Fix #414 - Duplicate plugin vulns
This commit is contained in:
@@ -5754,18 +5754,13 @@
|
||||
<url>http://wordpress.org/support/topic/pwn3d</url>
|
||||
<url>http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html</url>
|
||||
<metasploit>exploits/unix/webapp/php_wordpress_total_cache</metasploit>
|
||||
</references>
|
||||
<type>RCE</type>
|
||||
<fixed_in>0.9.2.9</fixed_in>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>W3 Total Cache 0.9.2.9 - PHP Code Execution</title>
|
||||
<references>
|
||||
<exploitdb>25137</exploitdb>
|
||||
<cve>2013-2010</cve>
|
||||
<osvdb>92652</osvdb>
|
||||
<secunia>53052</secunia>
|
||||
</references>
|
||||
<type>RCE</type>
|
||||
<fixed_in>0.9.2.9</fixed_in>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
@@ -10015,22 +10010,21 @@
|
||||
|
||||
<plugin name="contact-form-7">
|
||||
<vulnerability>
|
||||
<title>Contact Form 7 3.5.2 - Crafted File Extension Upload Remote Code Execution</title>
|
||||
<title>Contact Form 7 3.5.3 - Crafted File Extension Upload Remote Code Execution</title>
|
||||
<references>
|
||||
<osvdb>102776</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/125018/</url>
|
||||
<url>http://seclists.org/fulldisclosure/2014/Feb/0</url>
|
||||
</references>
|
||||
<type>RCE</type>
|
||||
<fixed_in>3.5.3</fixed_in>
|
||||
</vulnerability>
|
||||
<vulnerability>
|
||||
<title>Contact Form 7 3.5.2 - File Upload Remote Code Execution</title>
|
||||
<title>Contact Form 7 <= 3.5.2 - Arbitrary File Upload Remote Code Execution</title>
|
||||
<references>
|
||||
<osvdb>100189</osvdb>
|
||||
<url>http://packetstormsecurity.com/files/124154/</url>
|
||||
</references>
|
||||
<type>RCE</type>
|
||||
<type>UPLOAD</type>
|
||||
<fixed_in>3.5.3</fixed_in>
|
||||
</vulnerability>
|
||||
</plugin>
|
||||
|
||||
Reference in New Issue
Block a user