocus.com/bid/65958
- http://seclists.org/bugtraq/2014/Mar/9
-
- UPLOAD
-
-
-
-
-
- Real Estate - Templatic Theme CSRF File Upload Vulnerability
-
- http://1337day.com/exploit/22091
-
- CSRF
-
-
-
-
-
- Dailydeal - Templatic Theme CSRF File Upload Vulnerability
-
- http://1337day.com/exploit/22091
-
- CSRF
-
-
-
-
-
- Nightlife - Templatic Theme CSRF File Upload Vulnerability
-
- http://1337day.com/exploit/22091
-
- CSRF
-
-
-
-
-
- 5star - Templatic Theme CSRF File Upload Vulnerability
-
- http://1337day.com/exploit/22091
-
- CSRF
-
-
-
-
-
- Specialist - Templatic Theme CSRF File Upload Vulnerability
-
- http://1337day.com/exploit/22091
-
- CSRF
-
-
-
-
-
- Flatshop - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Magazine - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Parallax - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Bold - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Metro - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Pinshop - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Agency - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Slide - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Postline - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Fulscreen - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Shopo - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Minshop - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Notes - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Shopdock - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Phototouch - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Basic - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Responz - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Simfo - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Grido - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Tisa - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Funki - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Minblr - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Newsy - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Wumblr - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Rezo - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Photobox - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Edmin - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Koi - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Bizco - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Thememin - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Wigi - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Sidepane - themify-ajax.php File Upload Arbitrary Code Execution
-
- 100271
- http://packetstormsecurity.com/files/124097/
- http://1337day.com/exploit/22090
-
- UPLOAD
-
-
-
-
-
- Sixtees - Shell Upload
-
- http://packetstormsecurity.com/files/125491/
-
- UPLOAD
-
-
-
-
-
- LineNity 1.20 - download.php imgurl Parameter Remote Path Traversal File Access
-
- 105767
- 32861
-
- LFI
-
-
-
-
-
- SCv1 - download.php file Parameter Traversal Remote File Access
-
- 107940
- http://packetstormsecurity.com/files/127022/
-
- UNKNOWN
-
-
-
-
-
- Magazine Basic - wp-content/themes/magazine-basic/view_artist.php id Parameter SQL Injection
-
- 87838
- http://packetstormsecurity.com/files/118321/
- http://www.securityfocus.com/bid/56664
-
- SQLI
-
-
-
-
diff --git a/data/wp_vulns.json b/data/wp_vulns.json
new file mode 100644
index 00000000..ecf3b213
--- /dev/null
+++ b/data/wp_vulns.json
@@ -0,0 +1 @@
+[{"3.8.1":{"vulnerabilities":[{"id":88075,"title":"Administrator-exploitable blind SQLi in WordPress 1.0 - 3.8.1","url":"https://security.dxw.com/advisories/sqli-in-wordpress-3-6-1/","created_at":"2014-07-15T17:16:21.103Z","updated_at":"2014-07-15T17:16:21.103Z"},{"id":88076,"title":"Potential Authentication Cookie Forgery","url":"https://labs.mwrinfosecurity.com/blog/2014/04/11/wordpress-auth-cookie-forgery/,https://github.com/WordPress/WordPress/commit/78a915e0e5927cf413aa6c2cef2fca3dc587f8be","osvdb":"105620","cve":"2014-0166","created_at":"2014-07-15T17:16:21.173Z","updated_at":"2014-07-15T17:16:21.173Z","fixed_in":"3.8.2"},{"id":88078,"title":"Plupload Unspecified XSS","osvdb":"105622","secunia":"57769","created_at":"2014-07-15T17:16:21.267Z","updated_at":"2014-07-15T17:16:21.267Z","fixed_in":"3.8.2"}]}},{"3.8":{"vulnerabilities":[{"id":88079,"title":"wp-admin/options-writing.php Cleartext Admin Credentials Disclosure","url":"http://seclists.org/fulldisclosure/2013/Dec/135","osvdb":"101101","created_at":"2014-07-15T17:16:21.315Z","updated_at":"2014-07-15T17:16:21.315Z"}]}},{"3.7.1":{"vulnerabilities":[{"id":88076,"title":"Potential Authentication Cookie Forgery","url":"https://labs.mwrinfosecurity.com/blog/2014/04/11/wordpress-auth-cookie-forgery/,https://github.com/WordPress/WordPress/commit/78a915e0e5927cf413aa6c2cef2fca3dc587f8be","osvdb":"105620","cve":"2014-0166","created_at":"2014-07-15T17:16:21.173Z","updated_at":"2014-07-15T17:16:21.173Z","fixed_in":"3.7.2"},{"id":88079,"title":"wp-admin/options-writing.php Cleartext Admin Credentials Disclosure","url":"http://seclists.org/fulldisclosure/2013/Dec/135","osvdb":"101101","created_at":"2014-07-15T17:16:21.315Z","updated_at":"2014-07-15T17:16:21.315Z"},{"id":88078,"title":"Plupload Unspecified XSS","osvdb":"105622","secunia":"57769","created_at":"2014-07-15T17:16:21.267Z","updated_at":"2014-07-15T17:16:21.267Z","fixed_in":"3.7.2"}]}},{"3.6":{"vulnerabilities":[{"id":88080,"title":"PHP Object Injection","url":"http://vagosec.org/2013/09/wordpress-php-object-injection/,http://www.openwall.com/lists/oss-security/2013/09/12/1,http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4340,http://core.trac.wordpress.org/changeset/25325","osvdb":"97211","cve":"2013-4338","secunia":"54803","created_at":"2014-07-15T17:16:21.580Z","updated_at":"2014-07-15T17:16:21.580Z","fixed_in":"3.6.1"},{"id":88081,"title":"wp-includes/functions.php get_allowed_mime_types Function SWF / EXE File Upload XSS Weakness","url":"http://core.trac.wordpress.org/changeset/25322","osvdb":"97210","cve":"2013-5739","created_at":"2014-07-15T17:16:21.628Z","updated_at":"2014-07-15T17:16:21.628Z","fixed_in":"3.6.1"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"},{"id":88083,"title":"wp-admin/includes/post.php user_ID Parameter Manipulation Post Authorship Spoofing","url":"http://core.trac.wordpress.org/changeset/25321","osvdb":"97213","cve":"2013-4340","secunia":"54803","created_at":"2014-07-15T17:16:21.712Z","updated_at":"2014-07-15T17:16:21.712Z","fixed_in":"3.6.1"},{"id":88084,"title":"wp-includes/functions.php get_allowed_mime_types Function HTML File Upload XSS Weakness","url":"http://core.trac.wordpress.org/changeset/25322","osvdb":"97214","cve":"2013-5738","created_at":"2014-07-15T17:16:21.756Z","updated_at":"2014-07-15T17:16:21.756Z","fixed_in":"3.6.1"},{"id":88085,"title":"Multiple Function Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Nov/220","osvdb":"100487","created_at":"2014-07-15T17:16:21.804Z","updated_at":"2014-07-15T17:16:21.804Z"},{"id":88086,"title":"Multiple Script Arbitrary Site Redirect","url":"http://seclists.org/fulldisclosure/2013/Dec/174","osvdb":"101181","created_at":"2014-07-15T17:16:21.847Z","updated_at":"2014-07-15T17:16:21.847Z","fixed_in":"3.6.1"},{"id":88087,"title":"wp-admin/edit-tags.php _wp_http_referer Parameter Reflected XSS","url":"http://seclists.org/fulldisclosure/2013/Dec/174","osvdb":"101182","created_at":"2014-07-15T17:16:21.892Z","updated_at":"2014-07-15T17:16:21.892Z","fixed_in":"3.6.1"}]}},{"3.5.2":{"vulnerabilities":[{"id":88088,"title":"Media Library Multiple Function Path Disclosure","url":"http://websecurity.com.ua/6795/","osvdb":"100484","created_at":"2014-07-15T17:16:21.940Z","updated_at":"2014-07-15T17:16:21.940Z"},{"id":88089,"title":"SWFUpload Content Spoofing","url":"http://bot24.blogspot.ca/2013/04/swfupload-object-injectioncsrf.html,https://github.com/wpscanteam/wpscan/issues/243","created_at":"2014-07-15T17:16:21.987Z","updated_at":"2014-07-15T17:16:21.987Z"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.5.1":{"vulnerabilities":[{"id":88090,"title":"Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Jul/70","osvdb":"95060","created_at":"2014-07-15T17:16:22.080Z","updated_at":"2014-07-15T17:16:22.080Z","fixed_in":"3.5.2"},{"id":88091,"title":"WordPress 3.4-3.5.1 DoS in class-phpass.php","url":"http://seclists.org/fulldisclosure/2013/Jun/65","osvdb":"94235","cve":"2013-2173","secunia":"53676","created_at":"2014-07-15T17:16:22.129Z","updated_at":"2014-07-15T17:16:22.129Z","fixed_in":"3.5.2"},{"id":88092,"title":"WordPress Multiple XSS","osvdb":"94791,94785,94786,94790","created_at":"2014-07-15T17:16:22.176Z","updated_at":"2014-07-15T17:16:22.176Z","fixed_in":"3.5.2"},{"id":88093,"title":"WordPress TinyMCE Plugin Flash Applet Unspecified Spoofing Weakness","osvdb":"94787","created_at":"2014-07-15T17:16:22.220Z","updated_at":"2014-07-15T17:16:22.220Z","fixed_in":"3.5.2"},{"id":88094,"title":"WordPress File Upload Unspecified Path Disclosure","osvdb":"94788","created_at":"2014-07-15T17:16:22.267Z","updated_at":"2014-07-15T17:16:22.267Z","fixed_in":"3.5.2"},{"id":88095,"title":"WordPress 3.5-3.5.1 oEmbed Unspecified XML External Entity (XXE) Arbitrary File Disclosure","osvdb":"94789","created_at":"2014-07-15T17:16:22.313Z","updated_at":"2014-07-15T17:16:22.313Z","fixed_in":"3.5.2"},{"id":88096,"title":"WordPress 3.5-3.5.1 Multiple Role Remote Privilege Escalation","osvdb":"94783","created_at":"2014-07-15T17:16:22.358Z","updated_at":"2014-07-15T17:16:22.358Z","fixed_in":"3.5.2"},{"id":88097,"title":"WordPress 3.5-3.5.1 HTTP API Unspecified Server Side Request Forgery (SSRF)","osvdb":"94784","created_at":"2014-07-15T17:16:22.403Z","updated_at":"2014-07-15T17:16:22.403Z","fixed_in":"3.5.2"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.5":{"vulnerabilities":[{"id":88090,"title":"Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Jul/70","osvdb":"95060","created_at":"2014-07-15T17:16:22.080Z","updated_at":"2014-07-15T17:16:22.080Z","fixed_in":"3.5.2"},{"id":88098,"title":"WordPress 3.4 - 3.5.1 DoS in class-phpass.php","url":"http://seclists.org/fulldisclosure/2013/Jun/65","osvdb":"94235","cve":"2013-2173","secunia":"53676","created_at":"2014-07-15T17:16:22.546Z","updated_at":"2014-07-15T17:16:22.546Z","fixed_in":"3.5.2"},{"id":88099,"title":"WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)","url":"https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues","created_at":"2014-07-15T17:16:22.603Z","updated_at":"2014-07-15T17:16:22.603Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"},{"id":88102,"title":"Shortcodes / Post Content Multiple Unspecified XSS","url":"http://www.securityfocus.com/bid/57554,http://securitytracker.com/id?1028045","osvdb":"89576","cve":"2013-0236","secunia":"51967","created_at":"2014-07-15T17:16:22.774Z","updated_at":"2014-07-15T17:16:22.774Z","fixed_in":"3.5.1"},{"id":88078,"title":"Plupload Unspecified XSS","osvdb":"105622","secunia":"57769","created_at":"2014-07-15T17:16:21.267Z","updated_at":"2014-07-15T17:16:21.267Z","fixed_in":"3.5.1"}]}},{"3.4.2":{"vulnerabilities":[{"id":88090,"title":"Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Jul/70","osvdb":"95060","created_at":"2014-07-15T17:16:22.080Z","updated_at":"2014-07-15T17:16:22.080Z","fixed_in":"3.5.2"},{"id":88098,"title":"WordPress 3.4 - 3.5.1 DoS in class-phpass.php","url":"http://seclists.org/fulldisclosure/2013/Jun/65","osvdb":"94235","cve":"2013-2173","secunia":"53676","created_at":"2014-07-15T17:16:22.546Z","updated_at":"2014-07-15T17:16:22.546Z","fixed_in":"3.5.2"},{"id":88099,"title":"WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)","url":"https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues","created_at":"2014-07-15T17:16:22.603Z","updated_at":"2014-07-15T17:16:22.603Z"},{"id":88103,"title":"WordPress 3.4.2 Cross Site Request Forgery","url":"http://packetstormsecurity.org/files/116785/WordPress-3.4.2-Cross-Site-Request-Forgery.html","created_at":"2014-07-15T17:16:23.016Z","updated_at":"2014-07-15T17:16:23.016Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"},{"id":88078,"title":"Plupload Unspecified XSS","osvdb":"105622","secunia":"57769","created_at":"2014-07-15T17:16:21.267Z","updated_at":"2014-07-15T17:16:21.267Z","fixed_in":"3.5.1"}]}},{"3.4.1":{"vulnerabilities":[{"id":88090,"title":"Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Jul/70","osvdb":"95060","created_at":"2014-07-15T17:16:22.080Z","updated_at":"2014-07-15T17:16:22.080Z","fixed_in":"3.5.2"},{"id":88098,"title":"WordPress 3.4 - 3.5.1 DoS in class-phpass.php","url":"http://seclists.org/fulldisclosure/2013/Jun/65","osvdb":"94235","cve":"2013-2173","secunia":"53676","created_at":"2014-07-15T17:16:22.546Z","updated_at":"2014-07-15T17:16:22.546Z","fixed_in":"3.5.2"},{"id":88099,"title":"WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)","url":"https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues","created_at":"2014-07-15T17:16:22.603Z","updated_at":"2014-07-15T17:16:22.603Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"},{"id":88078,"title":"Plupload Unspecified XSS","osvdb":"105622","secunia":"57769","created_at":"2014-07-15T17:16:21.267Z","updated_at":"2014-07-15T17:16:21.267Z","fixed_in":"3.5.1"}]}},{"3.4":{"vulnerabilities":[{"id":88090,"title":"Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Jul/70","osvdb":"95060","created_at":"2014-07-15T17:16:22.080Z","updated_at":"2014-07-15T17:16:22.080Z","fixed_in":"3.5.2"},{"id":88098,"title":"WordPress 3.4 - 3.5.1 DoS in class-phpass.php","url":"http://seclists.org/fulldisclosure/2013/Jun/65","osvdb":"94235","cve":"2013-2173","secunia":"53676","created_at":"2014-07-15T17:16:22.546Z","updated_at":"2014-07-15T17:16:22.546Z","fixed_in":"3.5.2"},{"id":88099,"title":"WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)","url":"https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues","created_at":"2014-07-15T17:16:22.603Z","updated_at":"2014-07-15T17:16:22.603Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"},{"id":88078,"title":"Plupload Unspecified XSS","osvdb":"105622","secunia":"57769","created_at":"2014-07-15T17:16:21.267Z","updated_at":"2014-07-15T17:16:21.267Z","fixed_in":"3.5.1"}]}},{"3.4-beta4":{"vulnerabilities":[{"id":88099,"title":"WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)","url":"https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues","created_at":"2014-07-15T17:16:22.603Z","updated_at":"2014-07-15T17:16:22.603Z"},{"id":88104,"title":"Wordpress 3.3.1 Multiple CSRF Vulnerabilities","exploitdb":"18791","created_at":"2014-07-15T17:16:24.023Z","updated_at":"2014-07-15T17:16:24.023Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"},{"id":88078,"title":"Plupload Unspecified XSS","osvdb":"105622","secunia":"57769","created_at":"2014-07-15T17:16:21.267Z","updated_at":"2014-07-15T17:16:21.267Z","fixed_in":"3.5.1"}]}},{"3.3.3":{"vulnerabilities":[{"id":88099,"title":"WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)","url":"https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues","created_at":"2014-07-15T17:16:22.603Z","updated_at":"2014-07-15T17:16:22.603Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"},{"id":88078,"title":"Plupload Unspecified XSS","osvdb":"105622","secunia":"57769","created_at":"2014-07-15T17:16:21.267Z","updated_at":"2014-07-15T17:16:21.267Z","fixed_in":"3.5.1"}]}},{"3.3.2":{"vulnerabilities":[{"id":88099,"title":"WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)","url":"https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues","created_at":"2014-07-15T17:16:22.603Z","updated_at":"2014-07-15T17:16:22.603Z"},{"id":88104,"title":"Wordpress 3.3.1 Multiple CSRF Vulnerabilities","exploitdb":"18791","created_at":"2014-07-15T17:16:24.023Z","updated_at":"2014-07-15T17:16:24.023Z"},{"id":88105,"title":"WordPress 3.3.2 Cross Site Scripting","url":"http://packetstormsecurity.org/files/113254","created_at":"2014-07-15T17:16:24.591Z","updated_at":"2014-07-15T17:16:24.591Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"},{"id":88078,"title":"Plupload Unspecified XSS","osvdb":"105622","secunia":"57769","created_at":"2014-07-15T17:16:21.267Z","updated_at":"2014-07-15T17:16:21.267Z","fixed_in":"3.5.1"}]}},{"3.3.1":{"vulnerabilities":[{"id":88109,"title":"Multiple vulnerabilities including XSS and Privilege Escalation","url":"http://wordpress.org/news/2012/04/wordpress-3-3-2/","created_at":"2014-07-15T17:16:25.030Z","updated_at":"2014-07-15T17:16:25.030Z"},{"id":88110,"title":"Wordpress 3.3.1 - Multiple CSRF Vulnerabilities","exploitdb":"18791","created_at":"2014-07-15T17:16:25.079Z","updated_at":"2014-07-15T17:16:25.079Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.3":{"vulnerabilities":[{"id":88112,"title":"Reflected Cross-Site Scripting in WordPress 3.3","url":"http://oldmanlab.blogspot.com/2012/01/wordpress-33-xss-vulnerability.html","created_at":"2014-07-15T17:16:25.468Z","updated_at":"2014-07-15T17:16:25.468Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.2.1":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.2":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.1.4":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.1.3":{"vulnerabilities":[{"id":88113,"title":"wp-admin/link-manager.php Multiple Parameter SQL Injection","osvdb":"73723","secunia":"45099","exploitdb":"17465","created_at":"2014-07-15T17:16:26.903Z","updated_at":"2014-07-15T17:16:26.903Z","fixed_in":"3.1.4"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.1.2":{"vulnerabilities":[{"id":88114,"title":"Wordpress \u003c= 3.1.2 Clickjacking Vulnerability","url":"http://seclists.org/fulldisclosure/2011/Sep/219,http://www.securityfocus.com/bid/49730","created_at":"2014-07-15T17:16:27.306Z","updated_at":"2014-07-15T17:16:27.306Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.1.1":{"vulnerabilities":[{"id":88115,"title":"WordPress wp-includes/formatting.php make_clickable() PCRE Library Remote DoS","osvdb":"72142","created_at":"2014-07-15T17:16:27.694Z","updated_at":"2014-07-15T17:16:27.694Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.1":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.0.6":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.0.5":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88116,"title":"wp-admin/press-this.php - Privilege Escalation","cve":"2011-5270","created_at":"2014-07-15T17:16:28.911Z","updated_at":"2014-07-15T17:16:28.911Z","fixed_in":"3.0.6"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.0.4":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88116,"title":"wp-admin/press-this.php - Privilege Escalation","cve":"2011-5270","created_at":"2014-07-15T17:16:28.911Z","updated_at":"2014-07-15T17:16:28.911Z","fixed_in":"3.0.6"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.0.3":{"vulnerabilities":[{"id":88117,"title":"SQL injection vulnerability in do_trackbacks() Wordpress function","exploitdb":"15684","created_at":"2014-07-15T17:16:29.523Z","updated_at":"2014-07-15T17:16:29.523Z"},{"id":88118,"title":"Wordpress 3.0.3 stored XSS IE7,6 NS8.1","exploitdb":"15858","created_at":"2014-07-15T17:16:29.580Z","updated_at":"2014-07-15T17:16:29.580Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88116,"title":"wp-admin/press-this.php - Privilege Escalation","cve":"2011-5270","created_at":"2014-07-15T17:16:28.911Z","updated_at":"2014-07-15T17:16:28.911Z","fixed_in":"3.0.6"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.0.2":{"vulnerabilities":[{"id":88119,"title":"WordPress XML-RPC Interface Access Restriction Bypass","osvdb":"69761","created_at":"2014-07-15T17:16:29.999Z","updated_at":"2014-07-15T17:16:29.999Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88116,"title":"wp-admin/press-this.php - Privilege Escalation","cve":"2011-5270","created_at":"2014-07-15T17:16:28.911Z","updated_at":"2014-07-15T17:16:28.911Z","fixed_in":"3.0.6"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.0.1":{"vulnerabilities":[{"id":88120,"title":"WordPress: Information Disclosure via SQL Injection Attack","url":"http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/","created_at":"2014-07-15T17:16:30.465Z","updated_at":"2014-07-15T17:16:30.465Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88116,"title":"wp-admin/press-this.php - Privilege Escalation","cve":"2011-5270","created_at":"2014-07-15T17:16:28.911Z","updated_at":"2014-07-15T17:16:28.911Z","fixed_in":"3.0.6"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"}]}},{"3.0":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88116,"title":"wp-admin/press-this.php - Privilege Escalation","cve":"2011-5270","created_at":"2014-07-15T17:16:28.911Z","updated_at":"2014-07-15T17:16:28.911Z","fixed_in":"3.0.6"},{"id":88106,"title":"Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php","cve":"2012-6633","created_at":"2014-07-15T17:16:24.753Z","updated_at":"2014-07-15T17:16:24.753Z","fixed_in":"3.3.3"},{"id":88107,"title":"wp-admin/media-upload.php sensitive information disclosure or bypass","cve":"2012-6634","created_at":"2014-07-15T17:16:24.801Z","updated_at":"2014-07-15T17:16:24.801Z","fixed_in":"3.3.3"},{"id":88108,"title":"wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft","cve":"2012-6635","created_at":"2014-07-15T17:16:24.846Z","updated_at":"2014-07-15T17:16:24.846Z","fixed_in":"3.3.3"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0.1"},{"id":88082,"title":"Crafted String URL Redirect Restriction Bypass","url":"http://packetstormsecurity.com/files/123589/,http://core.trac.wordpress.org/changeset/25323,http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609","osvdb":"97212","cve":"2013-4339","secunia":"54803","exploitdb":"28958","created_at":"2014-07-15T17:16:21.671Z","updated_at":"2014-07-15T17:16:21.671Z","fixed_in":"3.6.1"},{"id":89610,"title":"testing!!!!123","url":"http://www.example.com","osvdb":"12f345,12345,1234g5","cve":"12345,12345,12345","secunia":"12345,2222,12345,12345","exploitdb":"12345","created_at":"2014-07-29T16:02:58.453Z","updated_at":"2014-07-29T21:03:59.991Z"}]}},{"2.9.2":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.9.1":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.9":{"vulnerabilities":[{"id":88126,"title":"WordPress 2.9 Failure to Restrict URL Access","exploitdb":"11441","created_at":"2014-07-15T17:16:32.421Z","updated_at":"2014-07-15T17:16:32.421Z"},{"id":88127,"title":"Wordpress DOS \u003c= 2.9","exploitdb":"11441","created_at":"2014-07-15T17:16:32.463Z","updated_at":"2014-07-15T17:16:32.463Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.8.6":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.8.5":{"vulnerabilities":[{"id":88128,"title":"WordPress \u003c= 2.8.5 Unrestricted File Upload Arbitrary PHP Code Execution","exploitdb":"10089","created_at":"2014-07-15T17:16:33.235Z","updated_at":"2014-07-15T17:16:33.235Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.8.4":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.8.3":{"vulnerabilities":[{"id":88129,"title":"Wordpress \u003c= 2.8.3 Remote Admin Reset Password Vulnerability","exploitdb":"9410","created_at":"2014-07-15T17:16:34.029Z","updated_at":"2014-07-15T17:16:34.029Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.8.2":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.8.1":{"vulnerabilities":[{"id":88130,"title":"Wordpress 2.8.1 (url) Remote Cross Site Scripting Exploit","exploitdb":"9250","created_at":"2014-07-15T17:16:34.787Z","updated_at":"2014-07-15T17:16:34.787Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.8":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.7.1":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.7":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.6.5":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.6.4":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.6.3":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.6.2":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.6.1":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88132,"title":"Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit","exploitdb":"6421","created_at":"2014-07-15T17:16:38.068Z","updated_at":"2014-07-15T17:16:38.068Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.6":{"vulnerabilities":[{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.5.1":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.5":{"vulnerabilities":[{"id":88133,"title":"Wordpress 2.5 Cookie Integrity Protection Vulnerability","url":"http://www.securityfocus.com/archive/1/archive/1/491356/100/0/threaded","cve":"2008-1930","created_at":"2014-07-15T17:16:39.306Z","updated_at":"2014-07-15T17:16:39.306Z"},{"id":88111,"title":"XSS vulnerability in swfupload in WordPress","url":"http://seclists.org/fulldisclosure/2012/Nov/51","created_at":"2014-07-15T17:16:25.130Z","updated_at":"2014-07-15T17:16:25.130Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.3.3":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.3.2":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.3.1":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88134,"title":"Wordpress \u003c= 2.3.1 Charset Remote SQL Injection Vulnerability","exploitdb":"4721","created_at":"2014-07-15T17:16:40.542Z","updated_at":"2014-07-15T17:16:40.542Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.3":{"vulnerabilities":[{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.2.3":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.2.2":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.2.1":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.2":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88135,"title":"WordPress 2.2 (wp-app.php) Arbitrary File Upload Exploit","exploitdb":"4113","created_at":"2014-07-15T17:16:42.484Z","updated_at":"2014-07-15T17:16:42.484Z"},{"id":88136,"title":"Wordpress 2.2 (xmlrpc.php) Remote SQL Injection Exploit","exploitdb":"4039","created_at":"2014-07-15T17:16:42.525Z","updated_at":"2014-07-15T17:16:42.525Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.1.3":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88137,"title":"Wordpress 2.1.3 admin-ajax.php SQL Injection Blind Fishing Exploit","exploitdb":"3960","created_at":"2014-07-15T17:16:42.948Z","updated_at":"2014-07-15T17:16:42.948Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.1.2":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88138,"title":"WordPress \"year\" Cross-Site Scripting Vulnerability","url":"http://www.securityfocus.com/archive/1/archive/1/462374/100/0/threaded","secunia":"24485","created_at":"2014-07-15T17:16:43.367Z","updated_at":"2014-07-15T17:16:43.367Z"},{"id":88139,"title":"Wordpress 2.1.2 (xmlrpc) Remote SQL Injection Exploit","exploitdb":"3656","created_at":"2014-07-15T17:16:43.408Z","updated_at":"2014-07-15T17:16:43.408Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.1.1":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88140,"title":"WordPress Command Execution and PHP Injection","url":"http://www.securityfocus.com/bid/22797,http://xforce.iss.net/xforce/xfdb/32807","cve":"2007-1277","secunia":"24374","created_at":"2014-07-15T17:16:43.833Z","updated_at":"2014-07-15T17:16:43.833Z","fixed_in":"2.1.2"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.1":{"vulnerabilities":[{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.0.11":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.0.10":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.0.9":{"vulnerabilities":[{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.0.8":{"vulnerabilities":[{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.0.7":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.0.6":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88141,"title":"Wordpress \u003c= 2.0.6 wp-trackback.php Remote SQL Injection Exploit","exploitdb":"3109","created_at":"2014-07-15T17:16:46.450Z","updated_at":"2014-07-15T17:16:46.450Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.0.5":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88142,"title":"Wordpress 2.0.5 Trackback UTF-7 Remote SQL Injection Exploit","exploitdb":"3095","created_at":"2014-07-15T17:16:46.876Z","updated_at":"2014-07-15T17:16:46.876Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.0.4":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88143,"title":"WordPress 2.0.2 - 2.0.4 Paged Parameter SQL Injection Vulnerability","url":"http://www.securityfocus.com/bid/18779","created_at":"2014-07-15T17:16:47.410Z","updated_at":"2014-07-15T17:16:47.410Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.0.3":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88143,"title":"WordPress 2.0.2 - 2.0.4 Paged Parameter SQL Injection Vulnerability","url":"http://www.securityfocus.com/bid/18779","created_at":"2014-07-15T17:16:47.410Z","updated_at":"2014-07-15T17:16:47.410Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.0.2":{"vulnerabilities":[{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88144,"title":"WordPress \u003c= 2.0.2 (cache) Remote Shell Injection Exploit","exploitdb":"6","created_at":"2014-07-15T17:16:48.215Z","updated_at":"2014-07-15T17:16:48.215Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88143,"title":"WordPress 2.0.2 - 2.0.4 Paged Parameter SQL Injection Vulnerability","url":"http://www.securityfocus.com/bid/18779","created_at":"2014-07-15T17:16:47.410Z","updated_at":"2014-07-15T17:16:47.410Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.0.1":{"vulnerabilities":[{"id":88145,"title":"Wordpress wp-register.php Multiple Parameter XSS","osvdb":"38577","created_at":"2014-07-15T17:16:48.772Z","updated_at":"2014-07-15T17:16:48.772Z","fixed_in":"2.0.2"},{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"}]}},{"2.0":{"vulnerabilities":[{"id":88145,"title":"Wordpress wp-register.php Multiple Parameter XSS","osvdb":"38577","created_at":"2014-07-15T17:16:48.772Z","updated_at":"2014-07-15T17:16:48.772Z","fixed_in":"2.0.2"},{"id":88131,"title":"WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability","url":"http://www.securityfocus.com/bid/35584/","created_at":"2014-07-15T17:16:35.556Z","updated_at":"2014-07-15T17:16:35.556Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"},{"id":88121,"title":"wp-includes/comment.php bypass intended spam restrictions via a crafted URL","osvdb":"104693","cve":"2010-5293","created_at":"2014-07-15T17:16:30.842Z","updated_at":"2014-07-15T17:16:30.842Z","fixed_in":"3.0.2"},{"id":88122,"title":"Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php","cve":"2010-5294","created_at":"2014-07-15T17:16:30.889Z","updated_at":"2014-07-15T17:16:30.889Z","fixed_in":"3.0.2"},{"id":88123,"title":"Cross-site scripting (XSS) in wp-admin/plugins.php","cve":"2010-5295","created_at":"2014-07-15T17:16:30.930Z","updated_at":"2014-07-15T17:16:30.930Z","fixed_in":"3.0.2"},{"id":88124,"title":"wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","cve":"2010-5296","created_at":"2014-07-15T17:16:30.971Z","updated_at":"2014-07-15T17:16:30.971Z","fixed_in":"3.0.2"},{"id":88125,"title":"Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action","osvdb":"104691","cve":"2010-5297","created_at":"2014-07-15T17:16:31.601Z","updated_at":"2014-07-15T17:16:31.601Z","fixed_in":"3.0"},{"id":89602,"title":"this is a test","created_at":"2014-07-15T17:26:16.549Z","updated_at":"2014-07-15T17:26:16.549Z"}]}},{"1.5.2":{"vulnerabilities":[{"id":88145,"title":"Wordpress wp-register.php Multiple Parameter XSS","osvdb":"38577","created_at":"2014-07-15T17:16:48.772Z","updated_at":"2014-07-15T17:16:48.772Z","fixed_in":"2.0.2"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"}]}},{"1.5.1.3":{"vulnerabilities":[{"id":88145,"title":"Wordpress wp-register.php Multiple Parameter XSS","osvdb":"38577","created_at":"2014-07-15T17:16:48.772Z","updated_at":"2014-07-15T17:16:48.772Z","fixed_in":"2.0.2"},{"id":88146,"title":"Wordpress \u003c= 1.5.1.3 Remote Code Execution eXploit (metasploit)","exploitdb":"1145","created_at":"2014-07-15T17:16:49.960Z","updated_at":"2014-07-15T17:16:49.960Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"}]}},{"1.5.1.2":{"vulnerabilities":[{"id":88145,"title":"Wordpress wp-register.php Multiple Parameter XSS","osvdb":"38577","created_at":"2014-07-15T17:16:48.772Z","updated_at":"2014-07-15T17:16:48.772Z","fixed_in":"2.0.2"},{"id":88147,"title":"Wordpress \u003c= 1.5.1.2 xmlrpc Interface SQL Injection Exploit","osvdb":"17636,17637,17638,17639,17640,17641","cve":"2005-2108","secunia":"15831,15898","exploitdb":"1077","created_at":"2014-07-15T17:16:50.147Z","updated_at":"2014-07-15T17:16:50.147Z","fixed_in":"1.5.1.3"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"}]}},{"1.5.1.1":{"vulnerabilities":[{"id":88145,"title":"Wordpress wp-register.php Multiple Parameter XSS","osvdb":"38577","created_at":"2014-07-15T17:16:48.772Z","updated_at":"2014-07-15T17:16:48.772Z","fixed_in":"2.0.2"},{"id":88148,"title":"WordPress \u003c= 1.5.1.1 \"add new admin\" SQL Injection Exploit","secunia":"10596","created_at":"2014-07-15T17:16:50.393Z","updated_at":"2014-07-29T21:23:31.030Z"},{"id":88149,"title":"WordPress \u003c= 1.5.1.1 SQL Injection Exploit","exploitdb":"1033","created_at":"2014-07-15T17:16:50.447Z","updated_at":"2014-07-15T17:16:50.447Z"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"}]}},{"1.5.1":{"vulnerabilities":[{"id":88145,"title":"Wordpress wp-register.php Multiple Parameter XSS","osvdb":"38577","created_at":"2014-07-15T17:16:48.772Z","updated_at":"2014-07-15T17:16:48.772Z","fixed_in":"2.0.2"},{"id":88100,"title":"XMLRPC Pingback API Internal/External Port Scanning","url":"https://github.com/FireFart/WordpressPingbackPortScanner","created_at":"2014-07-15T17:16:22.644Z","updated_at":"2014-07-15T17:16:22.644Z"},{"id":88101,"title":"WordPress XMLRPC pingback additional issues","url":"http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html","created_at":"2014-07-15T17:16:22.684Z","updated_at":"2014-07-15T17:16:22.684Z"}]}},{"1.5":{"vulnerabilities":[{"id":88150,"title":"WordPress wp-trackback.php tb_id Parameter SQL Injection","osvdb":"16701,16702,16703","cve":"2005-1687","created_at":"2014-07-15T17:16:50.774Z","updated_at":"2014-07-15T17:16:50.774Z","fixed_in":"1.5.1"},{"id":88151,"title":"WordPress post.php p Parameter XSS","osvdb":"16702,16701,16703","created_at":"2014-07-15T17:16:50.819Z","updated_at":"2014-07-15T17:16:50.819Z","fixed_in":"1.5.1"},{"id":88152,"title":"WordPress Multiple Script Direct Request Path Disclosure","osvdb":"16703,16701,16702","cve":"2005-1688","created_at":"2014-07-15T17:16:50.865Z","updated_at":"2014-07-15T17:16:50.865Z","fixed_in":"1.5.1"},{"id":88153,"title":"WordPress Cross-Site Scripting and SQL Injection Vulnerabilities","osvdb":"16478","secunia":"15324","created_at":"2014-07-15T17:16:50.924Z","updated_at":"2014-07-15T17:16:50.924Z","fixed_in":"1.5.1"},{"id":88154,"title":"WordPress template-functions-post.php Multiple Field XSS","osvdb":"15643","cve":"2005-1102","created_at":"2014-07-15T17:16:50.999Z","updated_at":"2014-07-15T17:16:50.999Z"}]}}]
\ No newline at end of file
diff --git a/data/wp_vulns.xml b/data/wp_vulns.xml
deleted file mode 100644
index ae8506c4..00000000
--- a/data/wp_vulns.xml
+++ /dev/null
@@ -1,5196 +0,0 @@
-
-
-
-
-
-
- Administrator-exploitable blind SQLi in WordPress 1.0 - 3.8.1
-
- https://security.dxw.com/advisories/sqli-in-wordpress-3-6-1/
-
- SQLI
-
-
- Potential Authentication Cookie Forgery
-
- 105620
- https://labs.mwrinfosecurity.com/blog/2014/04/11/wordpress-auth-cookie-forgery/
- https://github.com/WordPress/WordPress/commit/78a915e0e5927cf413aa6c2cef2fca3dc587f8be
- 2014-0166
-
- AUTHBYPASS
- 3.8.2
-
-
- Privilege escalation: contributors publishing posts
-
- 105630
- https://github.com/wpscanteam/wpscan/wiki/CVE-2014-0165
- 2014-0165
-
- BYPASS
- 3.8.2
-
-
- Plupload Unspecified XSS
-
- 105622
- 57769
-
- BYPASS
- 3.8.2
-
-
-
-
-
- wp-admin/options-writing.php Cleartext Admin Credentials Disclosure
-
- 101101
- http://seclists.org/fulldisclosure/2013/Dec/135
-
- AUTHBYPASS
-
-
-
-
-
- Potential Authentication Cookie Forgery
-
- 105620
- https://github.com/WordPress/WordPress/commit/78a915e0e5927cf413aa6c2cef2fca3dc587f8be
- 2014-0166
-
- AUTHBYPASS
- 3.7.2
-
-
- Privilege escalation: contributors publishing posts
-
- 105630
- https://github.com/wpscanteam/wpscan/wiki/CVE-2014-0165
- 2014-0165
-
- BYPASS
- 3.7.2
-
-
- wp-admin/options-writing.php Cleartext Admin Credentials Disclosure
-
- 101101
- http://seclists.org/fulldisclosure/2013/Dec/135
-
- AUTHBYPASS
-
-
- Plupload Unspecified XSS
-
- 105622
- 57769
-
- BYPASS
- 3.7.2
-
-
-
-
-
- PHP Object Injection
-
- http://vagosec.org/2013/09/wordpress-php-object-injection/
- http://www.openwall.com/lists/oss-security/2013/09/12/1
- http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4340
- http://core.trac.wordpress.org/changeset/25325
- 54803
- 2013-4338
- 97211
-
- UNKNOWN
- 3.6.1
-
-
- wp-includes/functions.php get_allowed_mime_types Function SWF / EXE File Upload XSS Weakness
-
- 97210
- 2013-5739
- http://core.trac.wordpress.org/changeset/25322
-
- XSS
- 3.6.1
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
- wp-admin/includes/post.php user_ID Parameter Manipulation Post Authorship Spoofing
-
- 97213
- 2013-4340
- 54803
- http://core.trac.wordpress.org/changeset/25321
-
- UNKNOWN
- 3.6.1
-
-
- wp-includes/functions.php get_allowed_mime_types Function HTML File Upload XSS Weakness
-
- 97214
- 2013-5738
- http://core.trac.wordpress.org/changeset/25322
-
- XSS
- 3.6.1
-
-
- Multiple Function Path Disclosure
-
- 100487
- http://seclists.org/fulldisclosure/2013/Nov/220
-
- UNKNOWN
-
-
- Multiple Script Arbitrary Site Redirect
-
- 101181
- http://seclists.org/fulldisclosure/2013/Dec/174
-
- REDIRECT
- 3.6.1
-
-
- wp-admin/edit-tags.php _wp_http_referer Parameter Reflected XSS
-
- 101182
- http://seclists.org/fulldisclosure/2013/Dec/174
-
- XSS
- 3.6.1
-
-
-
-
-
- Media Library Multiple Function Path Disclosure
-
- 100484
- http://websecurity.com.ua/6795/
-
- FPD
-
-
- SWFUpload Content Spoofing
-
- http://bot24.blogspot.ca/2013/04/swfupload-object-injectioncsrf.html
- https://github.com/wpscanteam/wpscan/issues/243
-
- UNKNOWN
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure
-
- 95060
- http://seclists.org/fulldisclosure/2013/Jul/70
-
- FPD
- 3.5.2
-
-
- WordPress 3.4-3.5.1 DoS in class-phpass.php
-
- http://seclists.org/fulldisclosure/2013/Jun/65
- 53676
- 94235
- 2013-2173
-
- UNKNOWN
- 3.5.2
-
-
- WordPress Multiple XSS
-
- 94791
- 94785
- 94786
- 94790
-
- XSS
- 3.5.2
-
-
- WordPress TinyMCE Plugin Flash Applet Unspecified Spoofing Weakness
-
- 94787
-
- UNKNOWN
- 3.5.2
-
-
- WordPress File Upload Unspecified Path Disclosure
-
- 94788
-
- UNKNOWN
- 3.5.2
-
-
- WordPress 3.5-3.5.1 oEmbed Unspecified XML External Entity (XXE) Arbitrary File Disclosure
-
- 94789
-
- XXE
- 3.5.2
-
-
- WordPress 3.5-3.5.1 Multiple Role Remote Privilege Escalation
-
- 94783
-
- UNKNOWN
- 3.5.2
-
-
- WordPress 3.5-3.5.1 HTTP API Unspecified Server Side Request Forgery (SSRF)
-
- 94784
-
- SSRF
- 3.5.2
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure
-
- 95060
- http://seclists.org/fulldisclosure/2013/Jul/70
-
- FPD
- 3.5.2
-
-
- WordPress 3.4 - 3.5.1 DoS in class-phpass.php
-
- http://seclists.org/fulldisclosure/2013/Jun/65
- 53676
- 94235
- 2013-2173
-
- UNKNOWN
- 3.5.2
-
-
- WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)
-
- https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
- Shortcodes / Post Content Multiple Unspecified XSS
-
- 89576
- 2013-0236
- 51967
- http://www.securityfocus.com/bid/57554
- http://securitytracker.com/id?1028045
-
- XSS
- 3.5.1
-
-
- Plupload Unspecified XSS
-
- 89577
- 2013-0237
- 51967
- http://www.securityfocus.com/bid/57555
- http://securitytracker.com/id?1028045
-
- XSS
- 3.5.1
-
-
-
-
-
- Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure
-
- 95060
- http://seclists.org/fulldisclosure/2013/Jul/70
-
- FPD
- 3.5.2
-
-
- WordPress 3.4 - 3.5.1 DoS in class-phpass.php
-
- http://seclists.org/fulldisclosure/2013/Jun/65
- 53676
- 94235
- 2013-2173
-
- UNKNOWN
- 3.5.2
-
-
- WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)
-
- https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues
-
- XSS
-
-
- WordPress 3.4.2 Cross Site Request Forgery
-
- http://packetstormsecurity.org/files/116785/WordPress-3.4.2-Cross-Site-Request-Forgery.html
-
- CSRF
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
- Plupload Unspecified XSS
-
- 89577
- 2013-0237
- 51967
- http://www.securityfocus.com/bid/57555
- http://securitytracker.com/id?1028045
-
- XSS
- 3.5.1
-
-
-
-
-
- Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure
-
- 95060
- http://seclists.org/fulldisclosure/2013/Jul/70
-
- FPD
- 3.5.2
-
-
- WordPress 3.4 - 3.5.1 DoS in class-phpass.php
-
- http://seclists.org/fulldisclosure/2013/Jun/65
- 53676
- 94235
- 2013-2173
-
- UNKNOWN
- 3.5.2
-
-
- WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)
-
- https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
- Plupload Unspecified XSS
-
- 89577
- 2013-0237
- 51967
- http://www.securityfocus.com/bid/57555
- http://securitytracker.com/id?1028045
-
- XSS
- 3.5.1
-
-
-
-
-
- Wordpress 3.4 - 3.5.1 /wp-admin/users.php Malformed s Parameter Path Disclosure
-
- 95060
- http://seclists.org/fulldisclosure/2013/Jul/70
-
- FPD
- 3.5.2
-
-
- WordPress 3.4 - 3.5.1 DoS in class-phpass.php
-
- http://seclists.org/fulldisclosure/2013/Jun/65
- 53676
- 94235
- 2013-2173
-
- UNKNOWN
- 3.5.2
-
-
- WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)
-
- https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
- Plupload Unspecified XSS
-
- 89577
- 2013-0237
- 51967
- http://www.securityfocus.com/bid/57555
- http://securitytracker.com/id?1028045
-
- XSS
- 3.5.1
-
-
-
-
-
- WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)
-
- https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues
-
- XSS
-
-
- Wordpress 3.3.1 Multiple CSRF Vulnerabilities
-
- 18791
-
- CSRF
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
- Plupload Unspecified XSS
-
- 89577
- 2013-0237
- 51967
- http://www.securityfocus.com/bid/57555
- http://securitytracker.com/id?1028045
-
- XSS
- 3.5.1
-
-
-
-
-
- WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)
-
- https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
- Plupload Unspecified XSS
-
- 89577
- 2013-0237
- 51967
- http://www.securityfocus.com/bid/57555
- http://securitytracker.com/id?1028045
-
- XSS
- 3.5.1
-
-
-
-
-
- WordPress 3.3.2 - 3.5 Cross-Site Scripting (XSS) (Issue 3)
-
- https://github.com/wpscanteam/wpscan/wiki/WordPress-3.5-Issues
-
- XSS
-
-
- Wordpress 3.3.1 Multiple CSRF Vulnerabilities
-
- 18791
-
- CSRF
-
-
- WordPress 3.3.2 Cross Site Scripting
-
- http://packetstormsecurity.org/files/113254
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
- Plupload Unspecified XSS
-
- 89577
- 2013-0237
- 51967
- http://www.securityfocus.com/bid/57555
- http://securitytracker.com/id?1028045
-
- XSS
- 3.5.1
-
-
-
-
-
- Multiple vulnerabilities including XSS and Privilege Escalation
-
- http://wordpress.org/news/2012/04/wordpress-3-3-2/
-
- MULTI
-
-
- Wordpress 3.3.1 - Multiple CSRF Vulnerabilities
-
- 18791
-
- CSRF
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- Reflected Cross-Site Scripting in WordPress 3.3
-
- http://oldmanlab.blogspot.com/2012/01/wordpress-33-xss-vulnerability.html
-
- XSS
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- wp-admin/link-manager.php Multiple Parameter SQL Injection
-
- 73723
- 17465
- 45099
-
- SQLI
- 3.1.4
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- Wordpress <= 3.1.2 Clickjacking Vulnerability
-
- http://seclists.org/fulldisclosure/2011/Sep/219
- http://www.securityfocus.com/bid/49730
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- WordPress wp-includes/formatting.php make_clickable() PCRE Library Remote DoS
-
- 72142
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-admin/press-this.php - Privilege Escalation
-
- 2011-5270
-
- UNKNOWN
- 3.0.6
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-admin/press-this.php - Privilege Escalation
-
- 2011-5270
-
- UNKNOWN
- 3.0.6
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- SQL injection vulnerability in do_trackbacks() Wordpress function
-
- 15684
-
- SQLI
-
-
- Wordpress 3.0.3 stored XSS IE7,6 NS8.1
-
- 15858
-
- XSS
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-admin/press-this.php - Privilege Escalation
-
- 2011-5270
-
- UNKNOWN
- 3.0.6
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- WordPress XML-RPC Interface Access Restriction Bypass
-
- 69761
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-admin/press-this.php - Privilege Escalation
-
- 2011-5270
-
- UNKNOWN
- 3.0.6
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- WordPress: Information Disclosure via SQL Injection Attack
-
- http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/
-
- SQLI
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-admin/press-this.php - Privilege Escalation
-
- 2011-5270
-
- UNKNOWN
- 3.0.6
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 104693
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-admin/press-this.php - Privilege Escalation
-
- 2011-5270
-
- UNKNOWN
- 3.0.6
-
-
- Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php
-
- 2012-6633
-
- XSS
- 3.3.3
-
-
- wp-admin/media-upload.php sensitive information disclosure or bypass
-
- 2012-6634
-
- MULTI
- 3.3.3
-
-
- wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
-
- 2012-6635
-
- UNKNOWN
- 3.3.3
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 104691
- 2010-5297
-
- AUTHBYPASS
- 3.0.1
-
-
- Crafted String URL Redirect Restriction Bypass
-
- 97212
- 2013-4339
- 54803
- 28958
- http://packetstormsecurity.com/files/123589/
- http://core.trac.wordpress.org/changeset/25323
- http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/91609
-
- REDIRECT
- 3.6.1
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 104693
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.9 Failure to Restrict URL Access
-
- 11441
-
- UNKNOWN
-
-
- Wordpress DOS <= 2.9
-
- 11441
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress <= 2.8.5 Unrestricted File Upload Arbitrary PHP Code Execution
-
- 10089
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- Wordpress <= 2.8.3 Remote Admin Reset Password Vulnerability
-
- 9410
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- Wordpress 2.8.1 (url) Remote Cross Site Scripting Exploit
-
- 9250
-
- XSS
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit
-
- 6421
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- Wordpress 2.5 Cookie Integrity Protection Vulnerability
-
- http://www.securityfocus.com/archive/1/archive/1/491356/100/0/threaded
- 2008-1930
-
- UNKNOWN
-
-
- XSS vulnerability in swfupload in WordPress
-
- http://seclists.org/fulldisclosure/2012/Nov/51
-
- XSS
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- Wordpress <= 2.3.1 Charset Remote SQL Injection Vulnerability
-
- 4721
-
- SQLI
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- WordPress 2.2 (wp-app.php) Arbitrary File Upload Exploit
-
- 4113
-
- UNKNOWN
-
-
- Wordpress 2.2 (xmlrpc.php) Remote SQL Injection Exploit
-
- 4039
-
- SQLI
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- Wordpress 2.1.3 admin-ajax.php SQL Injection Blind Fishing Exploit
-
- 3960
-
- SQLI
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- WordPress "year" Cross-Site Scripting Vulnerability
-
- 24485
- http://www.securityfocus.com/archive/1/archive/1/462374/100/0/threaded
-
- XSS
-
-
- Wordpress 2.1.2 (xmlrpc) Remote SQL Injection Exploit
-
- 3656
-
- SQLI
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- WordPress Command Execution and PHP Injection
-
- 2007-1277
- 24374
- http://www.securityfocus.com/bid/22797
- http://xforce.iss.net/xforce/xfdb/32807
-
- RCE
- 2.1.2
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- Wordpress <= 2.0.6 wp-trackback.php Remote SQL Injection Exploit
-
- 3109
-
- SQLI
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- Wordpress 2.0.5 Trackback UTF-7 Remote SQL Injection Exploit
-
- 3095
-
- SQLI
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- WordPress 2.0.2 - 2.0.4 Paged Parameter SQL Injection Vulnerability
-
- http://www.securityfocus.com/bid/18779
-
- SQLI
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- WordPress 2.0.2 - 2.0.4 Paged Parameter SQL Injection Vulnerability
-
- http://www.securityfocus.com/bid/18779
-
- SQLI
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- WordPress <= 2.0.2 (cache) Remote Shell Injection Exploit
-
- 6
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- WordPress 2.0.2 - 2.0.4 Paged Parameter SQL Injection Vulnerability
-
- http://www.securityfocus.com/bid/18779
-
- SQLI
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- Wordpress wp-register.php Multiple Parameter XSS
-
- 38577
-
- XSS
- 2.0.2
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- Wordpress wp-register.php Multiple Parameter XSS
-
- 38577
-
- XSS
- 2.0.2
-
-
- WordPress 2.0 - 2.7.1 admin.php Module Configuration Security Bypass Vulnerability
-
- http://www.securityfocus.com/bid/35584/
-
- UNKNOWN
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
- wp-includes/comment.php bypass intended spam restrictions via a crafted URL
-
- 2010-5293
-
- UNKNOWN
- 3.0.2
-
-
- Multiple cross-site scripting (XSS) in the request_filesystem_credentials function in wp-admin/includes/file.php
-
- 2010-5294
-
- XSS
- 3.0.2
-
-
- Cross-site scripting (XSS) in wp-admin/plugins.php
-
- 2010-5295
-
- XSS
- 3.0.2
-
-
- wp-includes/capabilities.php Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5296
-
- AUTHBYPASS
- 3.0.2
-
-
- Remote Authenticated Administrator Bypass Intended Access Restrictions via a Delete Action
-
- 2010-5297
-
- AUTHBYPASS
- 3.0
-
-
-
-
-
- Wordpress wp-register.php Multiple Parameter XSS
-
- 38577
-
- XSS
- 2.0.2
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
-
-
-
- Wordpress wp-register.php Multiple Parameter XSS
-
- 38577
-
- XSS
- 2.0.2
-
-
- Wordpress <= 1.5.1.3 Remote Code Execution eXploit (metasploit)
-
- 1145
-
- SQLI
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
-
-
-
- Wordpress wp-register.php Multiple Parameter XSS
-
- 38577
-
- XSS
- 2.0.2
-
-
- Wordpress <= 1.5.1.2 xmlrpc Interface SQL Injection Exploit
-
- 17636
- 17637
- 17638
- 17639
- 17640
- 17641
- 2005-2108
- 1077
- 15831
- 15898
-
- SQLI
- 1.5.1.3
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
-
-
-
- Wordpress wp-register.php Multiple Parameter XSS
-
- 38577
-
- XSS
- 2.0.2
-
-
- WordPress <= 1.5.1.1 "add new admin" SQL Injection Exploit
-
- 1059
-
- SQLI
-
-
- WordPress <= 1.5.1.1 SQL Injection Exploit
-
- 1033
-
- SQLI
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
-
-
-
- Wordpress wp-register.php Multiple Parameter XSS
-
- 38577
-
- XSS
- 2.0.2
-
-
- XMLRPC Pingback API Internal/External Port Scanning
-
- https://github.com/FireFart/WordpressPingbackPortScanner
-
- UNKNOWN
-
-
- WordPress XMLRPC pingback additional issues
-
- http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
-
- UNKNOWN
-
-
-
-
-
- WordPress wp-trackback.php tb_id Parameter SQL Injection
-
- 2005-1687
- 16701
- 16702
- 16703
-
- SQLI
- 1.5.1
-
-
- WordPress post.php p Parameter XSS
-
- 16702
- 16701
- 16703
-
- XSS
- 1.5.1
-
-
- WordPress Multiple Script Direct Request Path Disclosure
-
- 2005-1688
- 16703
- 16701
- 16702
-
- UNKNOWN
- 1.5.1
-
-
- WordPress Cross-Site Scripting and SQL Injection Vulnerabilities
-
- 16478
- 15324
-
- MULTI
- 1.5.1
-
-
- WordPress template-functions-post.php Multiple Field XSS
-
- 2005-1102
- 15643
-
- XSS
-
-
-
-
diff --git a/lib/common/collections/wp_items/detectable.rb b/lib/common/collections/wp_items/detectable.rb
index c0497eaa..f67b143b 100755
--- a/lib/common/collections/wp_items/detectable.rb
+++ b/lib/common/collections/wp_items/detectable.rb
@@ -142,16 +142,17 @@ class WpItems < Array
# @return [ Array ]
def vulnerable_targets_items(wp_target, item_class, vulns_file)
targets = []
- xml = xml(vulns_file)
+ json = json(vulns_file)
- xml.xpath(item_xpath).each do |node|
+ [*json].each do |item|
targets << create_item(
item_class,
- node.attribute('name').text,
+ item.keys.inject,
wp_target,
vulns_file
)
end
+
targets
end
@@ -190,6 +191,7 @@ class WpItems < Array
)
end
end
+
targets
end
diff --git a/lib/common/collections/wp_plugins/detectable.rb b/lib/common/collections/wp_plugins/detectable.rb
index 5a3e0ef9..5ae84ade 100644
--- a/lib/common/collections/wp_plugins/detectable.rb
+++ b/lib/common/collections/wp_plugins/detectable.rb
@@ -9,9 +9,9 @@ class WpPlugins < WpItems
end
# @return [ String ]
- def item_xpath
- '//plugin'
- end
+ # def item_xpath
+ # '//plugin'
+ # end
# @param [ WpTarget ] wp_target
# @param [ Hash ] options
diff --git a/lib/common/collections/wp_themes/detectable.rb b/lib/common/collections/wp_themes/detectable.rb
index b9b86cbd..a2c3e594 100644
--- a/lib/common/collections/wp_themes/detectable.rb
+++ b/lib/common/collections/wp_themes/detectable.rb
@@ -9,9 +9,9 @@ class WpThemes < WpItems
end
# @return [ String ]
- def item_xpath
- '//theme'
- end
+ # def item_xpath
+ # '//theme'
+ # end
end
end
diff --git a/lib/common/common_helper.rb b/lib/common/common_helper.rb
index 55e52479..38b4e0d7 100644
--- a/lib/common/common_helper.rb
+++ b/lib/common/common_helper.rb
@@ -22,14 +22,14 @@ WPSTOOLS_PLUGINS_DIR = File.join(WPSTOOLS_LIB_DIR, 'plugins')
# Data files
PLUGINS_FILE = File.join(DATA_DIR, 'plugins.txt')
PLUGINS_FULL_FILE = File.join(DATA_DIR, 'plugins_full.txt')
-PLUGINS_VULNS_FILE = File.join(DATA_DIR, 'plugin_vulns.xml')
+PLUGINS_VULNS_FILE = File.join(DATA_DIR, 'plugin_vulns.json')
THEMES_FILE = File.join(DATA_DIR, 'themes.txt')
THEMES_FULL_FILE = File.join(DATA_DIR, 'themes_full.txt')
-THEMES_VULNS_FILE = File.join(DATA_DIR, 'theme_vulns.xml')
-WP_VULNS_FILE = File.join(DATA_DIR, 'wp_vulns.xml')
+THEMES_VULNS_FILE = File.join(DATA_DIR, 'theme_vulns.json')
+WP_VULNS_FILE = File.join(DATA_DIR, 'wp_vulns.json')
WP_VERSIONS_FILE = File.join(DATA_DIR, 'wp_versions.xml')
LOCAL_FILES_FILE = File.join(DATA_DIR, 'local_vulnerable_files.xml')
-VULNS_XSD = File.join(DATA_DIR, 'vuln.xsd')
+# VULNS_XSD = File.join(DATA_DIR, 'vuln.xsd')
WP_VERSIONS_XSD = File.join(DATA_DIR, 'wp_versions.xsd')
LOCAL_FILES_XSD = File.join(DATA_DIR, 'local_vulnerable_files.xsd')
USER_AGENTS_FILE = File.join(DATA_DIR, 'user-agents.txt')
@@ -54,7 +54,7 @@ require 'environment'
def require_files_from_directory(absolute_dir_path, files_pattern = '*.rb')
files = Dir[File.join(absolute_dir_path, files_pattern)]
- # Files in the root dir are loaded first, then thoses in the subdirectories
+ # Files in the root dir are loaded first, then those in the subdirectories
files.sort_by { |file| [file.count("/"), file] }.each do |f|
f = File.expand_path(f)
#puts "require #{f}" # Used for debug
@@ -64,14 +64,6 @@ end
require_files_from_directory(COMMON_LIB_DIR, '**/*.rb')
-# Hook to check if the target if down during the scan
-# The target is considered down after 10 requests with status = 0
-down = 0
-Typhoeus.on_complete do |response|
- down += 1 if response.code == 0
- fail 'The target seems to be down' if down >= 10
-end
-
# Add protocol
def add_http_protocol(url)
url =~ /^https?:/ ? url : "http://#{url}"
@@ -153,6 +145,17 @@ def xml(file)
end
end
+def json(file)
+ content = File.open(file).read
+
+ begin
+ JSON.parse(content)
+ rescue => e
+ puts "[ERROR] In JSON file parsing #{file} #{e}"
+ raise
+ end
+end
+
def redefine_constant(constant, value)
Object.send(:remove_const, constant)
Object.const_set(constant, value)
diff --git a/lib/common/models/vulnerability.rb b/lib/common/models/vulnerability.rb
index 371bf71f..f7c4a3ce 100755
--- a/lib/common/models/vulnerability.rb
+++ b/lib/common/models/vulnerability.rb
@@ -35,27 +35,23 @@ class Vulnerability
end
# :nocov:
- # Create the Vulnerability from the xml_node
+ # Create the Vulnerability from the json_item
#
- # @param [ Nokogiri::XML::Node ] xml_node
+ # @param [ Hash ] json_item
#
# @return [ Vulnerability ]
- def self.load_from_xml_node(xml_node)
+ def self.load_from_json_item(json_item)
references = {}
- refs = xml_node.search('references')
- if refs
- references[:url] = refs.search('url').map(&:text)
- references[:cve] = refs.search('cve').map(&:text)
- references[:secunia] = refs.search('secunia').map(&:text)
- references[:osvdb] = refs.search('osvdb').map(&:text)
- references[:metasploit] = refs.search('metasploit').map(&:text)
- references[:exploitdb] = refs.search('exploitdb').map(&:text)
+
+ [:url, :cve, :secunia, :osvdb, :metasploit, :exploitdb].each do |key|
+ references[key] = json_item[key.to_s].split(',') if json_item[key.to_s]
end
+
new(
- xml_node.search('title').text,
- xml_node.search('type').text,
+ json_item['title'],
+ json_item['type'],
references,
- xml_node.search('fixed_in').text,
+ json_item['fixed_in'],
)
end
diff --git a/lib/common/models/vulnerability/output.rb b/lib/common/models/vulnerability/output.rb
index feb3ed3c..cd223e6c 100644
--- a/lib/common/models/vulnerability/output.rb
+++ b/lib/common/models/vulnerability/output.rb
@@ -14,7 +14,7 @@ class Vulnerability
puts " Reference: #{url}" if url
end
end
- if !fixed_in.empty?
+ if !fixed_in.nil?
puts "#{blue('[i]')} Fixed in: #{fixed_in}"
end
end
diff --git a/lib/common/models/wp_item/vulnerable.rb b/lib/common/models/wp_item/vulnerable.rb
index 1df737e4..37b33aa7 100755
--- a/lib/common/models/wp_item/vulnerable.rb
+++ b/lib/common/models/wp_item/vulnerable.rb
@@ -2,22 +2,27 @@
class WpItem
module Vulnerable
- attr_accessor :vulns_file, :vulns_xpath
+ attr_accessor :vulns_file, :identifier
# Get the vulnerabilities associated to the WpItem
# Filters out already fixed vulnerabilities
#
# @return [ Vulnerabilities ]
def vulnerabilities
- xml = xml(vulns_file)
+ json = json(vulns_file)
vulnerabilities = Vulnerabilities.new
- xml.xpath(vulns_xpath).each do |node|
- vuln = Vulnerability.load_from_xml_node(node)
- if vulnerable_to?(vuln)
- vulnerabilities << vuln
+ json.each do |item|
+ asset = item[identifier]
+
+ if asset
+ asset['vulnerabilities'].each do |vulnerability|
+ vulnerability = Vulnerability.load_from_json_item(vulnerability)
+ vulnerabilities << vulnerability if vulnerable_to?(vulnerability)
+ end
end
end
+
vulnerabilities
end
@@ -41,5 +46,4 @@ class WpItem
return false
end
end
-
end
diff --git a/lib/common/models/wp_plugin/vulnerable.rb b/lib/common/models/wp_plugin/vulnerable.rb
index b43026b8..1d994d62 100644
--- a/lib/common/models/wp_plugin/vulnerable.rb
+++ b/lib/common/models/wp_plugin/vulnerable.rb
@@ -12,8 +12,8 @@ class WpPlugin < WpItem
end
# @return [ String ]
- def vulns_xpath
- "//plugin[@name='#{@name}']/vulnerability"
+ def identifier
+ @name
end
end
diff --git a/lib/common/models/wp_theme/vulnerable.rb b/lib/common/models/wp_theme/vulnerable.rb
index 47e45741..756f547a 100644
--- a/lib/common/models/wp_theme/vulnerable.rb
+++ b/lib/common/models/wp_theme/vulnerable.rb
@@ -12,9 +12,8 @@ class WpTheme < WpItem
end
# @return [ String ]
- def vulns_xpath
- "//theme[@name='#{@name}']/vulnerability"
+ def identifier
+ @name
end
-
end
end
diff --git a/lib/common/models/wp_version/vulnerable.rb b/lib/common/models/wp_version/vulnerable.rb
index dc2b5dd0..6de10428 100644
--- a/lib/common/models/wp_version/vulnerable.rb
+++ b/lib/common/models/wp_version/vulnerable.rb
@@ -12,9 +12,14 @@ class WpVersion < WpItem
end
# @return [ String ]
- def vulns_xpath
- "//wordpress[@version='#{@number}']/vulnerability"
- end
+ def identifier
+ @number
+ end
+
+ # @return [ String ]
+ # def vulns_xpath
+ # "//wordpress[@version='#{@number}']/vulnerability"
+ # end
end
end
diff --git a/lib/wpscan/wpscan_helper.rb b/lib/wpscan/wpscan_helper.rb
index f0e591d0..8757e6f7 100644
--- a/lib/wpscan/wpscan_helper.rb
+++ b/lib/wpscan/wpscan_helper.rb
@@ -108,3 +108,11 @@ def help
puts '--verbose | -v Verbose output.'
puts
end
+
+# Hook to check if the target if down during the scan
+# The target is considered down after 10 requests with status = 0
+down = 0
+Typhoeus.on_complete do |response|
+ down += 1 if response.code == 0
+ fail 'The target seems to be down' if down >= 10
+end
diff --git a/lib/wpstools/plugins/checker/checker_plugin.rb b/lib/wpstools/plugins/checker/checker_plugin.rb
index 67f6b531..8a139338 100644
--- a/lib/wpstools/plugins/checker/checker_plugin.rb
+++ b/lib/wpstools/plugins/checker/checker_plugin.rb
@@ -29,11 +29,18 @@ class CheckerPlugin < Plugin
puts '[+] Checking vulnerabilities reference urls'
vuln_ref_files.each do |vuln_ref_file|
- xml = xml(vuln_ref_file)
+ json = json(vuln_ref_file)
urls = []
- xml.xpath('//references/url').each { |node| urls << node.text }
-
+ json.each do |asset|
+ asset[asset.keys.inject]['vulnerabilities'].each do |url|
+ unless url['url'].nil?
+ url['url'].split(',').each do |url|
+ urls << url
+ end
+ end
+ end
+ end
urls.uniq!
puts "[!] No URLs found in #{vuln_ref_file}!" if urls.empty?
diff --git a/lib/wpstools/plugins/stats/stats_plugin.rb b/lib/wpstools/plugins/stats/stats_plugin.rb
index a48a93b9..7c4bd32c 100644
--- a/lib/wpstools/plugins/stats/stats_plugin.rb
+++ b/lib/wpstools/plugins/stats/stats_plugin.rb
@@ -48,38 +48,39 @@ class StatsPlugin < Plugin
end
def vuln_core_count(file=WP_VULNS_FILE)
- xml(file).xpath('count(//wordpress)').to_i
+ json(file).size
end
def vuln_plugin_count(file=PLUGINS_VULNS_FILE)
- xml(file).xpath('count(//plugin)').to_i
+ json(file).size
end
def vuln_theme_count(file=THEMES_VULNS_FILE)
- xml(file).xpath('count(//theme)').to_i
+ json(file).size
end
def version_vulns_count(file=WP_VULNS_FILE)
- xml(file).xpath('count(//vulnerability)').to_i
+ asset_vulns_count(json(file))
end
+
def fix_version_count(file=WP_VULNS_FILE)
- xml(file).xpath('count(//fixed_in)').to_i
+ asset_fixed_in_count(json(file))
end
def plugin_vulns_count(file=PLUGINS_VULNS_FILE)
- xml(file).xpath('count(//vulnerability)').to_i
+ asset_vulns_count(json(file))
end
def fix_plugin_count(file=PLUGINS_VULNS_FILE)
- xml(file).xpath('count(//fixed_in)').to_i
+ asset_fixed_in_count(json(file))
end
def theme_vulns_count(file=THEMES_VULNS_FILE)
- xml(file).xpath('count(//vulnerability)').to_i
+ asset_vulns_count(json(file))
end
def fix_theme_count(file=THEMES_VULNS_FILE)
- xml(file).xpath('count(//fixed_in)').to_i
+ asset_fixed_in_count(json(file))
end
def total_plugins(file=PLUGINS_FULL_FILE)
@@ -94,4 +95,12 @@ class StatsPlugin < Plugin
IO.readlines(file).size
end
+ def asset_vulns_count(json)
+ json.map { |asset| asset[asset.keys.inject]['vulnerabilities'].size }.inject(:+)
+ end
+
+ def asset_fixed_in_count(json)
+ json.map { |asset| asset[asset.keys.inject]['vulnerabilities'].map {|a| a['fixed_in'].nil? ? 0 : 1 }.inject(:+) }.inject(:+)
+ end
+
end
diff --git a/spec/json_checks_spec.rb b/spec/json_checks_spec.rb
new file mode 100644
index 00000000..42cae84c
--- /dev/null
+++ b/spec/json_checks_spec.rb
@@ -0,0 +1,45 @@
+# encoding: UTF-8
+
+require 'spec_helper'
+
+describe 'JSON checks' do
+
+ after :each do
+ expect(FileTest.exists?(@file)).to be_truthy
+ expect { JSON.parse(File.open(@file).read) }.not_to raise_error
+ end
+
+ it 'check plugin_vulns.json for syntax errors' do
+ @file = PLUGINS_VULNS_FILE
+ end
+
+ it 'check theme_vulns.json for syntax errors' do
+ @file = THEMES_VULNS_FILE
+ end
+
+ it 'check wp_vulns.json for syntax errors' do
+ @file = WP_VULNS_FILE
+ end
+end
+
+describe 'JSON content' do
+ before :all do
+ @vuln_plugins = json(PLUGINS_VULNS_FILE)
+ @vuln_themes = json(THEMES_VULNS_FILE)
+ @vulnerabilities = @vuln_plugins + @vuln_themes
+ end
+
+ after :each do
+ expect(@result.size).to eq(0), "Items:\n#{@result.join("\n")}"
+ end
+
+ it 'each asset vuln needs a title node' do
+ @result = []
+
+ @vulnerabilities.each do |plugin|
+ plugin[plugin.keys.inject]['vulnerabilities'].each do |vulnerability|
+ @result << vulnerability['title'] if vulnerability['title'].nil?
+ end
+ end
+ end
+end
diff --git a/spec/lib/common/models/vulnerability_spec.rb b/spec/lib/common/models/vulnerability_spec.rb
index 1da05258..8a2776d7 100644
--- a/spec/lib/common/models/vulnerability_spec.rb
+++ b/spec/lib/common/models/vulnerability_spec.rb
@@ -30,10 +30,10 @@ describe Vulnerability do
end
- describe '::load_from_xml_node' do
- subject(:vulnerability) { Vulnerability.load_from_xml_node(node) }
- let(:node) {
- xml(MODELS_FIXTURES + '/vulnerability/xml_node.xml').xpath('//vulnerability')
+ describe '::load_from_json_item' do
+ subject(:vulnerability) { Vulnerability.load_from_json_item(item) }
+ let(:item) {
+ json(MODELS_FIXTURES + '/vulnerability/json_item.json')
}
expected_refs = {
diff --git a/spec/lib/common/models/wp_item_spec.rb b/spec/lib/common/models/wp_item_spec.rb
index 9ed42e39..9b4342c7 100644
--- a/spec/lib/common/models/wp_item_spec.rb
+++ b/spec/lib/common/models/wp_item_spec.rb
@@ -11,8 +11,8 @@ describe WpItem do
end
it_behaves_like 'WpItem::Versionable'
it_behaves_like 'WpItem::Vulnerable' do
- let(:vulns_file) { MODELS_FIXTURES + '/wp_item/vulnerable/items_vulns.xml' }
- let(:vulns_xpath) { "//item[@name='neo']/vulnerability" }
+ let(:vulns_file) { MODELS_FIXTURES + '/wp_item/vulnerable/items_vulns.json' }
+ let(:identifier) { 'neo' }
let(:expected_refs) { {
:url => ['Ref 1', 'Ref 2'],
:cve => ['2011-001'],
diff --git a/spec/lib/common/models/wp_plugin_spec.rb b/spec/lib/common/models/wp_plugin_spec.rb
index 87e07d28..2e4837c9 100644
--- a/spec/lib/common/models/wp_plugin_spec.rb
+++ b/spec/lib/common/models/wp_plugin_spec.rb
@@ -6,7 +6,7 @@ describe WpPlugin do
it_behaves_like 'WpPlugin::Vulnerable'
it_behaves_like 'WpItem::Vulnerable' do
let(:options) { { name: 'white-rabbit' } }
- let(:vulns_file) { MODELS_FIXTURES + '/wp_plugin/vulnerable/plugins_vulns.xml' }
+ let(:vulns_file) { MODELS_FIXTURES + '/wp_plugin/vulnerable/plugins_vulns.json' }
let(:expected_refs) { {
:url => ['Ref 1', 'Ref 2'],
:cve => ['2011-001'],
diff --git a/spec/lib/common/models/wp_theme_spec.rb b/spec/lib/common/models/wp_theme_spec.rb
index 4c0c7613..a88faaaf 100644
--- a/spec/lib/common/models/wp_theme_spec.rb
+++ b/spec/lib/common/models/wp_theme_spec.rb
@@ -7,7 +7,7 @@ describe WpTheme do
it_behaves_like 'WpTheme::Vulnerable'
it_behaves_like 'WpItem::Vulnerable' do
let(:options) { { name: 'the-oracle' } }
- let(:vulns_file) { MODELS_FIXTURES + '/wp_theme/vulnerable/themes_vulns.xml' }
+ let(:vulns_file) { MODELS_FIXTURES + '/wp_theme/vulnerable/themes_vulns.json' }
let(:expected_refs) { {
:url => ['Ref 1', 'Ref 2'],
:cve => ['2011-001'],
diff --git a/spec/lib/common/models/wp_version_spec.rb b/spec/lib/common/models/wp_version_spec.rb
index 01621113..cbd94410 100644
--- a/spec/lib/common/models/wp_version_spec.rb
+++ b/spec/lib/common/models/wp_version_spec.rb
@@ -6,7 +6,7 @@ describe WpVersion do
it_behaves_like 'WpVersion::Vulnerable'
it_behaves_like 'WpItem::Vulnerable' do
let(:options) { { number: '3.2' } }
- let(:vulns_file) { MODELS_FIXTURES + '/wp_version/vulnerable/versions_vulns.xml' }
+ let(:vulns_file) { MODELS_FIXTURES + '/wp_version/vulnerable/versions_vulns.json' }
let(:expected_refs) { {
:url => ['Ref 1', 'Ref 2'],
:cve => ['2011-001'],
diff --git a/spec/lib/wpstools/plugins/stats/stats_plugin_spec.rb b/spec/lib/wpstools/plugins/stats/stats_plugin_spec.rb
index 18d59f25..a64ca324 100644
--- a/spec/lib/wpstools/plugins/stats/stats_plugin_spec.rb
+++ b/spec/lib/wpstools/plugins/stats/stats_plugin_spec.rb
@@ -4,8 +4,8 @@ require File.expand_path(File.dirname(__FILE__) + '/../../wpstools_helper')
describe 'StatsPlugin' do
subject(:stats) { StatsPlugin.new }
- let(:plugins_vulns) { MODELS_FIXTURES + '/wp_plugin/vulnerable/plugins_vulns.xml' }
- let(:themes_vulns) { MODELS_FIXTURES + '/wp_theme/vulnerable/themes_vulns.xml' }
+ let(:plugins_vulns) { MODELS_FIXTURES + '/wp_plugin/vulnerable/plugins_vulns.json' }
+ let(:themes_vulns) { MODELS_FIXTURES + '/wp_theme/vulnerable/themes_vulns.json' }
let(:plugins_file) { COLLECTIONS_FIXTURES + '/wp_plugins/detectable/targets.txt' }
let(:themes_file) { COLLECTIONS_FIXTURES + '/wp_themes/detectable/targets.txt'}
diff --git a/spec/samples/common/collections/wp_items/detectable/vulns.json b/spec/samples/common/collections/wp_items/detectable/vulns.json
new file mode 100644
index 00000000..fa7b920d
--- /dev/null
+++ b/spec/samples/common/collections/wp_items/detectable/vulns.json
@@ -0,0 +1,58 @@
+[
+ {
+ "mr-smith":{
+ "vulnerabilities":[
+ {
+ "id":2989,
+ "title":"Administrator-exploitable blind SQLi in WordPress 1.0 - 3.8.1",
+ "references":"https://security.dxw.com/advisories/sqli-in-wordpress-3-6-1/,http://www.example.com",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:43:41.000Z"
+ },
+ {
+ "id":2990,
+ "title":"Potential Authentication Cookie Forgery",
+ "references":"https://labs.mwrinfosecurity.com/blog/2014/04/11/wordpress-auth-cookie-forgery/,https://github.com/WordPress/WordPress/commit/78a915e0e5927cf413aa6c2cef2fca3dc587f8be",
+ "osvdb":"105620",
+ "cve":"2014-0166",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z",
+ "fixed_in":"3.8.2"
+ },
+ {
+ "id":2991,
+ "title":"Privilege escalation: contributors publishing posts",
+ "references":"https://github.com/wpscanteam/wpscan/wiki/CVE-2014-0165",
+ "osvdb":"105630",
+ "cve":"2014-0165",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z",
+ "fixed_in":"3.8.2"
+ },
+ {
+ "id":2992,
+ "title":"Plupload Unspecified XSS",
+ "osvdb":"105622",
+ "secunia":"57769",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z",
+ "fixed_in":"3.8.2"
+ }
+ ]
+ }
+ },
+ {
+ "neo":{
+ "vulnerabilities":[
+ {
+ "id":2993,
+ "title":"wp-admin/options-writing.php Cleartext Admin Credentials Disclosure",
+ "references":"http://seclists.org/fulldisclosure/2013/Dec/135",
+ "osvdb":"101101",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z"
+ }
+ ]
+ }
+ }
+]
\ No newline at end of file
diff --git a/spec/samples/common/collections/wp_items/detectable/vulns.xml b/spec/samples/common/collections/wp_items/detectable/vulns.xml
deleted file mode 100644
index b2c0cffc..00000000
--- a/spec/samples/common/collections/wp_items/detectable/vulns.xml
+++ /dev/null
@@ -1,7 +0,0 @@
-
-
-
-
-
-
-
diff --git a/spec/samples/common/collections/wp_plugins/detectable/vulns.json b/spec/samples/common/collections/wp_plugins/detectable/vulns.json
new file mode 100644
index 00000000..fa7b920d
--- /dev/null
+++ b/spec/samples/common/collections/wp_plugins/detectable/vulns.json
@@ -0,0 +1,58 @@
+[
+ {
+ "mr-smith":{
+ "vulnerabilities":[
+ {
+ "id":2989,
+ "title":"Administrator-exploitable blind SQLi in WordPress 1.0 - 3.8.1",
+ "references":"https://security.dxw.com/advisories/sqli-in-wordpress-3-6-1/,http://www.example.com",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:43:41.000Z"
+ },
+ {
+ "id":2990,
+ "title":"Potential Authentication Cookie Forgery",
+ "references":"https://labs.mwrinfosecurity.com/blog/2014/04/11/wordpress-auth-cookie-forgery/,https://github.com/WordPress/WordPress/commit/78a915e0e5927cf413aa6c2cef2fca3dc587f8be",
+ "osvdb":"105620",
+ "cve":"2014-0166",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z",
+ "fixed_in":"3.8.2"
+ },
+ {
+ "id":2991,
+ "title":"Privilege escalation: contributors publishing posts",
+ "references":"https://github.com/wpscanteam/wpscan/wiki/CVE-2014-0165",
+ "osvdb":"105630",
+ "cve":"2014-0165",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z",
+ "fixed_in":"3.8.2"
+ },
+ {
+ "id":2992,
+ "title":"Plupload Unspecified XSS",
+ "osvdb":"105622",
+ "secunia":"57769",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z",
+ "fixed_in":"3.8.2"
+ }
+ ]
+ }
+ },
+ {
+ "neo":{
+ "vulnerabilities":[
+ {
+ "id":2993,
+ "title":"wp-admin/options-writing.php Cleartext Admin Credentials Disclosure",
+ "references":"http://seclists.org/fulldisclosure/2013/Dec/135",
+ "osvdb":"101101",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z"
+ }
+ ]
+ }
+ }
+]
\ No newline at end of file
diff --git a/spec/samples/common/collections/wp_plugins/detectable/vulns.xml b/spec/samples/common/collections/wp_plugins/detectable/vulns.xml
deleted file mode 100644
index 32775f31..00000000
--- a/spec/samples/common/collections/wp_plugins/detectable/vulns.xml
+++ /dev/null
@@ -1,7 +0,0 @@
-
-
-
-
-
-
-
diff --git a/spec/samples/common/collections/wp_themes/detectable/vulns.json b/spec/samples/common/collections/wp_themes/detectable/vulns.json
new file mode 100644
index 00000000..80a614e5
--- /dev/null
+++ b/spec/samples/common/collections/wp_themes/detectable/vulns.json
@@ -0,0 +1,58 @@
+[
+ {
+ "shopperpress":{
+ "vulnerabilities":[
+ {
+ "id":2989,
+ "title":"Administrator-exploitable blind SQLi in WordPress 1.0 - 3.8.1",
+ "references":"https://security.dxw.com/advisories/sqli-in-wordpress-3-6-1/,http://www.example.com",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:43:41.000Z"
+ },
+ {
+ "id":2990,
+ "title":"Potential Authentication Cookie Forgery",
+ "references":"https://labs.mwrinfosecurity.com/blog/2014/04/11/wordpress-auth-cookie-forgery/,https://github.com/WordPress/WordPress/commit/78a915e0e5927cf413aa6c2cef2fca3dc587f8be",
+ "osvdb":"105620",
+ "cve":"2014-0166",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z",
+ "fixed_in":"3.8.2"
+ },
+ {
+ "id":2991,
+ "title":"Privilege escalation: contributors publishing posts",
+ "references":"https://github.com/wpscanteam/wpscan/wiki/CVE-2014-0165",
+ "osvdb":"105630",
+ "cve":"2014-0165",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z",
+ "fixed_in":"3.8.2"
+ },
+ {
+ "id":2992,
+ "title":"Plupload Unspecified XSS",
+ "osvdb":"105622",
+ "secunia":"57769",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z",
+ "fixed_in":"3.8.2"
+ }
+ ]
+ }
+ },
+ {
+ "webfolio":{
+ "vulnerabilities":[
+ {
+ "id":2993,
+ "title":"wp-admin/options-writing.php Cleartext Admin Credentials Disclosure",
+ "references":"http://seclists.org/fulldisclosure/2013/Dec/135",
+ "osvdb":"101101",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z"
+ }
+ ]
+ }
+ }
+]
diff --git a/spec/samples/common/collections/wp_themes/detectable/vulns.xml b/spec/samples/common/collections/wp_themes/detectable/vulns.xml
deleted file mode 100644
index 2e34059c..00000000
--- a/spec/samples/common/collections/wp_themes/detectable/vulns.xml
+++ /dev/null
@@ -1,7 +0,0 @@
-
-
-
-
-
-
-
diff --git a/spec/samples/common/models/vulnerability/json_item.json b/spec/samples/common/models/vulnerability/json_item.json
new file mode 100644
index 00000000..46b4fdfe
--- /dev/null
+++ b/spec/samples/common/models/vulnerability/json_item.json
@@ -0,0 +1,14 @@
+{
+ "id": "3911",
+ "title": "Vuln Title",
+ "url": "Ref 1,Ref 2",
+ "secunia": "secunia",
+ "osvdb": "osvdb",
+ "cve": "2011-001",
+ "metasploit": "exploit/ex1",
+ "exploitdb": "exploitdb",
+ "created_at": "2014-07-28T12:10:45.000Z",
+ "updated_at": "2014-07-28T12:10:45.000Z",
+ "type": "CSRF",
+ "fixed_in": "1.0"
+}
diff --git a/spec/samples/common/models/vulnerability/xml_node.xml b/spec/samples/common/models/vulnerability/xml_node.xml
deleted file mode 100644
index e409046b..00000000
--- a/spec/samples/common/models/vulnerability/xml_node.xml
+++ /dev/null
@@ -1,14 +0,0 @@
-
- Vuln Title
-
- exploit/ex1
- Ref 1
- Ref 2
- 2011-001
- secunia
- osvdb
- exploitdb
-
- CSRF
- 1.0
-
diff --git a/spec/samples/common/models/wp_item/vulnerable/empty.json b/spec/samples/common/models/wp_item/vulnerable/empty.json
new file mode 100644
index 00000000..9e26dfee
--- /dev/null
+++ b/spec/samples/common/models/wp_item/vulnerable/empty.json
@@ -0,0 +1 @@
+{}
\ No newline at end of file
diff --git a/spec/samples/common/models/wp_item/vulnerable/empty.xml b/spec/samples/common/models/wp_item/vulnerable/empty.xml
deleted file mode 100644
index 52d2d974..00000000
--- a/spec/samples/common/models/wp_item/vulnerable/empty.xml
+++ /dev/null
@@ -1,5 +0,0 @@
-
-
-
-
-
diff --git a/spec/samples/common/models/wp_item/vulnerable/items_vulns.json b/spec/samples/common/models/wp_item/vulnerable/items_vulns.json
new file mode 100644
index 00000000..46ae9b2c
--- /dev/null
+++ b/spec/samples/common/models/wp_item/vulnerable/items_vulns.json
@@ -0,0 +1,35 @@
+[
+ {
+ "not-this-one":{
+ "vulnerabilities":[
+ {
+ "id":2989,
+ "title":"Administrator-exploitable blind SQLi in WordPress 1.0 - 3.8.1",
+ "url":"https://security.dxw.com/advisories/sqli-in-wordpress-3-6-1/,http://www.example.com",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:43:41.000Z"
+ }
+ ]
+ }
+ },
+ {
+ "neo":{
+ "vulnerabilities":[
+ {
+ "id":2993,
+ "title":"I'm the one",
+ "url":"Ref 1,Ref 2",
+ "osvdb":"osvdb",
+ "cve":"2011-001",
+ "secunia":"secunia",
+ "metasploit":"exploit/ex1",
+ "exploitdb":"exploitdb",
+ "type":"XSS",
+ "fixed_in":"",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z"
+ }
+ ]
+ }
+ }
+]
\ No newline at end of file
diff --git a/spec/samples/common/models/wp_item/vulnerable/items_vulns.xml b/spec/samples/common/models/wp_item/vulnerable/items_vulns.xml
deleted file mode 100644
index 33c853b5..00000000
--- a/spec/samples/common/models/wp_item/vulnerable/items_vulns.xml
+++ /dev/null
@@ -1,37 +0,0 @@
-
-
-
-
- -
-
- I should not appear in the results
-
- exploit/ex1
- Ref 1
- Ref 2
- 2011-001
- secunia
- osvdb
- exploitdb
-
- RFI
-
-
-
- -
-
- I'm the one
-
- exploit/ex1
- Ref 1
- Ref 2
- 2011-001
- secunia
- osvdb
- exploitdb
-
- XSS
-
-
-
-
diff --git a/spec/samples/common/models/wp_plugin/vulnerable/plugins_vulns.json b/spec/samples/common/models/wp_plugin/vulnerable/plugins_vulns.json
new file mode 100644
index 00000000..878c1692
--- /dev/null
+++ b/spec/samples/common/models/wp_plugin/vulnerable/plugins_vulns.json
@@ -0,0 +1,56 @@
+[
+ {
+ "mr-smith":{
+ "vulnerabilities":[
+ {
+ "id":2989,
+ "title":"I should not appear in the results",
+ "url":"Ref 1,Ref 2",
+ "osvdb":"osvdb",
+ "cve":"2011-001",
+ "secunia":"secunia",
+ "metasploit":"exploit/ex1",
+ "exploitdb":"exploitdb",
+ "type":"XSS",
+ "fixed_in":"",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z"
+ },
+ {
+ "id":2989,
+ "title":"Neither do I",
+ "url":"Ref 1,Ref 2",
+ "osvdb":"osvdb",
+ "cve":"2011-001",
+ "secunia":"secunia",
+ "metasploit":"exploit/ex1",
+ "exploitdb":"exploitdb",
+ "type":"XSS",
+ "fixed_in":"",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z"
+ }
+ ]
+ }
+ },
+ {
+ "white-rabbit":{
+ "vulnerabilities":[
+ {
+ "id":2993,
+ "title":"Follow me!",
+ "url":"Ref 1,Ref 2",
+ "osvdb":"osvdb",
+ "cve":"2011-001",
+ "secunia":"secunia",
+ "metasploit":"exploit/ex1",
+ "exploitdb":"exploitdb",
+ "type":"REDIRECT",
+ "fixed_in":"",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z"
+ }
+ ]
+ }
+ }
+]
diff --git a/spec/samples/common/models/wp_plugin/vulnerable/plugins_vulns.xml b/spec/samples/common/models/wp_plugin/vulnerable/plugins_vulns.xml
deleted file mode 100644
index f710c3a6..00000000
--- a/spec/samples/common/models/wp_plugin/vulnerable/plugins_vulns.xml
+++ /dev/null
@@ -1,48 +0,0 @@
-
-
-
-
-
- I should not appear in the results
-
- exploit/ex1
- Ref 1
- Ref 2
- 2011-001
- secunia
- osvdb
- exploitdb
-
- RCE
-
-
- Neither do I
-
- exploit/ex1
- Ref 1
- Ref 2
- 2011-001
- secunia
- osvdb
- exploitdb
-
- FPD
-
-
-
-
-
- Follow me!
-
- exploit/ex1
- Ref 1
- Ref 2
- 2011-001
- secunia
- osvdb
- exploitdb
-
- REDIRECT
-
-
-
diff --git a/spec/samples/common/models/wp_theme/vulnerable/themes_vulns.json b/spec/samples/common/models/wp_theme/vulnerable/themes_vulns.json
new file mode 100644
index 00000000..03a89b8a
--- /dev/null
+++ b/spec/samples/common/models/wp_theme/vulnerable/themes_vulns.json
@@ -0,0 +1,56 @@
+[
+ {
+ "mr-smith":{
+ "vulnerabilities":[
+ {
+ "id":2989,
+ "title":"I should not appear in the results",
+ "url":"Ref 1,Ref 2",
+ "osvdb":"osvdb",
+ "cve":"2011-001",
+ "secunia":"secunia",
+ "metasploit":"exploit/ex1",
+ "exploitdb":"exploitdb",
+ "type":"XSS",
+ "fixed_in":"",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z"
+ },
+ {
+ "id":2989,
+ "title":"Neither do I",
+ "url":"Ref 1,Ref 2",
+ "osvdb":"osvdb",
+ "cve":"2011-001",
+ "secunia":"secunia",
+ "metasploit":"exploit/ex1",
+ "exploitdb":"exploitdb",
+ "type":"XSS",
+ "fixed_in":"",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z"
+ }
+ ]
+ }
+ },
+ {
+ "the-oracle":{
+ "vulnerabilities":[
+ {
+ "id":2993,
+ "title":"I see you",
+ "url":"Ref 1,Ref 2",
+ "osvdb":"osvdb",
+ "cve":"2011-001",
+ "secunia":"secunia",
+ "metasploit":"exploit/ex1",
+ "exploitdb":"exploitdb",
+ "type":"FPD",
+ "fixed_in":"",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z"
+ }
+ ]
+ }
+ }
+]
diff --git a/spec/samples/common/models/wp_theme/vulnerable/themes_vulns.xml b/spec/samples/common/models/wp_theme/vulnerable/themes_vulns.xml
deleted file mode 100644
index da0e09f4..00000000
--- a/spec/samples/common/models/wp_theme/vulnerable/themes_vulns.xml
+++ /dev/null
@@ -1,48 +0,0 @@
-
-
-
-
-
- I should not appear in the results
-
- exploit/ex1
- Ref 1
- Ref 2
- 2011-001
- secunia
- osvdb
- exploitdb
-
- SQLI
-
-
- Neither do I
-
- exploit/ex1
- Ref 1
- Ref 2
- 2011-001
- secunia
- osvdb
- exploitdb
-
- XSS
-
-
-
-
-
- I see you
-
- exploit/ex1
- Ref 1
- Ref 2
- 2011-001
- secunia
- osvdb
- exploitdb
-
- FPD
-
-
-
diff --git a/spec/samples/common/models/wp_version/vulnerable/versions_vulns.json b/spec/samples/common/models/wp_version/vulnerable/versions_vulns.json
new file mode 100644
index 00000000..8ed78ed1
--- /dev/null
+++ b/spec/samples/common/models/wp_version/vulnerable/versions_vulns.json
@@ -0,0 +1,42 @@
+[
+ {
+ "3.5":{
+ "vulnerabilities":[
+ {
+ "id":2989,
+ "title":"I should not appear in the results",
+ "url":"Ref 1,Ref 2",
+ "osvdb":"osvdb",
+ "cve":"2011-001",
+ "secunia":"secunia",
+ "metasploit":"exploit/ex1",
+ "exploitdb":"exploitdb",
+ "type":"XSS",
+ "fixed_in":"",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z"
+ }
+ ]
+ }
+ },
+ {
+ "3.2":{
+ "vulnerabilities":[
+ {
+ "id":2993,
+ "title":"Here I Am",
+ "url":"Ref 1,Ref 2",
+ "osvdb":"osvdb",
+ "cve":"2011-001",
+ "secunia":"secunia",
+ "metasploit":"exploit/ex1",
+ "exploitdb":"exploitdb",
+ "type":"SQLI",
+ "fixed_in":"",
+ "created_at":"2014-07-28T12:10:07.000Z",
+ "updated_at":"2014-07-28T12:10:07.000Z"
+ }
+ ]
+ }
+ }
+]
diff --git a/spec/samples/common/models/wp_version/vulnerable/versions_vulns.xml b/spec/samples/common/models/wp_version/vulnerable/versions_vulns.xml
deleted file mode 100644
index 2f4c4237..00000000
--- a/spec/samples/common/models/wp_version/vulnerable/versions_vulns.xml
+++ /dev/null
@@ -1,35 +0,0 @@
-
-
-
-
-
- I should not appear in the results
-
- exploit/ex1
- Ref 1
- Ref 2
- 2011-001
- secunia
- osvdb
- exploitdb
-
- XSS
-
-
-
-
-
- Here I Am
-
- exploit/ex1
- Ref 1
- Ref 2
- 2011-001
- secunia
- osvdb
- exploitdb
-
- SQLI
-
-
-
diff --git a/spec/shared_examples/wp_item_vulnerable.rb b/spec/shared_examples/wp_item_vulnerable.rb
index f6cca3aa..1bf2e7d1 100644
--- a/spec/shared_examples/wp_item_vulnerable.rb
+++ b/spec/shared_examples/wp_item_vulnerable.rb
@@ -10,7 +10,7 @@ shared_examples 'WpItem::Vulnerable' do
# let(:vulns_xpath) { }
describe '#vulnerabilities' do
- let(:empty_file) { MODELS_FIXTURES + '/wp_item/vulnerable/empty.xml' }
+ let(:empty_file) { MODELS_FIXTURES + '/wp_item/vulnerable/empty.json' }
before do
stub_request(:get, /.*\/readme\.txt/i)
@@ -19,7 +19,7 @@ shared_examples 'WpItem::Vulnerable' do
after do
subject.vulns_file = @vulns_file
- subject.vulns_xpath = vulns_xpath if defined?(vulns_xpath)
+ subject.identifier = identifier if defined?(identifier)
result = subject.vulnerabilities
expect(result).to be_a Vulnerabilities
diff --git a/spec/shared_examples/wp_items_detectable.rb b/spec/shared_examples/wp_items_detectable.rb
index bfeb1527..574621c0 100644
--- a/spec/shared_examples/wp_items_detectable.rb
+++ b/spec/shared_examples/wp_items_detectable.rb
@@ -3,7 +3,7 @@
require WPSCAN_LIB_DIR + '/wp_target'
shared_examples 'WpItems::Detectable' do
- let(:vulns_file) { fixtures_dir + '/vulns.xml' }
+ let(:vulns_file) { fixtures_dir + '/vulns.json' }
let(:targets_items_file) { fixtures_dir + '/targets.txt' }
let(:wp_content_dir) { 'wp-content' }
let(:wp_plugins_dir) { wp_content_dir + '/plugins' }
@@ -52,13 +52,14 @@ shared_examples 'WpItems::Detectable' do
end
end
- context 'when an empty file' do
- let(:file) { empty_file }
+ # should raise error.
+ # context 'when an empty file' do
+ # let(:file) { empty_file }
- it 'returns an empty Array' do
- @expected = []
- end
- end
+ # it 'returns an empty Array' do
+ # @expected = []
+ # end
+ # end
context 'when a file' do
let(:file) { targets_items_file }
@@ -82,13 +83,14 @@ shared_examples 'WpItems::Detectable' do
end
end
- context 'when an empty file' do
- let(:vulns_file) { empty_file }
+ # should raise error.
+ # context 'when an empty file' do
+ # let(:file) { empty_file }
- it 'returns an empty Array' do
- @expected = []
- end
- end
+ # it 'returns an empty Array' do
+ # @expected = []
+ # end
+ # end
context 'when a file' do
it 'returns the expected Array of WpItem' do
diff --git a/spec/shared_examples/wp_plugin_vulnerable.rb b/spec/shared_examples/wp_plugin_vulnerable.rb
index 1c0e4cac..44a77f87 100644
--- a/spec/shared_examples/wp_plugin_vulnerable.rb
+++ b/spec/shared_examples/wp_plugin_vulnerable.rb
@@ -13,14 +13,14 @@ shared_examples 'WpPlugin::Vulnerable' do
context 'when the :vulns_file is already set' do
it 'returns it' do
- @expected = 'test.xml'
+ @expected = 'test.json'
subject.vulns_file = @expected
end
end
end
- describe '#vulns_xpath' do
- its(:vulns_xpath) { is_expected.to eq "//plugin[@name='plugin-name']/vulnerability" }
+ describe '#identifier' do
+ its(:identifier) { is_expected.to eq 'plugin-name' }
end
end
diff --git a/spec/shared_examples/wp_theme_vulnerable.rb b/spec/shared_examples/wp_theme_vulnerable.rb
index 276f43dd..8552769a 100644
--- a/spec/shared_examples/wp_theme_vulnerable.rb
+++ b/spec/shared_examples/wp_theme_vulnerable.rb
@@ -13,14 +13,14 @@ shared_examples 'WpTheme::Vulnerable' do
context 'when the :vulns_file is already set' do
it 'returns it' do
- @expected = 'test.xml'
+ @expected = 'test.json'
subject.vulns_file = @expected
end
end
end
- describe '#vulns_xpath' do
- its(:vulns_xpath) { is_expected.to eq "//theme[@name='theme-name']/vulnerability" }
+ describe '#identifier' do
+ its(:identifier) { is_expected.to eq 'theme-name' }
end
end
diff --git a/spec/shared_examples/wp_version_vulnerable.rb b/spec/shared_examples/wp_version_vulnerable.rb
index 252f13be..1dd14320 100644
--- a/spec/shared_examples/wp_version_vulnerable.rb
+++ b/spec/shared_examples/wp_version_vulnerable.rb
@@ -13,14 +13,14 @@ shared_examples 'WpVersion::Vulnerable' do
context 'when the :vulns_file is already set' do
it 'returns it' do
- @expected = 'test.xml'
+ @expected = 'test.json'
subject.vulns_file = @expected
end
end
end
- describe '#vulns_xpath' do
- its(:vulns_xpath) { is_expected.to eq "//wordpress[@version='1.2']/vulnerability" }
+ describe '#identifier' do
+ its(:identifier) { is_expected.to eq '1.2' }
end
end
diff --git a/spec/xml_checks_spec.rb b/spec/xml_checks_spec.rb
index ce8eb152..bdc68691 100644
--- a/spec/xml_checks_spec.rb
+++ b/spec/xml_checks_spec.rb
@@ -20,26 +20,11 @@ describe 'XSD checks' do
end
end
- it 'check plugin_vulns.xml for syntax errors' do
- @file = PLUGINS_VULNS_FILE
- @xsd = VULNS_XSD
- end
-
- it 'check theme_vulns.xml for syntax errors' do
- @file = THEMES_VULNS_FILE
- @xsd = VULNS_XSD
- end
-
it 'check wp_versions.xml for syntax errors' do
@file = WP_VERSIONS_FILE
@xsd = WP_VERSIONS_XSD
end
- it 'check wp_vulns.xml for syntax errors' do
- @file = WP_VULNS_FILE
- @xsd = VULNS_XSD
- end
-
it 'check local_vulnerable_files.xml for syntax errors' do
@file = LOCAL_FILES_FILE
@xsd = LOCAL_FILES_XSD
@@ -57,58 +42,11 @@ describe 'Well formed XML checks' do
end
end
- it 'check plugin_vulns.xml for syntax errors' do
- @file = PLUGINS_VULNS_FILE
- end
-
- it 'check theme_vulns.xml for syntax errors' do
- @file = THEMES_VULNS_FILE
- end
-
it 'check wp_versions.xml for syntax errors' do
@file = WP_VERSIONS_FILE
end
- it 'check wp_vulns.xml for syntax errors' do
- @file = WP_VULNS_FILE
- end
-
it 'check local_vulnerable_files.xml for syntax errors' do
@file = LOCAL_FILES_FILE
end
end
-
-describe 'XML content' do
- before :all do
- @vuln_plugins = xml(PLUGINS_VULNS_FILE)
- @vuln_themes = xml(THEMES_VULNS_FILE)
- end
-
- after :each do
- expect(@result.size).to eq(0), "Items:\n#{@result.join("\n")}"
- end
-
- it 'each plugin vuln needs a type node' do
- @result = @vuln_plugins.xpath('//vulnerability[not(type)]/title/text()').map(&:text)
- end
-
- it 'each theme vuln needs a type node' do
- @result = @vuln_themes.xpath('//vulnerability[not(type)]/title/text()').map(&:text)
- end
-
- it 'each plugin vuln needs a title node' do
- @result = @vuln_plugins.xpath('//vulnerability[not(title)]/../@name').map(&:text)
- end
-
- it 'each theme vuln needs a title node' do
- @result = @vuln_themes.xpath('//vulnerability[not(title)]/../@name').map(&:text)
- end
-
- it 'each plugin vuln needs a references node' do
- @result = @vuln_plugins.xpath('//vulnerability[not(references)]/title/text()').map(&:text)
- end
-
- it 'each theme vuln needs a references node' do
- @result = @vuln_themes.xpath('//vulnerability[not(references)]/title/text()').map(&:text)
- end
-end