added missing wordpress versions (http://wordpress.org/download/release-archive/)
This commit is contained in:
@@ -65,6 +65,19 @@
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="3.4">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="3.4-beta4">
|
||||
<vulnerability>
|
||||
<title>Wordpress 3.3.1 Multiple CSRF Vulnerabilities</title>
|
||||
@@ -83,6 +96,19 @@
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="3.3.3">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="3.3.2">
|
||||
<vulnerability>
|
||||
<title>Wordpress 3.3.1 Multiple CSRF Vulnerabilities</title>
|
||||
@@ -590,6 +616,24 @@
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.8.2">
|
||||
<vulnerability>
|
||||
<title>XSS vulnerability in swfupload in WordPress</title>
|
||||
<reference>http://seclists.org/fulldisclosure/2012/Nov/51</reference>
|
||||
<type>XSS</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.8.1">
|
||||
<vulnerability>
|
||||
<title>Wordpress 2.8.1 (url) Remote Cross Site Scripting Exploit</title>
|
||||
@@ -821,6 +865,32 @@
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.3.3">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.3.2">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.3.1">
|
||||
<vulnerability>
|
||||
<title>Wordpress <= 2.3.1 Charset Remote SQL Injection Vulnerability</title>
|
||||
@@ -839,6 +909,58 @@
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.3">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.2.3">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.2.2">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.2.1">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.2">
|
||||
<vulnerability>
|
||||
<title>WordPress 2.2 (wp-app.php) Arbitrary File Upload Exploit</title>
|
||||
@@ -898,6 +1020,97 @@
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.1.1">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.1">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.11">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.10">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.9">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.8">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.7">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.6">
|
||||
<vulnerability>
|
||||
<title>Wordpress <= 2.0.6 wp-trackback.php Remote SQL Injection Exploit</title>
|
||||
@@ -934,6 +1147,32 @@
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.4">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.3">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.2">
|
||||
<vulnerability>
|
||||
<title>WordPress <= 2.0.2 (cache) Remote Shell Injection Exploit</title>
|
||||
@@ -952,6 +1191,45 @@
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0.1">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="2.0">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="1.5.2">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="1.5.1.3">
|
||||
<vulnerability>
|
||||
<title>Wordpress <= 1.5.1.3 Remote Code Execution eXploit (metasploit)</title>
|
||||
@@ -1011,4 +1289,17 @@
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
<wordpress version="1.5.1">
|
||||
<vulnerability>
|
||||
<title>XMLRPC Pingback API Internal/External Port Scanning</title>
|
||||
<reference>https://github.com/FireFart/WordpressPingbackPortScanner</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>WordPress XMLRPC pingback additional issues</title>
|
||||
<reference>http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html</reference>
|
||||
<type>UNKNOWN</type>
|
||||
</vulnerability>
|
||||
</wordpress>
|
||||
|
||||
</vulnerabilities>
|
||||
|
||||
Reference in New Issue
Block a user