Fix #414 - Duplicate plugin vulns

This commit is contained in:
erwanlr
2014-02-26 12:48:31 +01:00
parent 4f0a5bcf15
commit f3b26b1101

View File

@@ -5754,18 +5754,13 @@
<url>http://wordpress.org/support/topic/pwn3d</url>
<url>http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html</url>
<metasploit>exploits/unix/webapp/php_wordpress_total_cache</metasploit>
</references>
<type>RCE</type>
<fixed_in>0.9.2.9</fixed_in>
</vulnerability>
<vulnerability>
<title>W3 Total Cache 0.9.2.9 - PHP Code Execution</title>
<references>
<exploitdb>25137</exploitdb>
<cve>2013-2010</cve>
<osvdb>92652</osvdb>
<secunia>53052</secunia>
</references>
<type>RCE</type>
<fixed_in>0.9.2.9</fixed_in>
</vulnerability>
</plugin>
@@ -10015,22 +10010,21 @@
<plugin name="contact-form-7">
<vulnerability>
<title>Contact Form 7 3.5.2 - Crafted File Extension Upload Remote Code Execution</title>
<title>Contact Form 7 3.5.3 - Crafted File Extension Upload Remote Code Execution</title>
<references>
<osvdb>102776</osvdb>
<url>http://packetstormsecurity.com/files/125018/</url>
<url>http://seclists.org/fulldisclosure/2014/Feb/0</url>
</references>
<type>RCE</type>
<fixed_in>3.5.3</fixed_in>
</vulnerability>
<vulnerability>
<title>Contact Form 7 3.5.2 - File Upload Remote Code Execution</title>
<title>Contact Form 7 &lt;= 3.5.2 - Arbitrary File Upload Remote Code Execution</title>
<references>
<osvdb>100189</osvdb>
<url>http://packetstormsecurity.com/files/124154/</url>
</references>
<type>RCE</type>
<type>UPLOAD</type>
<fixed_in>3.5.3</fixed_in>
</vulnerability>
</plugin>