git.schokokeks.org
Repositories
Help
Report an Issue
freewvs.git
Code
Commits
Branches
Tags
Suche
Strukturansicht:
0a192a6
Branches
Tags
master
v0.1.1
v0.1.2
v0.1.3
v0.1.4
freewvs.git
freewvsdb
blog.freewvs
wordpress update
Hanno
commited
0a192a6
at 2019-03-14 13:05:50
blog.freewvs
Blame
History
Raw
[Serendipity] url=http://www.s9y.org/ safe=2.1.4 vuln=http://blog.s9y.org/archives/280-Serendipity-2.1.4-and-2.2.1-alpha1-released.html file=serendipity_config.inc.php variable=$serendipity['version'] subdir=0 [Wordpress] url=http://www.wordpress.org/ safe=5.1.1 old_safe=5.0.5,5.0.4,4.9.11,4.9.10,4.8.10,4.8.9,4.7.14,4.7.13,4.6.15,4.6.14,4.5.18,4.5.17,4.4.19,4.4.18,4.3.20,4.3.19,4.2.24,4.2.23,4.1.27,4.1.26,4.0.27,4.0.26,3.9.27,3.9.26,3.8.29,3.8.28,3.7.29,3.7.28 vuln=https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/ file=version.php variable=$wp_version subdir=1 extra_match=The WordPress version string [SimplePHPBlog] url=http://www.simplephpblog.com/ safe=0.5.1 vuln=CVE-2007-5071 file=sb_functions.php variable=$sb_info[ 'version' ] subdir=1 [b2evolution] url=http://b2evolution.net/ safe=1.9.2 old_safe=1.8.7 vuln=CVE-2007-0175 file=_application.php variable=$app_version extra_match=This is b2evolution subdir=2 [nucleuscms] url=http://www.nucleuscms.org/ safe=3.40 vuln=CVE-2009-0929 file=globalfunctions.php variable=$nucleus['version'] subdir=2 [sBlog] url=http://sblog.se # Last release 0.7.3 since 2006-03-09 safe= vuln=CVE-2007-1801 file=version.ini variable=conf_current_version subdir=1 extra_match=[sblog_version_info] [Movable_Type] url=http://www.movabletype.com/ # movable type has a crazy versioning scheme, that makes it basically # impossible to really use freewvs properly, latest is 5.2.3 safe=5.13 old_safe=5.2.3,5.2.2,5.2.1 vuln=CVE-2010-3921 file=mt.php variable=VERSION_ID subdir=1 [artmedic_weblog] url=http://www.artmedic-phpscripts.de/ safe= # 1.0 as of 20080325 vuln=CVE-2008-0798 file=artmedic_index.php variable=# artmedic weblog subdir=0 [DotClear] url=http://www.dotclear.net/ safe=2.2.3 vuln=CVE-2011-1584 file=LISEZMOI.txt variable=DotClear subdir=0