1 line
90 KiB
JSON
1 line
90 KiB
JSON
[{"crius":{"vulnerabilities":[{"id":93832,"title":"Crius - VideoJS Cross-Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/77","secunia":"53427","created_at":"2014-08-01T10:51:59.834Z","updated_at":"2014-08-01T10:51:59.834Z"}]}},{"source":{"vulnerabilities":[{"id":93833,"title":"Source - VideoJS Cross-Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/77","secunia":"53457","created_at":"2014-08-01T10:51:59.887Z","updated_at":"2014-08-01T10:51:59.887Z"}]}},{"i-love-it":{"vulnerabilities":[{"id":93834,"title":"I Love It - VideoJS Cross-Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/77","secunia":"53548","created_at":"2014-08-01T10:51:59.938Z","updated_at":"2014-08-01T10:51:59.938Z"}]}},{"smartstart":{"vulnerabilities":[{"id":93835,"title":"Smart Start - VideoJS Cross-Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/77","secunia":"53460","created_at":"2014-08-01T10:52:00.007Z","updated_at":"2014-08-01T10:52:00.007Z"}]}},{"covertvideopress":{"vulnerabilities":[{"id":93836,"title":"Covert Videopress - VideoJS Cross-Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/77","secunia":"53494","created_at":"2014-08-01T10:52:00.062Z","updated_at":"2014-08-01T10:52:00.062Z"}]}},{"photolio":{"vulnerabilities":[{"id":93837,"title":"Photolio - VideoJS Cross-Site Scripting Vulnerability","url":"http://seclists.org/fulldisclosure/2013/May/77","created_at":"2014-08-01T10:52:00.118Z","updated_at":"2014-08-01T10:52:00.118Z"}]}},{"onepagewebsite":{"vulnerabilities":[{"id":93838,"title":"onepagewebsite - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20027","created_at":"2014-08-01T10:52:00.173Z","updated_at":"2014-08-01T10:52:00.173Z"}]}},{"vithy":{"vulnerabilities":[{"id":93839,"title":"vithy - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20040","created_at":"2014-08-01T10:52:00.236Z","updated_at":"2014-08-01T10:52:00.236Z"},{"id":93840,"title":"vithy - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/19830","created_at":"2014-08-01T10:52:00.308Z","updated_at":"2014-08-01T10:52:00.308Z"},{"id":93841,"title":"vithy - Custom Background Shell Upload","url":"http://packetstormsecurity.com/files/125827/","created_at":"2014-08-01T10:52:00.390Z","updated_at":"2014-08-01T10:52:00.390Z"}]}},{"appius":{"vulnerabilities":[{"id":93842,"title":"appius - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20039","created_at":"2014-08-01T10:52:00.444Z","updated_at":"2014-08-01T10:52:00.444Z"},{"id":93843,"title":"appius - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/19831","created_at":"2014-08-01T10:52:00.497Z","updated_at":"2014-08-01T10:52:00.497Z"},{"id":93844,"title":"appius - Custom Background Shell Upload","url":"http://packetstormsecurity.com/files/125827/","created_at":"2014-08-01T10:52:00.548Z","updated_at":"2014-08-01T10:52:00.548Z"}]}},{"yvora":{"vulnerabilities":[{"id":93845,"title":"yvora - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20038","created_at":"2014-08-01T10:52:00.600Z","updated_at":"2014-08-01T10:52:00.600Z"},{"id":93846,"title":"yvora - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/19834","created_at":"2014-08-01T10:52:00.652Z","updated_at":"2014-08-01T10:52:00.652Z"}]}},{"shotzz":{"vulnerabilities":[{"id":93847,"title":"Shotzz - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20041","created_at":"2014-08-01T10:52:00.705Z","updated_at":"2014-08-01T10:52:00.705Z"},{"id":93848,"title":"Shotzz - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/19829","created_at":"2014-08-01T10:52:00.760Z","updated_at":"2014-08-01T10:52:00.760Z"},{"id":93849,"title":"Shotzz - Custom Background Shell Upload","url":"http://packetstormsecurity.com/files/125827/","created_at":"2014-08-01T10:52:00.816Z","updated_at":"2014-08-01T10:52:00.816Z"}]}},{"dagda":{"vulnerabilities":[{"id":93850,"title":"dagda - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/19832","created_at":"2014-08-01T10:52:00.870Z","updated_at":"2014-08-01T10:52:00.870Z"},{"id":93851,"title":"dagda - Custom Background Shell Upload","url":"http://packetstormsecurity.com/files/125827/","created_at":"2014-08-01T10:52:00.929Z","updated_at":"2014-08-01T10:52:00.929Z"}]}},{"moneymasters":{"vulnerabilities":[{"id":93852,"title":"moneymasters - Full Path Disclosure vulnerability","url":"http://1337day.com/exploit/20077","created_at":"2014-08-01T10:52:00.988Z","updated_at":"2014-08-01T10:52:00.988Z"},{"id":93853,"title":"moneymasters - File Upload Vulnerability (metasploit)","url":"http://1337day.com/exploit/20076","created_at":"2014-08-01T10:52:01.045Z","updated_at":"2014-08-01T10:52:01.045Z"}]}},{"ovum":{"vulnerabilities":[{"id":93854,"title":"XSS vulnerability in Imediapixel premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html","created_at":"2014-08-01T10:52:01.104Z","updated_at":"2014-08-01T10:52:01.104Z"}]}},{"avanix":{"vulnerabilities":[{"id":93854,"title":"XSS vulnerability in Imediapixel premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html","created_at":"2014-08-01T10:52:01.104Z","updated_at":"2014-08-01T10:52:01.104Z"}]}},{"ebiz":{"vulnerabilities":[{"id":93854,"title":"XSS vulnerability in Imediapixel premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html","created_at":"2014-08-01T10:52:01.104Z","updated_at":"2014-08-01T10:52:01.104Z"}]}},{"ecobiz":{"vulnerabilities":[{"id":93854,"title":"XSS vulnerability in Imediapixel premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html","created_at":"2014-08-01T10:52:01.104Z","updated_at":"2014-08-01T10:52:01.104Z"}]}},{"traject":{"vulnerabilities":[{"id":93855,"title":"XSS vulnerability in Parallelus premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html","created_at":"2014-08-01T10:52:01.367Z","updated_at":"2014-08-01T10:52:01.367Z"},{"id":94070,"title":"testing theme and plugin name downcasing","url":"http://www.example.com,http://www.example2.com","created_at":"2014-09-05T11:23:09.793Z","updated_at":"2014-09-08T13:51:59.461Z"}]}},{"intersect":{"vulnerabilities":[{"id":93855,"title":"XSS vulnerability in Parallelus premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html","created_at":"2014-08-01T10:52:01.367Z","updated_at":"2014-08-01T10:52:01.367Z"}]}},{"salutation":{"vulnerabilities":[{"id":93855,"title":"XSS vulnerability in Parallelus premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html","created_at":"2014-08-01T10:52:01.367Z","updated_at":"2014-08-01T10:52:01.367Z"}]}},{"unite":{"vulnerabilities":[{"id":93855,"title":"XSS vulnerability in Parallelus premium WordPress themes","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html","created_at":"2014-08-01T10:52:01.367Z","updated_at":"2014-08-01T10:52:01.367Z"}]}},{"shapeless":{"vulnerabilities":[{"id":93856,"title":"Shapeless - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85919","created_at":"2014-08-01T10:52:01.600Z","updated_at":"2014-08-01T10:52:01.600Z"}]}},{"brisk":{"vulnerabilities":[{"id":93857,"title":"Brisk - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85918","created_at":"2014-08-01T10:52:01.653Z","updated_at":"2014-08-01T10:52:01.653Z"}]}},{"blaze":{"vulnerabilities":[{"id":93858,"title":"Blaze - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85917","created_at":"2014-08-01T10:52:01.719Z","updated_at":"2014-08-01T10:52:01.719Z"}]}},{"eunice":{"vulnerabilities":[{"id":93859,"title":"Eunice - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85916","created_at":"2014-08-01T10:52:01.775Z","updated_at":"2014-08-01T10:52:01.775Z"}]}},{"explicit":{"vulnerabilities":[{"id":93860,"title":"Explicit - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85915","created_at":"2014-08-01T10:52:01.828Z","updated_at":"2014-08-01T10:52:01.828Z"}]}},{"essence":{"vulnerabilities":[{"id":93861,"title":"Essence - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85914","created_at":"2014-08-01T10:52:01.883Z","updated_at":"2014-08-01T10:52:01.883Z"}]}},{"paramount":{"vulnerabilities":[{"id":93862,"title":"Paramount - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85913","created_at":"2014-08-01T10:52:01.937Z","updated_at":"2014-08-01T10:52:01.937Z"}]}},{"picturefactory":{"vulnerabilities":[{"id":93863,"title":"PictureFactory - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85912","created_at":"2014-08-01T10:52:01.989Z","updated_at":"2014-08-01T10:52:01.989Z"}]}},{"sparky":{"vulnerabilities":[{"id":93864,"title":"Sparky - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85911","created_at":"2014-08-01T10:52:02.040Z","updated_at":"2014-08-01T10:52:02.040Z"}]}},{"theagency":{"vulnerabilities":[{"id":93865,"title":"TheAgency - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85910","created_at":"2014-08-01T10:52:02.097Z","updated_at":"2014-08-01T10:52:02.097Z"}]}},{"konzept":{"vulnerabilities":[{"id":93866,"title":"Konzept - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85920","created_at":"2014-08-01T10:52:02.156Z","updated_at":"2014-08-01T10:52:02.156Z"}]}},{"daisho":{"vulnerabilities":[{"id":93867,"title":"Daisho - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html","osvdb":"85921","created_at":"2014-08-01T10:52:02.212Z","updated_at":"2014-08-01T10:52:02.212Z"}]}},{"choices":{"vulnerabilities":[{"id":93868,"title":"Choices - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86755","created_at":"2014-08-01T10:52:02.266Z","updated_at":"2014-08-01T10:52:02.266Z"}]}},{"brightbox":{"vulnerabilities":[{"id":93869,"title":"Brightbox - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86756","created_at":"2014-08-01T10:52:02.346Z","updated_at":"2014-08-01T10:52:02.346Z"}]}},{"broadscope":{"vulnerabilities":[{"id":93870,"title":"Broadscope - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86757","created_at":"2014-08-01T10:52:02.398Z","updated_at":"2014-08-01T10:52:02.398Z"}]}},{"corona":{"vulnerabilities":[{"id":93871,"title":"Corona - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86758","created_at":"2014-08-01T10:52:02.457Z","updated_at":"2014-08-01T10:52:02.457Z"}]}},{"flashlight":{"vulnerabilities":[{"id":93872,"title":"Flashlight - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86759","created_at":"2014-08-01T10:52:02.508Z","updated_at":"2014-08-01T10:52:02.508Z"}]}},{"coalition":{"vulnerabilities":[{"id":93873,"title":"Coalition - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86760","created_at":"2014-08-01T10:52:02.567Z","updated_at":"2014-08-01T10:52:02.567Z"}]}},{"shoutbox":{"vulnerabilities":[{"id":93874,"title":"Shoutbox - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86761","created_at":"2014-08-01T10:52:02.620Z","updated_at":"2014-08-01T10:52:02.620Z"}]}},{"velvet":{"vulnerabilities":[{"id":93875,"title":"Velvet - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86762","created_at":"2014-08-01T10:52:02.675Z","updated_at":"2014-08-01T10:52:02.675Z"}]}},{"upscale":{"vulnerabilities":[{"id":93876,"title":"Upscale - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86763","created_at":"2014-08-01T10:52:02.731Z","updated_at":"2014-08-01T10:52:02.731Z"}]}},{"expose":{"vulnerabilities":[{"id":93877,"title":"Expose - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86764","created_at":"2014-08-01T10:52:02.786Z","updated_at":"2014-08-01T10:52:02.786Z"}]}},{"abundance":{"vulnerabilities":[{"id":93878,"title":"Abundance - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86765","created_at":"2014-08-01T10:52:02.841Z","updated_at":"2014-08-01T10:52:02.841Z"}]}},{"eunoia":{"vulnerabilities":[{"id":93879,"title":"Eunoia - Unspecified XSS","url":"http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html","osvdb":"86766","created_at":"2014-08-01T10:52:02.893Z","updated_at":"2014-08-01T10:52:02.893Z"}]}},{"wise":{"vulnerabilities":[{"id":93880,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-08-01T10:52:02.943Z","updated_at":"2014-08-01T10:52:02.943Z"}]}},{"webfolio":{"vulnerabilities":[{"id":93880,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-08-01T10:52:02.943Z","updated_at":"2014-08-01T10:52:02.943Z","fixed_in":"2.0"}]}},{"colorbold":{"vulnerabilities":[{"id":93880,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-08-01T10:52:02.943Z","updated_at":"2014-08-01T10:52:02.943Z"}]}},{"rockwell":{"vulnerabilities":[{"id":93880,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-08-01T10:52:02.943Z","updated_at":"2014-08-01T10:52:02.943Z"}]}},{"xmas":{"vulnerabilities":[{"id":93880,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-08-01T10:52:02.943Z","updated_at":"2014-08-01T10:52:02.943Z"}]}},{"designpile":{"vulnerabilities":[{"id":93880,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-08-01T10:52:02.943Z","updated_at":"2014-08-01T10:52:02.943Z"}]}},{"alltuts":{"vulnerabilities":[{"id":93880,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-08-01T10:52:02.943Z","updated_at":"2014-08-01T10:52:02.943Z","fixed_in":"2.0"}]}},{"boldy":{"vulnerabilities":[{"id":93880,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-08-01T10:52:02.943Z","updated_at":"2014-08-01T10:52:02.943Z","fixed_in":"2.0"}]}},{"simplo":{"vulnerabilities":[{"id":93880,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-08-01T10:52:02.943Z","updated_at":"2014-08-01T10:52:02.943Z"}]}},{"diary":{"vulnerabilities":[{"id":93880,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-08-01T10:52:02.943Z","updated_at":"2014-08-01T10:52:02.943Z","fixed_in":"2.0"}]}},{"journalcrunch":{"vulnerabilities":[{"id":93880,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-08-01T10:52:02.943Z","updated_at":"2014-08-01T10:52:02.943Z","fixed_in":"2.0"}]}},{"prosume":{"vulnerabilities":[{"id":93880,"title":"Site5 Wordpress Themes Email Spoofing","url":"http://packetstormsecurity.org/files/114750/","created_at":"2014-08-01T10:52:02.943Z","updated_at":"2014-08-01T10:52:02.943Z","fixed_in":"2.0"}]}},{"famous":{"vulnerabilities":[{"id":93881,"title":"Famous 2.0.5 - Shell Upload","url":"http://packetstormsecurity.org/files/113842/","osvdb":"83013","created_at":"2014-08-01T10:52:03.667Z","updated_at":"2014-08-01T10:52:03.667Z"}]}},{"deep-blue":{"vulnerabilities":[{"id":93882,"title":"Deep-Blue 1.9.2 - Arbitrary File Upload Vulnerability","url":"http://packetstormsecurity.org/files/113843/","osvdb":"83014","secunia":"49611","created_at":"2014-08-01T10:52:03.723Z","updated_at":"2014-08-01T10:52:03.723Z"}]}},{"classipress":{"vulnerabilities":[{"id":93883,"title":"Classipress \u003c= 3.1.4 - Stored XSS","url":"http://cxsecurity.com/issue/WLB-2011110001","osvdb":"76712","cve":"2011-5257","exploitdb":"18053","created_at":"2014-08-01T10:52:03.777Z","updated_at":"2014-08-01T10:52:03.777Z","fixed_in":"3.1.5"}]}},{"merchant":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"smpl":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"drawar":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"sentient":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"whitelight":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"unsigned":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"shelflife":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"olya":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"sliding":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"beveled":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"empire-commerce":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"buro-commerce":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"briefed-commerce":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"wikeasi":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"currents":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"emporium":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"biznizz-commerce":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"kaboodle-commerce":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"inspire-commerce":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"teamster":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"argentum":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"statua-commerce":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"simplicity-commerce":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"canvas-commerce":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"wootique":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"woostore":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"coquette":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"buro":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"swatch":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"announcement":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"empire":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"supportpress":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"editorial":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"statua":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"briefed":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"faultpress":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"kaboodle":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"savinggrace":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"premiere":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"simplicity":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"deliciousmagazine":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"bookclub":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"boldnews":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"placeholder":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"biznizz":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"auld":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"listings":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"elefolio":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"chapters":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"continuum":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"diner":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"skeptical":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"caffeinated":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"crisp":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"sealight":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"estate":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"tma":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"coda":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"inspire":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"apz":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"spectrum":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"diarise":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"boast":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"retreat":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"cityguide":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"canvas":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"postcard":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"delegate":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"mystream":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"optimize":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"backstage":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"bueno":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"digitalfarm":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"headlines":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"therapy":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"rockstar":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"DailyDeal":{"vulnerabilities":[{"id":93885,"title":"DailyDeal - File Upload Remote Code Execution","url":"http://packetstormsecurity.com/files/123748/,http://templatic.com/app-themes/daily-deal-premium-wordpress-app-theme","osvdb":"98924","created_at":"2014-08-01T10:52:08.465Z","updated_at":"2014-08-01T10:52:08.465Z"}]}},{"dailyedition":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"object":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"coffeebreak":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"mainstream":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"featurepitch":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"thejournal":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"aperture":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"metamorphosis":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"bloggingstream":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"thestation":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"groovyvideo":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"irresistible":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"cushy":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"wootube":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"abstract":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"busybee":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"blogtheme":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"typebased":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"overeasy":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"snapshot":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"openair":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"freshnews":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"livewire":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"flashnews":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"},{"id":93886,"title":"Flash News - thumb.php src Parameter XSS","url":"http://packetstormsecurity.com/files/120037/,http://seclists.org/fulldisclosure/2013/Feb/8,http://cxsecurity.com/issue/WLB-2013020010","osvdb":"89887","created_at":"2014-08-01T10:52:10.161Z","updated_at":"2014-08-01T10:52:10.161Z"},{"id":93887,"title":"Flash News - Multiple Script Path Disclosure","url":"http://packetstormsecurity.com/files/120037/,http://seclists.org/fulldisclosure/2013/Feb/8,http://cxsecurity.com/issue/WLB-2013020010","osvdb":"89888","created_at":"2014-08-01T10:52:10.215Z","updated_at":"2014-08-01T10:52:10.215Z"},{"id":93888,"title":"Flash News - includes/test.php a Parameter XSS","url":"http://packetstormsecurity.com/files/120037/,http://seclists.org/fulldisclosure/2013/Feb/8,http://cxsecurity.com/issue/WLB-2013020010","osvdb":"89889","created_at":"2014-08-01T10:52:10.272Z","updated_at":"2014-08-01T10:52:10.272Z"},{"id":93889,"title":"Flash News - includes/test.php Direct Request Information Disclosure","url":"http://packetstormsecurity.com/files/120037/,http://seclists.org/fulldisclosure/2013/Feb/8,http://cxsecurity.com/issue/WLB-2013020010","osvdb":"89890","created_at":"2014-08-01T10:52:10.335Z","updated_at":"2014-08-01T10:52:10.335Z"},{"id":93890,"title":"Flash News - thumb.php src Parameter File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/120037/,http://seclists.org/fulldisclosure/2013/Feb/8,http://cxsecurity.com/issue/WLB-2013020010","osvdb":"89891","created_at":"2014-08-01T10:52:10.393Z","updated_at":"2014-08-01T10:52:10.393Z"},{"id":93891,"title":"Flash News - thumb.php src Parameter Remote DoS","url":"http://packetstormsecurity.com/files/120037/,http://seclists.org/fulldisclosure/2013/Feb/8,http://cxsecurity.com/issue/WLB-2013020010","osvdb":"89892","created_at":"2014-08-01T10:52:10.446Z","updated_at":"2014-08-01T10:52:10.446Z"}]}},{"gazette":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"premiumnews":{"vulnerabilities":[{"id":93884,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":"https://gist.github.com/2523147","created_at":"2014-08-01T10:52:03.837Z","updated_at":"2014-08-01T10:52:03.837Z"}]}},{"dt-chocolate":{"vulnerabilities":[{"id":93892,"title":"dt-chocolate - jPlayer XSS","url":"http://packetstormsecurity.com/files/124756/","secunia":"56379","created_at":"2014-08-01T10:52:10.635Z","updated_at":"2014-08-01T10:52:10.635Z"},{"id":93893,"title":"dt-chocolate - Image Open redirect","url":"http://cxsecurity.com/issue/WLB-2013020011","created_at":"2014-08-01T10:52:10.686Z","updated_at":"2014-08-01T10:52:10.686Z"},{"id":93894,"title":"Multiple vulnerabilities in Chocolate WP theme for WordPress","url":"http://seclists.org/fulldisclosure/2013/Jan/215","created_at":"2014-08-01T10:52:10.737Z","updated_at":"2014-08-01T10:52:10.737Z"}]}},{"sandbox":{"vulnerabilities":[{"id":93895,"title":"sandbox - Arbitrary File Upload/FD Vulnerability","url":"http://1337day.com/exploit/20228","created_at":"2014-08-01T10:52:10.795Z","updated_at":"2014-08-01T10:52:10.795Z"}]}},{"clockstone":{"vulnerabilities":[{"id":93896,"title":"Clockstone 1.2 - upload.php Arbitrary File Upload Vulnerability","url":"http://www.exploit-db.com/exploits/23494,http://www.securityfocus.com/bid/56988,http://xforce.iss.net/xforce/xfdb/80725","osvdb":"88622","secunia":"51619","created_at":"2014-08-01T10:52:10.849Z","updated_at":"2014-08-01T10:52:10.849Z"}]}},{"archin":{"vulnerabilities":[{"id":93897,"title":"Archin 3.2 - Cross-Site Scripting and Arbitrary File Upload Vulnerabilities","secunia":"50711","created_at":"2014-08-01T10:52:10.906Z","updated_at":"2014-08-01T10:52:10.906Z"},{"id":93898,"title":"Archin 3.2 - hades_framework/option_panel/ajax.php Configuration Option Manipulation","osvdb":"86991","exploitdb":"21646","created_at":"2014-08-01T10:52:10.965Z","updated_at":"2014-08-01T10:52:10.965Z"}]}},{"purity":{"vulnerabilities":[{"id":93899,"title":"Purity - Multiple Cross-Site Scripting Vulnerabilities","secunia":"50627","created_at":"2014-08-01T10:52:11.025Z","updated_at":"2014-08-01T10:52:11.025Z"}]}},{"pinboard":{"vulnerabilities":[{"id":93900,"title":"Pinboard 1.0.6 - includes/theme-options.php tab Parameter XSS","url":"http://seclists.org/oss-sec/2013/q1/274,http://cxsecurity.com/issue/WLB-2013020062","osvdb":"90070","cve":"2013-0286","secunia":"52079","created_at":"2014-08-01T10:52:11.109Z","updated_at":"2014-08-01T10:52:11.109Z"},{"id":93901,"title":"Pinboard - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124151/","osvdb":"100271","created_at":"2014-08-01T10:52:11.162Z","updated_at":"2014-08-01T10:52:11.162Z"}]}},{"montezuma":{"vulnerabilities":[{"id":93902,"title":"montezuma \u003c= 1.1.3 - XSS in ZeroClipboard.swf","url":"http://1337day.com/exploit/20396","created_at":"2014-08-01T10:52:11.215Z","updated_at":"2014-08-01T10:52:11.215Z"}]}},{"scarlet":{"vulnerabilities":[{"id":93903,"title":"scarlet \u003c= 1.1.3 - XSS in ZeroClipboard.swf","url":"http://1337day.com/exploit/20396","created_at":"2014-08-01T10:52:11.276Z","updated_at":"2014-08-01T10:52:11.276Z"}]}},{"allure-real-estate-theme-for-placester":{"vulnerabilities":[{"id":93904,"title":"allure-real-estate-theme-for-placester \u003c= 0.1.1 - XSS in ZeroClipboard.swf","url":"http://1337day.com/exploit/20396","created_at":"2014-08-01T10:52:11.351Z","updated_at":"2014-08-01T10:52:11.351Z"}]}},{"allure-real-estate-theme-for-real-estate":{"vulnerabilities":[{"id":93905,"title":"allure-real-estate-theme-for-real-estate \u003c= 0.1.1 - XSS in ZeroClipboard.swf","url":"http://1337day.com/exploit/20396","created_at":"2014-08-01T10:52:11.413Z","updated_at":"2014-08-01T10:52:11.413Z"}]}},{"felici":{"vulnerabilities":[{"id":93906,"title":"felici - XSS Vulnerability","url":"http://1337day.com/exploit/20560","created_at":"2014-08-01T10:52:11.468Z","updated_at":"2014-08-01T10:52:11.468Z"},{"id":93907,"title":"felici - Custom Background Shell Upload","url":"http://packetstormsecurity.com/files/125830/","created_at":"2014-08-01T10:52:11.523Z","updated_at":"2014-08-01T10:52:11.523Z"}]}},{"classic":{"vulnerabilities":[{"id":93908,"title":"Classic 1.5 - PHP_SELF XSS","osvdb":"38450","cve":"2007-4483","created_at":"2014-08-01T10:52:11.578Z","updated_at":"2014-08-01T10:52:11.578Z"}]}},{"brilliant":{"vulnerabilities":[{"id":93909,"title":"brilliant - File Upload Vulnerability","url":"http://ruinedsec.wordpress.com/2013/04/03/wordpress-themes-exploits-are-in-action-wpscan/","created_at":"2014-08-01T10:52:11.631Z","updated_at":"2014-08-01T10:52:11.631Z"}]}},{"colormix":{"vulnerabilities":[{"id":93910,"title":"Colormix - Multiple vulnerabilities","url":"http://packetstormsecurity.com/files/121372/,http://seclists.org/fulldisclosure/2013/Apr/172","created_at":"2014-08-01T10:52:11.686Z","updated_at":"2014-08-01T10:52:11.686Z"}]}},{"jobroller":{"vulnerabilities":[{"id":93911,"title":"XSS in jobroller theme","url":"http://cxsecurity.com/issue/WLB-2013060089","created_at":"2014-08-01T10:52:11.774Z","updated_at":"2014-08-01T10:52:11.774Z"}]}},{"ambience":{"vulnerabilities":[{"id":93912,"title":"Xss In wordpress ambience theme","url":"http://www.websecuritywatch.com/wordpress-ambience-xss/","created_at":"2014-08-01T10:52:11.828Z","updated_at":"2014-08-01T10:52:11.828Z"}]}},{"slash-wp":{"vulnerabilities":[{"id":93913,"title":"Slash WP - FPD, XSS and CS vulnerabilities","url":"http://packetstormsecurity.com/files/123748/,http://seclists.org/fulldisclosure/2013/Jun/166","created_at":"2014-08-01T10:52:11.883Z","updated_at":"2014-08-01T10:52:11.883Z"}]}},{"persuasion":{"vulnerabilities":[{"id":93914,"title":"Persuasion - PrettyPhoto DOM XSS","url":"http://www.rafayhackingarticles.net/2013/05/kali-linux-dom-based-xss-writeup.html","created_at":"2014-08-01T10:52:11.942Z","updated_at":"2014-08-01T10:52:11.942Z"},{"id":93915,"title":"Persuasion \u003c= 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://packetstormsecurity.com/files/124547/,http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-08-01T10:52:11.999Z","updated_at":"2014-08-01T10:52:11.999Z","fixed_in":"2.5"},{"id":93916,"title":"Persuasion \u003c= 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://packetstormsecurity.com/files/124547/,http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-08-01T10:52:12.070Z","updated_at":"2014-08-01T10:52:12.070Z","fixed_in":"2.5"}]}},{"More":{"vulnerabilities":[{"id":93917,"title":"MORE+ - PrettyPhoto XSS Vulnerability","url":"http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0177.html","secunia":"54924","created_at":"2014-08-01T10:52:12.143Z","updated_at":"2014-08-01T10:52:12.143Z"}]}},{"silverorchid":{"vulnerabilities":[{"id":93918,"title":"silverOrchid \u003c= 1.5.0 - XSS Vulnerability","url":"http://packetstormsecurity.com/files/122986/","osvdb":"96723","secunia":"54662","created_at":"2014-08-01T10:52:12.201Z","updated_at":"2014-08-01T10:52:12.201Z"}]}},{"Caulk":{"vulnerabilities":[{"id":93919,"title":"Caulk - path disclosure vulnerability","url":"http://packetstormsecurity.com/files/120632/,http://themeforest.net/item/caulk/76108","osvdb":"90889","created_at":"2014-08-01T10:52:12.260Z","updated_at":"2014-08-01T10:52:12.260Z"}]}},{"WPLocalPlaces":{"vulnerabilities":[{"id":93920,"title":"WPLocalPlaces - File Upload Remote Code Execution","url":"http://packetstormsecurity.com/files/123697/","osvdb":"98806","created_at":"2014-08-01T10:52:12.332Z","updated_at":"2014-08-01T10:52:12.332Z"}]}},{"photocrati-theme":{"vulnerabilities":[{"id":93921,"title":"Photocrati 4.7.3 - photocrati-gallery/ecomm-sizes.php prod_id Parameter Reflected XSS","url":"http://packetstormsecurity.com/files/124986/","osvdb":"102717","secunia":"56690","created_at":"2014-08-01T10:52:12.395Z","updated_at":"2014-08-01T10:52:12.395Z"},{"id":93922,"title":"Photocrati - Multiple Script Direct Request Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Apr/238","osvdb":"92836","created_at":"2014-08-01T10:52:12.480Z","updated_at":"2014-08-01T10:52:12.480Z"}]}},{"music":{"vulnerabilities":[{"id":93923,"title":"Music - Multiple Script Direct Request Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Apr/238","osvdb":"92837","created_at":"2014-08-01T10:52:12.557Z","updated_at":"2014-08-01T10:52:12.557Z"}]}},{"imperial-fairytale":{"vulnerabilities":[{"id":93924,"title":"Imperial Fairytale - Multiple Script Direct Request Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Apr/238","osvdb":"92838","created_at":"2014-08-01T10:52:12.633Z","updated_at":"2014-08-01T10:52:12.633Z"},{"id":93925,"title":"Imperial Fairytale - jPlayer Cross-Site Scripting Vulnerability","url":"http://seclists.org/oss-sec/2013/q2/177","secunia":"53210","created_at":"2014-08-01T10:52:12.699Z","updated_at":"2014-08-01T10:52:12.699Z"}]}},{"feather12":{"vulnerabilities":[{"id":93926,"title":"Feather12 - Multiple Script Direct Request Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Apr/238","osvdb":"92839","created_at":"2014-08-01T10:52:12.759Z","updated_at":"2014-08-01T10:52:12.759Z"}]}},{"studiozen":{"vulnerabilities":[{"id":93927,"title":"Studio Zen - Multiple Script Direct Request Path Disclosure","url":"http://seclists.org/fulldisclosure/2013/Apr/238","osvdb":"92840","created_at":"2014-08-01T10:52:12.817Z","updated_at":"2014-08-01T10:52:12.817Z"}]}},{"area53":{"vulnerabilities":[{"id":93928,"title":"AREA53 \u003c= 1.0.5 - File Upload Code Execution","url":"http://www.securityfocus.com/bid/63306,http://1337day.com/exploit/21442","osvdb":"98927","exploitdb":"29068","created_at":"2014-08-01T10:52:12.886Z","updated_at":"2014-08-01T10:52:12.886Z"}]}},{"sahifa":{"vulnerabilities":[{"id":93929,"title":"Sahifa 2.4.0 - Multiple Script Path Disclosure Direct Request Path Disclosure","url":"http://packetstormsecurity.com/files/119191/,http://www.securityfocus.com/bid/57109","osvdb":"88926","created_at":"2014-08-01T10:52:12.944Z","updated_at":"2014-08-01T10:52:12.944Z"},{"id":93930,"title":"Sahifa 2.4.0 - Site Setting Reset CSRF","url":"http://packetstormsecurity.com/files/119191/,http://www.securityfocus.com/bid/57109","osvdb":"88927","created_at":"2014-08-01T10:52:12.996Z","updated_at":"2014-08-01T10:52:12.996Z"}]}},{"simpledark":{"vulnerabilities":[{"id":93931,"title":"SimpleDark 1.2.10 - 's' Parameter Cross Site Scripting Vulnerability","url":"http://www.securityfocus.com/bid/46615","created_at":"2014-08-01T10:52:13.049Z","updated_at":"2014-08-01T10:52:13.049Z"}]}},{"geoplaces4":{"vulnerabilities":[{"id":93932,"title":"GeoPlaces - File Upload Handling Remote Command Execution","url":"http://packetstormsecurity.com/files/123773/","osvdb":"98975","created_at":"2014-08-01T10:52:13.108Z","updated_at":"2014-08-01T10:52:13.108Z"}]}},{"GeoPlaces4beta":{"vulnerabilities":[{"id":93932,"title":"GeoPlaces - File Upload Handling Remote Command Execution","url":"http://packetstormsecurity.com/files/123773/","osvdb":"98975","created_at":"2014-08-01T10:52:13.108Z","updated_at":"2014-08-01T10:52:13.108Z"}]}},{"curvo":{"vulnerabilities":[{"id":93933,"title":"Curvo - wp-content/themes/curvo/functions/upload-handler.php File Upload CSRF","url":"http://packetstormsecurity.com/files/123799/,http://packetstormsecurity.com/files/123820/","osvdb":"99043","exploitdb":"29211","created_at":"2014-08-01T10:52:13.226Z","updated_at":"2014-08-01T10:52:13.226Z"}]}},{"MoneyTheme":{"vulnerabilities":[{"id":93934,"title":"Money - wp-content/themes/MoneyTheme/uploads/upload.php File Upload Remote Code Execution","url":"http://packetstormsecurity.com/files/123819/","osvdb":"99187","created_at":"2014-08-01T10:52:13.286Z","updated_at":"2014-08-01T10:52:13.286Z"}]}},{"saico":{"vulnerabilities":[{"id":93935,"title":"Saico - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21440","exploitdb":"29150","created_at":"2014-08-01T10:52:13.357Z","updated_at":"2014-08-01T10:52:13.357Z"}]}},{"ThisWay":{"vulnerabilities":[{"id":93936,"title":"ThisWay - remote shell upload vulnerability","url":"http://packetstormsecurity.com/files/123895/","secunia":"55587","created_at":"2014-08-01T10:52:13.409Z","updated_at":"2014-08-01T10:52:13.409Z"}]}},{"ThinkResponsive":{"vulnerabilities":[{"id":93937,"title":"Think Responsive 1.0 - Arbitrary shell upload vulnerability","url":"http://packetstormsecurity.com/files/123880/","exploitdb":"29332","created_at":"2014-08-01T10:52:13.476Z","updated_at":"2014-08-01T10:52:13.476Z"}]}},{"anthology":{"vulnerabilities":[{"id":93938,"title":"Anthology - Remote File Upload Vulnerability","url":"http://1337day.com/exploit/21460","created_at":"2014-08-01T10:52:13.542Z","updated_at":"2014-08-01T10:52:13.542Z"}]}},{"amoveo":{"vulnerabilities":[{"id":93939,"title":"Amoveo - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21451","created_at":"2014-08-01T10:52:13.595Z","updated_at":"2014-08-01T10:52:13.595Z"}]}},{"switchblade":{"vulnerabilities":[{"id":93940,"title":"Switchblade 1.3 - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21457","osvdb":"88918","exploitdb":"29330","created_at":"2014-08-01T10:52:13.647Z","updated_at":"2014-08-01T10:52:13.647Z"}]}},{"magnitudo":{"vulnerabilities":[{"id":93941,"title":"Magnitudo - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21457","created_at":"2014-08-01T10:52:13.698Z","updated_at":"2014-08-01T10:52:13.698Z"}]}},{"ghost":{"vulnerabilities":[{"id":93942,"title":"Ghost - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21416","created_at":"2014-08-01T10:52:13.763Z","updated_at":"2014-08-01T10:52:13.763Z"}]}},{"RightNow":{"vulnerabilities":[{"id":93943,"title":"Right Now - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21420","created_at":"2014-08-01T10:52:13.832Z","updated_at":"2014-08-01T10:52:13.832Z"}]}},{"ColdFusion":{"vulnerabilities":[{"id":93944,"title":"Cold Fusion - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21431","created_at":"2014-08-01T10:52:13.888Z","updated_at":"2014-08-01T10:52:13.888Z"}]}},{"chameleon":{"vulnerabilities":[{"id":93945,"title":"Chameleon - Arbitrary File Upload Vulnerability","url":"http://1337day.com/exploit/21449","created_at":"2014-08-01T10:52:13.941Z","updated_at":"2014-08-01T10:52:13.941Z"}]}},{"kernel-theme":{"vulnerabilities":[{"id":93946,"title":"Kernel Theme - functions/upload-handler.php File Upload Remote Code Execution","url":"http://packetstormsecurity.com/files/123954/","osvdb":"99553","exploitdb":"29482","created_at":"2014-08-01T10:52:14.000Z","updated_at":"2014-08-01T10:52:14.000Z"}]}},{"rockstar-theme":{"vulnerabilities":[{"id":93947,"title":"Rockstar - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21510","exploitdb":"29946","created_at":"2014-08-01T10:52:14.052Z","updated_at":"2014-08-01T10:52:14.052Z"}]}},{"reganto-theme":{"vulnerabilities":[{"id":93948,"title":"Reganto - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21511","exploitdb":"29946","created_at":"2014-08-01T10:52:14.109Z","updated_at":"2014-08-01T10:52:14.109Z"}]}},{"rayoflight-theme":{"vulnerabilities":[{"id":93949,"title":"Ray of Light - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21512","exploitdb":"29946","created_at":"2014-08-01T10:52:14.160Z","updated_at":"2014-08-01T10:52:14.160Z"}]}},{"radial-theme":{"vulnerabilities":[{"id":93950,"title":"Radial - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21513","exploitdb":"29946","created_at":"2014-08-01T10:52:14.219Z","updated_at":"2014-08-01T10:52:14.219Z"}]}},{"oxygen-theme":{"vulnerabilities":[{"id":93951,"title":"Oxygen - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21514","exploitdb":"29946","created_at":"2014-08-01T10:52:14.277Z","updated_at":"2014-08-01T10:52:14.277Z"}]}},{"bulteno-theme":{"vulnerabilities":[{"id":93952,"title":"Bulteno - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21515","exploitdb":"29946","created_at":"2014-08-01T10:52:14.347Z","updated_at":"2014-08-01T10:52:14.347Z"}]}},{"bordeaux-theme":{"vulnerabilities":[{"id":93953,"title":"Bordeaux - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/123999/,http://packetstormsecurity.com/files/124232/,http://1337day.com/exploit/21516","exploitdb":"29946","created_at":"2014-08-01T10:52:14.405Z","updated_at":"2014-08-01T10:52:14.405Z"}]}},{"agritourismo-theme":{"vulnerabilities":[{"id":93954,"title":"Agritourismo - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/124232/","exploitdb":"29946","created_at":"2014-08-01T10:52:14.460Z","updated_at":"2014-08-01T10:52:14.460Z"}]}},{"highlight":{"vulnerabilities":[{"id":93955,"title":"Highlight Powerful Premium - upload-handler.php File Upload CSRF","url":"http://packetstormsecurity.com/files/123974/","osvdb":"99703","secunia":"55671","exploitdb":"29525","created_at":"2014-08-01T10:52:14.517Z","updated_at":"2014-08-01T10:52:14.517Z"}]}},{"euclid":{"vulnerabilities":[{"id":93956,"title":"Euclid - CSRF Vulnerability","url":"http://packetstormsecurity.com/files/124043/,http://1337day.com/exploit/21538","exploitdb":"29667","created_at":"2014-08-01T10:52:14.575Z","updated_at":"2014-08-01T10:52:14.575Z"}]}},{"dimension":{"vulnerabilities":[{"id":93957,"title":"Dimension - CSRF Vulnerability","url":"http://packetstormsecurity.com/files/124042/,http://1337day.com/exploit/21537","exploitdb":"29668","created_at":"2014-08-01T10:52:14.631Z","updated_at":"2014-08-01T10:52:14.631Z"}]}},{"amplus":{"vulnerabilities":[{"id":93958,"title":"Amplus - CSRF Vulnerability","url":"http://packetstormsecurity.com/files/124041/,http://1337day.com/exploit/21535","exploitdb":"29669","created_at":"2014-08-01T10:52:14.683Z","updated_at":"2014-08-01T10:52:14.683Z"}]}},{"make_a_statement":{"vulnerabilities":[{"id":93959,"title":"Make A Statement - CSRF Vulnerability","url":"http://packetstormsecurity.com/files/124044/,http://1337day.com/exploit/21536","exploitdb":"29670","created_at":"2014-08-01T10:52:14.737Z","updated_at":"2014-08-01T10:52:14.737Z"}]}},{"ithemes2":{"vulnerabilities":[{"id":93960,"title":"iThemes2 - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/","osvdb":"100271","created_at":"2014-08-01T10:52:14.794Z","updated_at":"2014-08-01T10:52:14.794Z"}]}},{"suco":{"vulnerabilities":[{"id":93961,"title":"Suco - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124094/","osvdb":"100271","created_at":"2014-08-01T10:52:14.851Z","updated_at":"2014-08-01T10:52:14.851Z"}]}},{"elemin":{"vulnerabilities":[{"id":93962,"title":"Elemin - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124149/","osvdb":"100271","created_at":"2014-08-01T10:52:14.919Z","updated_at":"2014-08-01T10:52:14.919Z"}]}},{"folo":{"vulnerabilities":[{"id":93963,"title":"Folo - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124150/","osvdb":"100271","created_at":"2014-08-01T10:52:14.970Z","updated_at":"2014-08-01T10:52:14.970Z"},{"id":93964,"title":"Folo - Cross Site Scripting","url":"http://packetstormsecurity.com/files/124230/","created_at":"2014-08-01T10:52:15.023Z","updated_at":"2014-08-01T10:52:15.023Z"}]}},{"Bloggie":{"vulnerabilities":[{"id":93965,"title":"Bloggie - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124152/","osvdb":"100271","created_at":"2014-08-01T10:52:15.075Z","updated_at":"2014-08-01T10:52:15.075Z"}]}},{"blogfolio":{"vulnerabilities":[{"id":93966,"title":"Blogfolio - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124156/","osvdb":"100271","created_at":"2014-08-01T10:52:15.129Z","updated_at":"2014-08-01T10:52:15.129Z"}]}},{"OptimizePress":{"vulnerabilities":[{"id":93967,"title":"OptimizePress - File Upload Vulnerability","url":"http://packetstormsecurity.com/files/124246/,http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/","osvdb":"100509","cve":"2013-7102","secunia":"56379","created_at":"2014-08-01T10:52:15.182Z","updated_at":"2014-08-01T10:52:15.182Z","metasploit":"exploit/unix/webapp/php_wordpress_optimizepress","fixed_in":"1.6"}]}},{"blooog":{"vulnerabilities":[{"id":93968,"title":"Blooog 1.1 - jplayer.swf Cross Site Scripting","url":"http://packetstormsecurity.com/files/124240/,http://xforce.iss.net/xforce/xfdb/89356","osvdb":"92254","cve":"2013-7129","created_at":"2014-08-01T10:52:15.239Z","updated_at":"2014-08-01T10:52:15.239Z"}]}},{"toolbox":{"vulnerabilities":[{"id":93969,"title":"Toolbox 1.4 - flyer.php mls Parameter SQL Injection","url":"http://www.securityfocus.com/bid/56745","osvdb":"88293","created_at":"2014-08-01T10:52:15.321Z","updated_at":"2014-08-01T10:52:15.321Z"}]}},{"oberliga_theme":{"vulnerabilities":[{"id":93970,"title":"Oberliga - team.php team Parameter SQL Injection","url":"http://packetstormsecurity.org/files/118368/,http://xforce.iss.net/xforce/xfdb/80273","osvdb":"88454","created_at":"2014-08-01T10:52:15.375Z","updated_at":"2014-08-01T10:52:15.375Z"}]}},{"cstardesign":{"vulnerabilities":[{"id":93971,"title":"CStar Design 2.0 - flashmoXML.php id Parameter SQL Injection","url":"http://www.securityfocus.com/bid/56694","osvdb":"88291","created_at":"2014-08-01T10:52:15.428Z","updated_at":"2014-08-01T10:52:15.428Z"}]}},{"malmonation":{"vulnerabilities":[{"id":93972,"title":"Malmonation - debate.php id Parameter SQL Injection","url":"http://packetstormsecurity.org/files/118340/,http://xforce.iss.net/xforce/xfdb/80252","osvdb":"87866","created_at":"2014-08-01T10:52:15.482Z","updated_at":"2014-08-01T10:52:15.482Z"}]}},{"lightspeed":{"vulnerabilities":[{"id":93973,"title":"LightSpeed - Valums Uploader Shell Upload Exploit","url":"http://packetstormsecurity.com/files/119241/","created_at":"2014-08-01T10:52:15.537Z","updated_at":"2014-08-01T10:52:15.537Z"}]}},{"eptonic":{"vulnerabilities":[{"id":93974,"title":"Eptonic - Valums Uploader Shell Upload Exploit","url":"http://packetstormsecurity.com/files/119241/","created_at":"2014-08-01T10:52:15.591Z","updated_at":"2014-08-01T10:52:15.591Z"}]}},{"nuance":{"vulnerabilities":[{"id":93975,"title":"Nuance - Valums Uploader Shell Upload Exploit","url":"http://packetstormsecurity.com/files/119241/","created_at":"2014-08-01T10:52:15.643Z","updated_at":"2014-08-01T10:52:15.643Z"}]}},{"dejavu":{"vulnerabilities":[{"id":93976,"title":"DejaVu 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-08-01T10:52:15.697Z","updated_at":"2014-08-01T10:52:15.697Z","fixed_in":"2.5"},{"id":93977,"title":"DejaVu 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-08-01T10:52:15.760Z","updated_at":"2014-08-01T10:52:15.760Z","fixed_in":"2.5"}]}},{"elegance":{"vulnerabilities":[{"id":93978,"title":"Elegance - lib/scripts/dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Access","url":"http://packetstormsecurity.com/files/126989/","osvdb":"108100","created_at":"2014-08-01T10:52:15.833Z","updated_at":"2014-08-01T10:52:15.833Z"},{"id":93979,"title":"Elegance 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-08-01T10:52:15.890Z","updated_at":"2014-08-01T10:52:15.890Z","fixed_in":"2.5"},{"id":93980,"title":"Elegance 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-08-01T10:52:15.953Z","updated_at":"2014-08-01T10:52:15.953Z","fixed_in":"2.5"}]}},{"echelon":{"vulnerabilities":[{"id":93981,"title":"Echelon - media-upload.php Remote File Upload","url":"http://www.securityfocus.com/bid/67080,http://packetstormsecurity.com/files/126327/","osvdb":"106929","created_at":"2014-08-01T10:52:16.020Z","updated_at":"2014-08-01T10:52:16.020Z"},{"id":93982,"title":"Echelon 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-08-01T10:52:16.076Z","updated_at":"2014-08-01T10:52:16.076Z","fixed_in":"2.5"},{"id":93983,"title":"Echelon 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-08-01T10:52:16.140Z","updated_at":"2014-08-01T10:52:16.140Z","fixed_in":"2.5"}]}},{"modular":{"vulnerabilities":[{"id":93984,"title":"Modular 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-08-01T10:52:16.208Z","updated_at":"2014-08-01T10:52:16.208Z","fixed_in":"2.5"},{"id":93985,"title":"Modular 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-08-01T10:52:16.267Z","updated_at":"2014-08-01T10:52:16.267Z","fixed_in":"2.5"}]}},{"fusion":{"vulnerabilities":[{"id":93986,"title":"Fusion 2.1 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-08-01T10:52:16.342Z","updated_at":"2014-08-01T10:52:16.342Z","fixed_in":"2.2"},{"id":93987,"title":"Fusion 2.1 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-08-01T10:52:16.410Z","updated_at":"2014-08-01T10:52:16.410Z","fixed_in":"2.2"}]}},{"method":{"vulnerabilities":[{"id":93988,"title":"Method 2.1 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-08-01T10:52:16.476Z","updated_at":"2014-08-01T10:52:16.476Z","fixed_in":"2.5"},{"id":93989,"title":"Method 2.1 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-08-01T10:52:16.542Z","updated_at":"2014-08-01T10:52:16.542Z","fixed_in":"2.2"}]}},{"myriad":{"vulnerabilities":[{"id":93990,"title":"Myriad 2.0 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-08-01T10:52:16.608Z","updated_at":"2014-08-01T10:52:16.608Z","fixed_in":"2.5"},{"id":93991,"title":"Myriad 2.0 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-08-01T10:52:16.671Z","updated_at":"2014-08-01T10:52:16.671Z","fixed_in":"2.1"}]}},{"construct":{"vulnerabilities":[{"id":93992,"title":"Construct 1.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-08-01T10:52:16.737Z","updated_at":"2014-08-01T10:52:16.737Z","fixed_in":"2.5"},{"id":93993,"title":"Construct 1.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-08-01T10:52:16.798Z","updated_at":"2014-08-01T10:52:16.798Z","fixed_in":"1.5"}]}},{"awake":{"vulnerabilities":[{"id":93994,"title":"Awake 3.3 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-08-01T10:52:16.863Z","updated_at":"2014-08-01T10:52:16.863Z","fixed_in":"2.5"},{"id":93995,"title":"Awake 3.3 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-08-01T10:52:16.926Z","updated_at":"2014-08-01T10:52:16.926Z","fixed_in":"3.4"}]}},{"infocus":{"vulnerabilities":[{"id":93996,"title":"InFocus - lib/scripts/dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Access","url":"http://packetstormsecurity.com/files/126988/","osvdb":"108099","created_at":"2014-08-01T10:52:16.988Z","updated_at":"2014-08-01T10:52:16.988Z"},{"id":93997,"title":"InFocus - prettyPhoto Cross-Site Scripting Vulnerability","url":"http://packetstormsecurity.com/files/124960/","secunia":"56583","created_at":"2014-08-01T10:52:17.046Z","updated_at":"2014-08-01T10:52:17.046Z"},{"id":93998,"title":"InFocus 3.3 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":"http://www.securityfocus.com/bid/64501","osvdb":"101330","exploitdb":"30443","created_at":"2014-08-01T10:52:17.103Z","updated_at":"2014-08-01T10:52:17.103Z","fixed_in":"3.4"},{"id":93999,"title":"InFocus 3.3 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":"http://www.securityfocus.com/bid/64501","osvdb":"101331","secunia":"56359","exploitdb":"30443","created_at":"2014-08-01T10:52:17.159Z","updated_at":"2014-08-01T10:52:17.159Z","fixed_in":"3.4"}]}},{"elegant-grunge":{"vulnerabilities":[{"id":94000,"title":"Elegant Grunge 1.0.3 - s Parameter XSS","url":"http://www.securityfocus.com/bid/49869","osvdb":"75942","cve":"2011-3856","created_at":"2014-08-01T10:52:17.220Z","updated_at":"2014-08-01T10:52:17.220Z","fixed_in":"1.0.4"}]}},{"simplebalance":{"vulnerabilities":[{"id":94001,"title":"Simple Balance \u003c= 2.2.1 - index.php s Parameter XSS","url":"http://packetstormsecurity.com/files/106341/","osvdb":"76722","secunia":"46671","created_at":"2014-08-01T10:52:17.297Z","updated_at":"2014-08-01T10:52:17.297Z"}]}},{"codilight":{"vulnerabilities":[{"id":94002,"title":"Codilight Premium 1.0.0 - admin/front-end/options.php reset Parameter XSS","osvdb":"100791","created_at":"2014-08-01T10:52:17.354Z","updated_at":"2014-08-01T10:52:17.354Z"}]}},{"iloveit":{"vulnerabilities":[{"id":94003,"title":"Love It - XSS / Content Spoofing / Path Disclosure","url":"http://packetstormsecurity.com/files/122386/","created_at":"2014-08-01T10:52:17.404Z","updated_at":"2014-08-01T10:52:17.404Z"}]}},{"dandelion":{"vulnerabilities":[{"id":94004,"title":"Dandelion - Arbitry File Upload","url":"http://packetstormsecurity.com/files/125098/","osvdb":"99043","exploitdb":"31424","created_at":"2014-08-01T10:52:17.455Z","updated_at":"2014-08-01T10:52:17.455Z"}]}},{"kiddo":{"vulnerabilities":[{"id":94005,"title":"Kiddo - remote shell upload vulnerability","url":"http://packetstormsecurity.com/files/125138/","secunia":"56874","created_at":"2014-08-01T10:52:17.510Z","updated_at":"2014-08-01T10:52:17.510Z"}]}},{"thecotton_v114":{"vulnerabilities":[{"id":94006,"title":"The Cotton - Remote File Upload Vulnerability","url":"http://packetstormsecurity.com/files/125506/,http://www.securityfocus.com/bid/65958,http://seclists.org/bugtraq/2014/Mar/9","osvdb":"103911","created_at":"2014-08-01T10:52:17.567Z","updated_at":"2014-08-01T10:52:17.567Z"}]}},{"Realestate":{"vulnerabilities":[{"id":94007,"title":"Real Estate - Templatic Theme CSRF File Upload Vulnerability","url":"http://1337day.com/exploit/22091","created_at":"2014-08-01T10:52:17.618Z","updated_at":"2014-08-01T10:52:17.618Z"}]}},{"dailydeal":{"vulnerabilities":[{"id":94008,"title":"Dailydeal - Templatic Theme CSRF File Upload Vulnerability","url":"http://1337day.com/exploit/22091","created_at":"2014-08-01T10:52:17.670Z","updated_at":"2014-08-01T10:52:17.670Z"}]}},{"nightlife":{"vulnerabilities":[{"id":94009,"title":"Nightlife - Templatic Theme CSRF File Upload Vulnerability","url":"http://1337day.com/exploit/22091","created_at":"2014-08-01T10:52:17.725Z","updated_at":"2014-08-01T10:52:17.725Z"}]}},{"5star":{"vulnerabilities":[{"id":94010,"title":"5star - Templatic Theme CSRF File Upload Vulnerability","url":"http://1337day.com/exploit/22091","created_at":"2014-08-01T10:52:17.777Z","updated_at":"2014-08-01T10:52:17.777Z"}]}},{"specialist":{"vulnerabilities":[{"id":94011,"title":"Specialist - Templatic Theme CSRF File Upload Vulnerability","url":"http://1337day.com/exploit/22091","created_at":"2014-08-01T10:52:17.828Z","updated_at":"2014-08-01T10:52:17.828Z"}]}},{"flatshop":{"vulnerabilities":[{"id":94012,"title":"Flatshop - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:17.884Z","updated_at":"2014-08-01T10:52:17.884Z"}]}},{"magazine":{"vulnerabilities":[{"id":94013,"title":"Magazine - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:17.935Z","updated_at":"2014-08-01T10:52:17.935Z"}]}},{"parallax":{"vulnerabilities":[{"id":94014,"title":"Parallax - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:17.987Z","updated_at":"2014-08-01T10:52:17.987Z"}]}},{"bold":{"vulnerabilities":[{"id":94015,"title":"Bold - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.038Z","updated_at":"2014-08-01T10:52:18.038Z"}]}},{"metro":{"vulnerabilities":[{"id":94016,"title":"Metro - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.089Z","updated_at":"2014-08-01T10:52:18.089Z"}]}},{"pinshop":{"vulnerabilities":[{"id":94017,"title":"Pinshop - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.144Z","updated_at":"2014-08-01T10:52:18.144Z"}]}},{"agency":{"vulnerabilities":[{"id":94018,"title":"Agency - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.196Z","updated_at":"2014-08-01T10:52:18.196Z"}]}},{"slide":{"vulnerabilities":[{"id":94019,"title":"Slide - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.249Z","updated_at":"2014-08-01T10:52:18.249Z"}]}},{"postline":{"vulnerabilities":[{"id":94020,"title":"Postline - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.308Z","updated_at":"2014-08-01T10:52:18.308Z"}]}},{"fullscreen":{"vulnerabilities":[{"id":94021,"title":"Fulscreen - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.362Z","updated_at":"2014-08-01T10:52:18.362Z"}]}},{"shopo":{"vulnerabilities":[{"id":94022,"title":"Shopo - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.411Z","updated_at":"2014-08-01T10:52:18.411Z"}]}},{"minshop":{"vulnerabilities":[{"id":94023,"title":"Minshop - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.462Z","updated_at":"2014-08-01T10:52:18.462Z"}]}},{"notes":{"vulnerabilities":[{"id":94024,"title":"Notes - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.513Z","updated_at":"2014-08-01T10:52:18.513Z"}]}},{"shopdock":{"vulnerabilities":[{"id":94025,"title":"Shopdock - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.563Z","updated_at":"2014-08-01T10:52:18.563Z"}]}},{"phototouch":{"vulnerabilities":[{"id":94026,"title":"Phototouch - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.617Z","updated_at":"2014-08-01T10:52:18.617Z"}]}},{"basic":{"vulnerabilities":[{"id":94027,"title":"Basic - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.672Z","updated_at":"2014-08-01T10:52:18.672Z"}]}},{"responz":{"vulnerabilities":[{"id":94028,"title":"Responz - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.723Z","updated_at":"2014-08-01T10:52:18.723Z"}]}},{"simfo":{"vulnerabilities":[{"id":94029,"title":"Simfo - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.773Z","updated_at":"2014-08-01T10:52:18.773Z"}]}},{"grido":{"vulnerabilities":[{"id":94030,"title":"Grido - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.828Z","updated_at":"2014-08-01T10:52:18.828Z"}]}},{"tisa":{"vulnerabilities":[{"id":94031,"title":"Tisa - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.883Z","updated_at":"2014-08-01T10:52:18.883Z"}]}},{"funki":{"vulnerabilities":[{"id":94032,"title":"Funki - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.938Z","updated_at":"2014-08-01T10:52:18.938Z"}]}},{"minblr":{"vulnerabilities":[{"id":94033,"title":"Minblr - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:18.988Z","updated_at":"2014-08-01T10:52:18.988Z"}]}},{"newsy":{"vulnerabilities":[{"id":94034,"title":"Newsy - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:19.039Z","updated_at":"2014-08-01T10:52:19.039Z"}]}},{"wumblr":{"vulnerabilities":[{"id":94035,"title":"Wumblr - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:19.090Z","updated_at":"2014-08-01T10:52:19.090Z"}]}},{"rezo":{"vulnerabilities":[{"id":94036,"title":"Rezo - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:19.140Z","updated_at":"2014-08-01T10:52:19.140Z"}]}},{"photobox":{"vulnerabilities":[{"id":94037,"title":"Photobox - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:19.192Z","updated_at":"2014-08-01T10:52:19.192Z"}]}},{"edmin":{"vulnerabilities":[{"id":94038,"title":"Edmin - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:19.242Z","updated_at":"2014-08-01T10:52:19.242Z"}]}},{"koi":{"vulnerabilities":[{"id":94039,"title":"Koi - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:19.303Z","updated_at":"2014-08-01T10:52:19.303Z"}]}},{"bizco":{"vulnerabilities":[{"id":94040,"title":"Bizco - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:19.357Z","updated_at":"2014-08-01T10:52:19.357Z"}]}},{"thememin":{"vulnerabilities":[{"id":94041,"title":"Thememin - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:19.407Z","updated_at":"2014-08-01T10:52:19.407Z"}]}},{"wigi":{"vulnerabilities":[{"id":94042,"title":"Wigi - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:19.463Z","updated_at":"2014-08-01T10:52:19.463Z"}]}},{"sidepane":{"vulnerabilities":[{"id":94043,"title":"Sidepane - themify-ajax.php File Upload Arbitrary Code Execution","url":"http://packetstormsecurity.com/files/124097/,http://1337day.com/exploit/22090","osvdb":"100271","created_at":"2014-08-01T10:52:19.528Z","updated_at":"2014-08-01T10:52:19.528Z"}]}},{"Sixtees":{"vulnerabilities":[{"id":94044,"title":"Sixtees - Shell Upload","url":"http://packetstormsecurity.com/files/125491/","created_at":"2014-08-01T10:52:19.582Z","updated_at":"2014-08-01T10:52:19.582Z"}]}},{"linenity":{"vulnerabilities":[{"id":94045,"title":"LineNity 1.20 - download.php imgurl Parameter Remote Path Traversal File Access","osvdb":"105767","exploitdb":"32861","created_at":"2014-08-01T10:52:19.639Z","updated_at":"2014-08-01T10:52:19.639Z"}]}},{"SCv1":{"vulnerabilities":[{"id":94046,"title":"SCv1 - download.php file Parameter Traversal Remote File Access","url":"http://packetstormsecurity.com/files/127022/","osvdb":"107940","created_at":"2014-08-01T10:52:19.697Z","updated_at":"2014-08-01T10:52:19.697Z"}]}},{"magazine-basic":{"vulnerabilities":[{"id":94047,"title":"Magazine Basic - wp-content/themes/magazine-basic/view_artist.php id Parameter SQL Injection","url":"http://packetstormsecurity.com/files/118321/,http://www.securityfocus.com/bid/56664","osvdb":"87838","created_at":"2014-08-01T10:52:19.752Z","updated_at":"2014-08-01T10:52:19.752Z"}]}},{"newtheme":{"vulnerabilities":[{"id":94048,"title":"testing123","url":"http://www.example.com,http://www.example1.com,http://www.example2.com","created_at":"2014-08-01T11:57:51.771Z","updated_at":"2014-08-01T11:57:51.771Z"},{"id":94049,"title":"testing 123","created_at":"2014-08-01T11:58:16.803Z","updated_at":"2014-08-01T11:58:16.803Z"}]}},{"Centum":{"vulnerabilities":[{"id":94063,"title":"Mulitple WordPress Themes (admin-ajax.php, img param) - Arbitrary File Download","url":"http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html","exploitdb":"34511","created_at":"2014-09-05T10:56:43.626Z","updated_at":"2014-09-05T10:56:43.626Z"}]}},{"Test":{"vulnerabilities":[{"id":94064,"title":"testing downcasing assets","url":"http://www.example.com","created_at":"2014-09-05T10:59:03.291Z","updated_at":"2014-09-05T10:59:03.291Z"}]}},{"Test1":{"vulnerabilities":[{"id":94065,"title":"testing downcasing assets","url":"http://www.example.com","created_at":"2014-09-05T11:01:21.915Z","updated_at":"2014-09-05T11:01:21.915Z"}]}},{"Test2":{"vulnerabilities":[{"id":94065,"title":"testing downcasing assets","url":"http://www.example.com","created_at":"2014-09-05T11:01:21.915Z","updated_at":"2014-09-05T11:01:21.915Z"}]}},{"Test3":{"vulnerabilities":[{"id":94066,"title":"testing downcase assets 123","url":"http://www.example.com","created_at":"2014-09-05T11:03:17.234Z","updated_at":"2014-09-05T11:03:17.234Z"}]}},{"Test4":{"vulnerabilities":[{"id":94066,"title":"testing downcase assets 123","url":"http://www.example.com","created_at":"2014-09-05T11:03:17.234Z","updated_at":"2014-09-05T11:03:17.234Z"}]}},{"Test5":{"vulnerabilities":[{"id":94067,"title":"testing downcasing assets 1234","url":"http://www.example.com","created_at":"2014-09-05T11:04:36.175Z","updated_at":"2014-09-05T11:04:36.175Z"}]}},{"Test6":{"vulnerabilities":[{"id":94067,"title":"testing downcasing assets 1234","url":"http://www.example.com","created_at":"2014-09-05T11:04:36.175Z","updated_at":"2014-09-05T11:04:36.175Z"}]}},{"upcvase":{"vulnerabilities":[{"id":94070,"title":"testing theme and plugin name downcasing","url":"http://www.example.com,http://www.example2.com","created_at":"2014-09-05T11:23:09.793Z","updated_at":"2014-09-08T13:51:59.461Z"}]}},{"uuiuiuij":{"vulnerabilities":[{"id":94070,"title":"testing theme and plugin name downcasing","url":"http://www.example.com,http://www.example2.com","created_at":"2014-09-05T11:23:09.793Z","updated_at":"2014-09-08T13:51:59.461Z"}]}}] |