Fix #414 - Duplicate plugin vulns
This commit is contained in:
@@ -5754,18 +5754,13 @@
|
|||||||
<url>http://wordpress.org/support/topic/pwn3d</url>
|
<url>http://wordpress.org/support/topic/pwn3d</url>
|
||||||
<url>http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html</url>
|
<url>http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html</url>
|
||||||
<metasploit>exploits/unix/webapp/php_wordpress_total_cache</metasploit>
|
<metasploit>exploits/unix/webapp/php_wordpress_total_cache</metasploit>
|
||||||
</references>
|
|
||||||
<type>RCE</type>
|
|
||||||
<fixed_in>0.9.2.9</fixed_in>
|
|
||||||
</vulnerability>
|
|
||||||
<vulnerability>
|
|
||||||
<title>W3 Total Cache 0.9.2.9 - PHP Code Execution</title>
|
|
||||||
<references>
|
|
||||||
<exploitdb>25137</exploitdb>
|
<exploitdb>25137</exploitdb>
|
||||||
<cve>2013-2010</cve>
|
<cve>2013-2010</cve>
|
||||||
<osvdb>92652</osvdb>
|
<osvdb>92652</osvdb>
|
||||||
<secunia>53052</secunia>
|
<secunia>53052</secunia>
|
||||||
</references>
|
</references>
|
||||||
|
<type>RCE</type>
|
||||||
|
<fixed_in>0.9.2.9</fixed_in>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|
||||||
@@ -10015,22 +10010,21 @@
|
|||||||
|
|
||||||
<plugin name="contact-form-7">
|
<plugin name="contact-form-7">
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Contact Form 7 3.5.2 - Crafted File Extension Upload Remote Code Execution</title>
|
<title>Contact Form 7 3.5.3 - Crafted File Extension Upload Remote Code Execution</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>102776</osvdb>
|
<osvdb>102776</osvdb>
|
||||||
<url>http://packetstormsecurity.com/files/125018/</url>
|
<url>http://packetstormsecurity.com/files/125018/</url>
|
||||||
<url>http://seclists.org/fulldisclosure/2014/Feb/0</url>
|
<url>http://seclists.org/fulldisclosure/2014/Feb/0</url>
|
||||||
</references>
|
</references>
|
||||||
<type>RCE</type>
|
<type>RCE</type>
|
||||||
<fixed_in>3.5.3</fixed_in>
|
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
<vulnerability>
|
<vulnerability>
|
||||||
<title>Contact Form 7 3.5.2 - File Upload Remote Code Execution</title>
|
<title>Contact Form 7 <= 3.5.2 - Arbitrary File Upload Remote Code Execution</title>
|
||||||
<references>
|
<references>
|
||||||
<osvdb>100189</osvdb>
|
<osvdb>100189</osvdb>
|
||||||
<url>http://packetstormsecurity.com/files/124154/</url>
|
<url>http://packetstormsecurity.com/files/124154/</url>
|
||||||
</references>
|
</references>
|
||||||
<type>RCE</type>
|
<type>UPLOAD</type>
|
||||||
<fixed_in>3.5.3</fixed_in>
|
<fixed_in>3.5.3</fixed_in>
|
||||||
</vulnerability>
|
</vulnerability>
|
||||||
</plugin>
|
</plugin>
|
||||||
|
|||||||
Reference in New Issue
Block a user