Update vuln db

This commit is contained in:
Peter van der Laan
2014-02-02 11:32:43 +01:00
parent 6c62b06e46
commit fd880da057
2 changed files with 55 additions and 3 deletions

View File

@@ -2620,13 +2620,22 @@
<plugin name="better-wp-security">
<vulnerability>
<title>Better WP Security &lt;= 3.5.3 - Stored XSS</title>
<title>Better WP Security 3.5.5 - inc/admin/content.php id_specialfile Parameter Stored XSS</title>
<references>
<osvdb>101788</osvdb>
</references>
<type>XSS</type>
<fixed_in>3.5.6</fixed_in>
</vulnerability>
<vulnerability>
<title>Better WP Security &lt;= 3.5.3 - inc/secure.php logevent Function URL Handling Stored XSS</title>
<references>
<url>https://github.com/wpscanteam/wpscan/issues/251</url>
<url>http://www.securityfocus.com/archive/1/527634/30/0/threaded</url>
<osvdb>95884</osvdb>
<secunia>54299</secunia>
<exploitdb>27290</exploitdb>
<url>http://packetstormsecurity.com/files/122615/</url>
<url>https://github.com/wpscanteam/wpscan/issues/251</url>
<url>http://www.securityfocus.com/archive/1/527634/30/0/threaded</url>
</references>
<type>XSS</type>
<fixed_in>3.5.4</fixed_in>
@@ -8208,6 +8217,7 @@
<osvdb>96111</osvdb>
<secunia>54402</secunia>
<exploitdb>27531</exploitdb>
<url>http://packetstormsecurity.com/files/122761/</url>
</references>
<fixed_in>2.0.11</fixed_in>
</vulnerability>
@@ -8223,6 +8233,7 @@
<osvdb>96111</osvdb>
<secunia>54402</secunia>
<exploitdb>27531</exploitdb>
<url>http://packetstormsecurity.com/files/122761/</url>
</references>
<fixed_in>2.0.11</fixed_in>
</vulnerability>
@@ -8780,6 +8791,7 @@
<title>Booking System - events_facualty_list.php eid Parameter Reflected XSS</title>
<references>
<osvdb>96740</osvdb>
<url>http://packetstormsecurity.com/files/122289/</url>
</references>
<type>XSS</type>
</vulnerability>
@@ -10610,4 +10622,34 @@
</vulnerability>
</plugin>
<plugin name="comment-control">
<vulnerability>
<title>Comment Control 0.3.0 - comment-control.php type Parameter SQL Injection</title>
<references>
<osvdb>102581</osvdb>
</references>
<type>SQLI</type>
<fixed_in>0.3.1</fixed_in>
</vulnerability>
</plugin>
<plugin name="wptouch">
<vulnerability>
<title>WPtouch 1.9.8 - ajax/file_upload.php Crafted Content-Type File Upload Remote Code Execution</title>
<references>
<osvdb>102582</osvdb>
</references>
<type>RCE</type>
<fixed_in>1.9.8.1</fixed_in>
</vulnerability>
<vulnerability>
<title>WPtouch 1.9.8 - include/submit.php Multiple Parameter SQL Injection</title>
<references>
<osvdb>102583</osvdb>
</references>
<type>SQLI</type>
<fixed_in>1.9.8.1</fixed_in>
</vulnerability>
</plugin>
</vulnerabilities>

View File

@@ -2948,4 +2948,14 @@
</vulnerability>
</theme>
<theme name="iloveit">
<vulnerability>
<title> Love It - XSS / Content Spoofing / Path Disclosure</title>
<references>
<url>http://packetstormsecurity.com/files/122386/</url>
</references>
<type>MULTI</type>
</vulnerability>
</theme>
</vulnerabilities>