Browse code

add json db

Hanno Böck authored on11/12/2019 18:39:41
Showing1 changed files
1 1
deleted file mode 100644
... ...
@@ -1,191 +0,0 @@
1
-[Serendipity-mycalendar]
2
-url=https://s9y.org
3
-safe=0.13
4
-vuln=CVE-2007-6390
5
-file=serendipity_event_mycalendar.php
6
-variable=$propbag->add('version'
7
-subdir=0
8
-
9
-[Serendipity-freetag]
10
-url=https://s9y.org
11
-safe=3.69
12
-vuln=https://github.com/s9y/additional_plugins/commit/3edecdb7eccc24e0d5c63a3d5702dba54599bda3
13
-file=serendipity_event_freetag.php
14
-variable=$propbag->add('version'
15
-subdir=0
16
-
17
-[SquirrelMail-gpg]
18
-url=https://squirrelmail.org/plugin_view.php?id=153
19
-safe=2.1
20
-vuln=CVE-2007-3779
21
-file=gpg_pref_functions.php
22
-variable=$GPG_VERSION
23
-subdir=0
24
-
25
-[Drupal-Views]
26
-url=https://www.drupal.org/project/views
27
-safe=2.13
28
-vuln=CVE-2011-4113
29
-file=views.info
30
-variable=version = "6.x
31
-subdir=0
32
-
33
-[Wordpress-timthumb]
34
-url=https://github.com/GabrielGil/TimThumb
35
-safe=2.8.14
36
-vuln=CVE-2014-4663
37
-file=timthumb.php
38
-variable=('VERSION',
39
-extra_match=TimThumb
40
-subdir=0
41
-
42
-[Wordpress-timthumb-renamed]
43
-url=https://github.com/GabrielGil/TimThumb
44
-safe=2.8.14
45
-vuln=CVE-2014-4663
46
-file=thumb.php
47
-variable=('VERSION',
48
-extra_match=TimThumb
49
-subdir=0
50
-
51
-[Joomla-JCE]
52
-url=https://www.joomlacontenteditor.net/
53
-safe=2.1
54
-vuln=CVE-2012-2902
55
-file=editor.php
56
-variable=$_version
57
-extra_match=JCE class
58
-subdir=3
59
-
60
-[WP Super Cache]
61
-url=https://wordpress.org/plugins/wp-super-cache/
62
-safe=1.6.9
63
-latest=1.7.0
64
-vuln=https://odd.blog/2019/07/25/wp-super-cache-1-6-9-security-update/
65
-file=wp-cache.php
66
-variable=Version:
67
-extra_match=Plugin Name: WP Super Cache
68
-subdir=0
69
-
70
-[W3 Total Cache]
71
-url=https://wordpress.org/plugins/w3-total-cache/
72
-safe=0.9.7.4
73
-vuln=https://www.cybersecurity-help.cz/vdb/SB2019050701
74
-file=w3-total-cache.php
75
-variable=Version:
76
-extra_match=Plugin Name: W3 Total Cache
77
-subdir=0
78
-
79
-[phpThumb]
80
-url=http://phpthumb.sourceforge.net/
81
-safe=1.7.10
82
-vuln=CVE-2010-1598
83
-file=phpthumb.class.php
84
-variable=$phpthumb_version
85
-subdir=0
86
-
87
-[Wordpress-Jetpack]
88
-url=https://jetpack.com/
89
-safe=7.9.1
90
-vuln=https://jetpack.com/2019/11/19/jetpack-7-9-1-maintenance-security/
91
-file=jetpack.php
92
-variable=JETPACK__VERSION
93
-subdir=0
94
-
95
-[Wordpress-MailPoet]
96
-url=https://www.mailpoet.com/
97
-safe=2.6.8
98
-vuln=CVE-2014-4726
99
-file=base.php
100
-variable=static $version
101
-extra_match=WYSIJA_object
102
-subdir=0
103
-
104
-[Wordpress-CustomContact]
105
-url=https://wordpress.org/plugins/custom-contact-forms/
106
-safe=5.1.0.4
107
-vuln=http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html
108
-file=custom-contact-forms.php
109
-variable=Version
110
-subdir=0
111
-
112
-[Wordpress-SliderRevolution]
113
-url=https://revolution.themepunch.com/
114
-# unclear about exact version
115
-safe=4.2.3
116
-vuln=CVE-2015-5151
117
-file=revslider.php
118
-variable=$revSliderVersion
119
-subdir=0
120
-
121
-[Wordpress-NextGEN]
122
-url=https://wordpress.org/plugins/nextgen-gallery/
123
-safe=3.2.11
124
-vuln=CVE-2019-14314
125
-file=nggallery.php
126
-variable=NGG_PLUGIN_VERSION
127
-subdir=0
128
-
129
-[Wordpress-Akismet]
130
-url=https://wordpress.org/plugins/akismet/
131
-safe=3.1.5
132
-vuln=CVE-2015-9357
133
-file=akismet.php
134
-variable=AKISMET_VERSION
135
-subdir=0
136
-
137
-[Wordpress-AllInOneSEO]
138
-url=https://semperplugins.com/all-in-one-seo-pack-changelog/
139
-safe=3.2.7
140
-vuln=CVE-2019-16520
141
-file=all_in_one_seo_pack.php
142
-variable=define( 'AIOSEOP_VERSION'
143
-subdir=0
144
-
145
-[Wordpress-DownloadManager]
146
-url=https://wordpress.org/plugins/download-manager/
147
-safe=2.7.5
148
-vuln=http://blog.sucuri.net/2014/12/security-advisory-high-severity-wordpress-download-manager.html
149
-file=download-manager.php
150
-variable=define('WPDM_Version'
151
-subdir=0
152
-
153
-[Wordpress-Fancybox]
154
-url=https://wordpress.org/plugins/fancybox-for-wordpress/
155
-safe=3.0.4
156
-vuln=CVE-2015-1494
157
-file=fancybox.php
158
-variable=FBFW_VERSION
159
-subdir=0
160
-
161
-[Joomla-Googlemaps]
162
-url=http://joomlacode.org/gf/project/mambot_google1/
163
-safe=3.1
164
-vuln=http://joomlacode.org/gf/project/mambot_google1/news/?id=4119
165
-file=plugin_googlemap3.perm
166
-variable=<version>
167
-subdir=0
168
-
169
-[Wordpress-SEObyYoast]
170
-url=https://wordpress.org/plugins/wordpress-seo/
171
-safe=11.6.0
172
-vuln=CVE-2019-13478
173
-file=wp-seo-main.php
174
-variable=WPSEO_VERSION
175
-subdir=0
176
-
177
-[Wordpress-GoogleAnalyticsbyMonsterInsights]
178
-url=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/
179
-safe=5.4.5
180
-vuln=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/
181
-file=googleanalytics.php
182
-variable=GAWP_VERSION
183
-subdir=0
184
-
185
-[Wordpress-Captcha]
186
-url=https://wordpress.org/plugins/captcha/
187
-safe=4.4.5
188
-vuln=https://www.wordfence.com/blog/2017/12/backdoor-captcha-plugin/
189
-file=captcha.php
190
-variable=Version:
191
-subdir=0
Browse code

update movable type, avoid unneeded comments, fix CVEs, add latest, fix urls

Hanno Böck authored on11/12/2019 08:33:21
Showing1 changed files
... ...
@@ -121,7 +121,7 @@ subdir=0
121 121
 [Wordpress-NextGEN]
122 122
 url=https://wordpress.org/plugins/nextgen-gallery/
123 123
 safe=3.2.11
124
-vuln=2019-14314
124
+vuln=CVE-2019-14314
125 125
 file=nggallery.php
126 126
 variable=NGG_PLUGIN_VERSION
127 127
 subdir=0
... ...
@@ -169,7 +169,7 @@ subdir=0
169 169
 [Wordpress-SEObyYoast]
170 170
 url=https://wordpress.org/plugins/wordpress-seo/
171 171
 safe=11.6.0
172
-vuln=2019-13478
172
+vuln=CVE-2019-13478
173 173
 file=wp-seo-main.php
174 174
 variable=WPSEO_VERSION
175 175
 subdir=0
Browse code

update multiple wordpress plugins

Hanno Böck authored on09/12/2019 09:31:32
Showing1 changed files
... ...
@@ -59,9 +59,9 @@ subdir=3
59 59
 
60 60
 [WP Super Cache]
61 61
 url=https://wordpress.org/plugins/wp-super-cache/
62
-safe=1.4.9
63
-latest=1.4.9
64
-vuln=https://wptavern.com/wp-super-cache-1-4-9-patches-multiple-xss-vulnerabilities
62
+safe=1.6.9
63
+latest=1.7.0
64
+vuln=https://odd.blog/2019/07/25/wp-super-cache-1-6-9-security-update/
65 65
 file=wp-cache.php
66 66
 variable=Version:
67 67
 extra_match=Plugin Name: WP Super Cache
... ...
@@ -69,8 +69,8 @@ subdir=0
69 69
 
70 70
 [W3 Total Cache]
71 71
 url=https://wordpress.org/plugins/w3-total-cache/
72
-safe=0.9.5
73
-vuln=https://secupress.me/w3-total-cache-vulnerable-xss-high-risk/
72
+safe=0.9.7.4
73
+vuln=https://www.cybersecurity-help.cz/vdb/SB2019050701
74 74
 file=w3-total-cache.php
75 75
 variable=Version:
76 76
 extra_match=Plugin Name: W3 Total Cache
... ...
@@ -111,16 +111,17 @@ subdir=0
111 111
 
112 112
 [Wordpress-SliderRevolution]
113 113
 url=https://revolution.themepunch.com/
114
-safe=4.2.0
115
-vuln=http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html
114
+# unclear about exact version
115
+safe=4.2.3
116
+vuln=CVE-2015-5151
116 117
 file=revslider.php
117 118
 variable=$revSliderVersion
118 119
 subdir=0
119 120
 
120 121
 [Wordpress-NextGEN]
121 122
 url=https://wordpress.org/plugins/nextgen-gallery/
122
-safe=2.1.79
123
-vuln=https://blog.sucuri.net/2017/02/sql-injection-vulnerability-nextgen-gallery-wordpress.html
123
+safe=3.2.11
124
+vuln=2019-14314
124 125
 file=nggallery.php
125 126
 variable=NGG_PLUGIN_VERSION
126 127
 subdir=0
... ...
@@ -128,15 +129,15 @@ subdir=0
128 129
 [Wordpress-Akismet]
129 130
 url=https://wordpress.org/plugins/akismet/
130 131
 safe=3.1.5
131
-vuln=https://blog.sucuri.net/2015/10/security-advisory-stored-xss-in-akismet-wordpress-plugin.html
132
+vuln=CVE-2015-9357
132 133
 file=akismet.php
133 134
 variable=AKISMET_VERSION
134 135
 subdir=0
135 136
 
136 137
 [Wordpress-AllInOneSEO]
137 138
 url=https://semperplugins.com/all-in-one-seo-pack-changelog/
138
-safe=2.3.8
139
-vuln=https://www.wordfence.com/blog/2016/07/new-xss-vulnerability-all-in-one-seo-pack/
139
+safe=3.2.7
140
+vuln=CVE-2019-16520
140 141
 file=all_in_one_seo_pack.php
141 142
 variable=define( 'AIOSEOP_VERSION'
142 143
 subdir=0
Browse code

seobyyoast update

Hanno Böck authored on08/12/2019 17:03:15
Showing1 changed files
... ...
@@ -167,8 +167,8 @@ subdir=0
167 167
 
168 168
 [Wordpress-SEObyYoast]
169 169
 url=https://wordpress.org/plugins/wordpress-seo/
170
-safe=2.2
171
-vuln=https://inventropy.us/blog/yoast-seo-plugin-cross-site-scripting-vulnerability/
170
+safe=11.6.0
171
+vuln=2019-13478
172 172
 file=wp-seo-main.php
173 173
 variable=WPSEO_VERSION
174 174
 subdir=0
Browse code

update many urls to https

Hanno Böck authored on08/12/2019 16:19:01
Showing1 changed files
... ...
@@ -1,5 +1,5 @@
1 1
 [Serendipity-mycalendar]
2
-url=http://www.s9y.org
2
+url=https://s9y.org
3 3
 safe=0.13
4 4
 vuln=CVE-2007-6390
5 5
 file=serendipity_event_mycalendar.php
... ...
@@ -7,7 +7,7 @@ variable=$propbag->add('version'
7 7
 subdir=0
8 8
 
9 9
 [Serendipity-freetag]
10
-url=http://www.s9y.org
10
+url=https://s9y.org
11 11
 safe=3.69
12 12
 vuln=https://github.com/s9y/additional_plugins/commit/3edecdb7eccc24e0d5c63a3d5702dba54599bda3
13 13
 file=serendipity_event_freetag.php
... ...
@@ -15,7 +15,7 @@ variable=$propbag->add('version'
15 15
 subdir=0
16 16
 
17 17
 [SquirrelMail-gpg]
18
-url=http://www.squirrelmail.org/plugin_view.php?id=153
18
+url=https://squirrelmail.org/plugin_view.php?id=153
19 19
 safe=2.1
20 20
 vuln=CVE-2007-3779
21 21
 file=gpg_pref_functions.php
... ...
@@ -23,7 +23,7 @@ variable=$GPG_VERSION
23 23
 subdir=0
24 24
 
25 25
 [Drupal-Views]
26
-url=http://drupal.org/project/views
26
+url=https://www.drupal.org/project/views
27 27
 safe=2.13
28 28
 vuln=CVE-2011-4113
29 29
 file=views.info
... ...
@@ -49,7 +49,7 @@ extra_match=TimThumb
49 49
 subdir=0
50 50
 
51 51
 [Joomla-JCE]
52
-url=http://www.joomlacontenteditor.net/
52
+url=https://www.joomlacontenteditor.net/
53 53
 safe=2.1
54 54
 vuln=CVE-2012-2902
55 55
 file=editor.php
... ...
@@ -58,7 +58,7 @@ extra_match=JCE class
58 58
 subdir=3
59 59
 
60 60
 [WP Super Cache]
61
-url=http://wordpress.org/extend/plugins/wp-super-cache/
61
+url=https://wordpress.org/plugins/wp-super-cache/
62 62
 safe=1.4.9
63 63
 latest=1.4.9
64 64
 vuln=https://wptavern.com/wp-super-cache-1-4-9-patches-multiple-xss-vulnerabilities
... ...
@@ -68,7 +68,7 @@ extra_match=Plugin Name: WP Super Cache
68 68
 subdir=0
69 69
 
70 70
 [W3 Total Cache]
71
-url=http://wordpress.org/extend/plugins/w3-total-cache/
71
+url=https://wordpress.org/plugins/w3-total-cache/
72 72
 safe=0.9.5
73 73
 vuln=https://secupress.me/w3-total-cache-vulnerable-xss-high-risk/
74 74
 file=w3-total-cache.php
... ...
@@ -93,7 +93,7 @@ variable=JETPACK__VERSION
93 93
 subdir=0
94 94
 
95 95
 [Wordpress-MailPoet]
96
-url=http://www.mailpoet.com/
96
+url=https://www.mailpoet.com/
97 97
 safe=2.6.8
98 98
 vuln=CVE-2014-4726
99 99
 file=base.php
... ...
@@ -110,7 +110,7 @@ variable=Version
110 110
 subdir=0
111 111
 
112 112
 [Wordpress-SliderRevolution]
113
-url=http://themepunch.com/revolution/
113
+url=https://revolution.themepunch.com/
114 114
 safe=4.2.0
115 115
 vuln=http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html
116 116
 file=revslider.php
... ...
@@ -134,7 +134,7 @@ variable=AKISMET_VERSION
134 134
 subdir=0
135 135
 
136 136
 [Wordpress-AllInOneSEO]
137
-url=http://semperfiwebdesign.com/blog/all-in-one-seo-pack/all-in-one-seo-pack-release-history/
137
+url=https://semperplugins.com/all-in-one-seo-pack-changelog/
138 138
 safe=2.3.8
139 139
 vuln=https://www.wordfence.com/blog/2016/07/new-xss-vulnerability-all-in-one-seo-pack/
140 140
 file=all_in_one_seo_pack.php
... ...
@@ -166,7 +166,7 @@ variable=<version>
166 166
 subdir=0
167 167
 
168 168
 [Wordpress-SEObyYoast]
169
-url=https://wpvulndb.com/vulnerabilities/7841https://wordpress.org/plugins/fancybox-for-wordpress/
169
+url=https://wordpress.org/plugins/wordpress-seo/
170 170
 safe=2.2
171 171
 vuln=https://inventropy.us/blog/yoast-seo-plugin-cross-site-scripting-vulnerability/
172 172
 file=wp-seo-main.php
... ...
@@ -182,7 +182,7 @@ variable=GAWP_VERSION
182 182
 subdir=0
183 183
 
184 184
 [Wordpress-Captcha]
185
-url=https://de.wordpress.org/plugins/captcha/
185
+url=https://wordpress.org/plugins/captcha/
186 186
 safe=4.4.5
187 187
 vuln=https://www.wordfence.com/blog/2017/12/backdoor-captcha-plugin/
188 188
 file=captcha.php
Browse code

jetpack update

Hanno Böck authored on08/12/2019 16:09:35
Showing1 changed files
... ...
@@ -85,9 +85,9 @@ variable=$phpthumb_version
85 85
 subdir=0
86 86
 
87 87
 [Wordpress-Jetpack]
88
-url=http://jetpack.me/
89
-safe=4.0.4
90
-vuln=https://jetpack.com/2016/06/20/jetpack-4-0-4-bug-fixes/
88
+url=https://jetpack.com/
89
+safe=7.9.1
90
+vuln=https://jetpack.com/2019/11/19/jetpack-7-9-1-maintenance-security/
91 91
 file=jetpack.php
92 92
 variable=JETPACK__VERSION
93 93
 subdir=0
Browse code

update timthumb

Hanno authored on30/07/2018 15:31:17
Showing1 changed files
... ...
@@ -31,18 +31,18 @@ variable=version = "6.x
31 31
 subdir=0
32 32
 
33 33
 [Wordpress-timthumb]
34
-url=http://code.google.com/p/timthumb/
35
-safe=2.0
36
-vuln=CVE-2011-4106
34
+url=https://github.com/GabrielGil/TimThumb
35
+safe=2.8.14
36
+vuln=CVE-2014-4663
37 37
 file=timthumb.php
38 38
 variable=('VERSION',
39 39
 extra_match=TimThumb
40 40
 subdir=0
41 41
 
42 42
 [Wordpress-timthumb-renamed]
43
-url=http://code.google.com/p/timthumb/
44
-safe=2.0
45
-vuln=CVE-2011-4106
43
+url=https://github.com/GabrielGil/TimThumb
44
+safe=2.8.14
45
+vuln=CVE-2014-4663
46 46
 file=thumb.php
47 47
 variable=('VERSION',
48 48
 extra_match=TimThumb
Browse code

remove useless duplicate of timthumb-renamed

Hanno authored on30/07/2018 15:27:17
Showing1 changed files
... ...
@@ -39,7 +39,7 @@ variable=('VERSION',
39 39
 extra_match=TimThumb
40 40
 subdir=0
41 41
 
42
-[Wordpress-timthumb_renamed]
42
+[Wordpress-timthumb-renamed]
43 43
 url=http://code.google.com/p/timthumb/
44 44
 safe=2.0
45 45
 vuln=CVE-2011-4106
... ...
@@ -48,15 +48,6 @@ variable=('VERSION',
48 48
 extra_match=TimThumb
49 49
 subdir=0
50 50
 
51
-[Wordpress-timthumb-renamed]
52
-url=http://code.google.com/p/timthumb/
53
-safe=2.0
54
-vuln=CVE-2011-4106
55
-file=thumb.php
56
-variable=define ('VERSION',
57
-extra_match="TimThumb"
58
-subdir=0
59
-
60 51
 [Joomla-JCE]
61 52
 url=http://www.joomlacontenteditor.net/
62 53
 safe=2.1
Browse code

serendipity freetag update

Hanno authored on29/07/2018 10:17:21
Showing1 changed files
... ...
@@ -8,8 +8,8 @@ subdir=0
8 8
 
9 9
 [Serendipity-freetag]
10 10
 url=http://www.s9y.org
11
-safe=3.30
12
-vuln=CVE-2011-3610
11
+safe=3.69
12
+vuln=https://github.com/s9y/additional_plugins/commit/3edecdb7eccc24e0d5c63a3d5702dba54599bda3
13 13
 file=serendipity_event_freetag.php
14 14
 variable=$propbag->add('version'
15 15
 subdir=0
Browse code

add wp-captcha

Hanno Böck authored on20/12/2017 10:47:30
Showing1 changed files
... ...
@@ -189,3 +189,11 @@ vuln=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/
189 189
 file=googleanalytics.php
190 190
 variable=GAWP_VERSION
191 191
 subdir=0
192
+
193
+[Wordpress-Captcha]
194
+url=https://de.wordpress.org/plugins/captcha/
195
+safe=4.4.5
196
+vuln=https://www.wordfence.com/blog/2017/12/backdoor-captcha-plugin/
197
+file=captcha.php
198
+variable=Version:
199
+subdir=0
Browse code

wp super cache update

Hanno Böck authored on07/03/2017 01:30:03
Showing1 changed files
... ...
@@ -68,9 +68,9 @@ subdir=3
68 68
 
69 69
 [WP Super Cache]
70 70
 url=http://wordpress.org/extend/plugins/wp-super-cache/
71
-safe=1.4.5
72
-latest=1.4.8
73
-vuln=https://wpvulndb.com/vulnerabilities/8198
71
+safe=1.4.9
72
+latest=1.4.9
73
+vuln=https://wptavern.com/wp-super-cache-1-4-9-patches-multiple-xss-vulnerabilities
74 74
 file=wp-cache.php
75 75
 variable=Version:
76 76
 extra_match=Plugin Name: WP Super Cache
Browse code

update wordpress nextgen gallery

Hanno Böck authored on01/03/2017 14:46:22
Showing1 changed files
... ...
@@ -128,8 +128,8 @@ subdir=0
128 128
 
129 129
 [Wordpress-NextGEN]
130 130
 url=https://wordpress.org/plugins/nextgen-gallery/
131
-safe=2.1.60
132
-vuln=https://wordpress.org/plugins/nextgen-gallery/changelog/
131
+safe=2.1.79
132
+vuln=https://blog.sucuri.net/2017/02/sql-injection-vulnerability-nextgen-gallery-wordpress.html
133 133
 file=nggallery.php
134 134
 variable=NGG_PLUGIN_VERSION
135 135
 subdir=0
Browse code

more wp plugin updates

Hanno Böck authored on16/12/2016 11:13:22
Showing1 changed files
... ...
@@ -182,10 +182,10 @@ file=wp-seo-main.php
182 182
 variable=WPSEO_VERSION
183 183
 subdir=0
184 184
 
185
-[Wordpress-GoogleAnalyticsbyYoast]
185
+[Wordpress-GoogleAnalyticsbyMonsterInsights]
186 186
 url=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/
187
-safe=5.4
188
-vuln=https://blog.sucuri.net/2015/04/security-advisory-xss-vulnerability-affecting-multiple-wordpress-plugins.html
187
+safe=5.4.5
188
+vuln=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/
189 189
 file=googleanalytics.php
190 190
 variable=GAWP_VERSION
191 191
 subdir=0
Browse code

wp plugin updates

Hanno Böck authored on16/12/2016 10:40:21
Showing1 changed files
... ...
@@ -78,8 +78,8 @@ subdir=0
78 78
 
79 79
 [W3 Total Cache]
80 80
 url=http://wordpress.org/extend/plugins/w3-total-cache/
81
-safe=0.9.4.1
82
-vuln=CVE-2014-8724
81
+safe=0.9.5
82
+vuln=https://secupress.me/w3-total-cache-vulnerable-xss-high-risk/
83 83
 file=w3-total-cache.php
84 84
 variable=Version:
85 85
 extra_match=Plugin Name: W3 Total Cache
... ...
@@ -128,7 +128,7 @@ subdir=0
128 128
 
129 129
 [Wordpress-NextGEN]
130 130
 url=https://wordpress.org/plugins/nextgen-gallery/
131
-safe=2.0.66.17
131
+safe=2.1.60
132 132
 vuln=https://wordpress.org/plugins/nextgen-gallery/changelog/
133 133
 file=nggallery.php
134 134
 variable=NGG_PLUGIN_VERSION
Browse code

all in one seo update

Hanno Böck authored on17/07/2016 16:52:13
Showing1 changed files
... ...
@@ -144,8 +144,8 @@ subdir=0
144 144
 
145 145
 [Wordpress-AllInOneSEO]
146 146
 url=http://semperfiwebdesign.com/blog/all-in-one-seo-pack/all-in-one-seo-pack-release-history/
147
-safe=2.2.6.2
148
-vuln=http://semperfiwebdesign.com/blog/all-in-one-seo-pack/all-in-one-seo-pack-release-history/
147
+safe=2.3.8
148
+vuln=https://www.wordfence.com/blog/2016/07/new-xss-vulnerability-all-in-one-seo-pack/
149 149
 file=all_in_one_seo_pack.php
150 150
 variable=define( 'AIOSEOP_VERSION'
151 151
 subdir=0
Browse code

jetpack update

Hanno Böck authored on27/06/2016 23:10:52
Showing1 changed files
... ...
@@ -95,8 +95,8 @@ subdir=0
95 95
 
96 96
 [Wordpress-Jetpack]
97 97
 url=http://jetpack.me/
98
-safe=4.0.3
99
-vuln=https://jetpack.com/2016/05/27/jetpack-4-0-3-critical-security-update/
98
+safe=4.0.4
99
+vuln=https://jetpack.com/2016/06/20/jetpack-4-0-4-bug-fixes/
100 100
 file=jetpack.php
101 101
 variable=JETPACK__VERSION
102 102
 subdir=0
Browse code

jetpack update

Hanno Böck authored on27/05/2016 03:10:58
Showing1 changed files
... ...
@@ -95,8 +95,8 @@ subdir=0
95 95
 
96 96
 [Wordpress-Jetpack]
97 97
 url=http://jetpack.me/
98
-safe=3.9.2
99
-vuln=https://jetpack.me/2016/02/25/jetpack-3-9-2-maintenance-and-security-release/
98
+safe=4.0.3
99
+vuln=https://jetpack.com/2016/05/27/jetpack-4-0-3-critical-security-update/
100 100
 file=jetpack.php
101 101
 variable=JETPACK__VERSION
102 102
 subdir=0
Browse code

wp super cache update

Hanno Böck authored on12/03/2016 15:38:17
Showing1 changed files
... ...
@@ -68,9 +68,9 @@ subdir=3
68 68
 
69 69
 [WP Super Cache]
70 70
 url=http://wordpress.org/extend/plugins/wp-super-cache/
71
-safe=1.4.4
72
-latest=1.4.4
73
-vuln=http://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html
71
+safe=1.4.5
72
+latest=1.4.8
73
+vuln=https://wpvulndb.com/vulnerabilities/8198
74 74
 file=wp-cache.php
75 75
 variable=Version:
76 76
 extra_match=Plugin Name: WP Super Cache
Browse code

jetpack update

Hanno Böck authored on05/03/2016 14:22:02
Showing1 changed files
... ...
@@ -95,8 +95,8 @@ subdir=0
95 95
 
96 96
 [Wordpress-Jetpack]
97 97
 url=http://jetpack.me/
98
-safe=3.7.1
99
-vuln=https://blog.sucuri.net/2015/10/security-advisory-stored-xss-in-jetpack.html
98
+safe=3.9.2
99
+vuln=https://jetpack.me/2016/02/25/jetpack-3-9-2-maintenance-and-security-release/
100 100
 file=jetpack.php
101 101
 variable=JETPACK__VERSION
102 102
 subdir=0
Browse code

akismet update

Hanno Böck authored on15/01/2016 14:33:36
Showing1 changed files
... ...
@@ -136,8 +136,8 @@ subdir=0
136 136
 
137 137
 [Wordpress-Akismet]
138 138
 url=https://wordpress.org/plugins/akismet/
139
-safe=2.5.4
140
-vuln=http://blog.akismet.com/2012/07/18/erroneous-claims-of-vulnerabilities-in-the-akismet-plugin/
139
+safe=3.1.5
140
+vuln=https://blog.sucuri.net/2015/10/security-advisory-stored-xss-in-akismet-wordpress-plugin.html
141 141
 file=akismet.php
142 142
 variable=AKISMET_VERSION
143 143
 subdir=0
Browse code

jetpack update

Hanno Böck authored on15/01/2016 14:30:25
Showing1 changed files
... ...
@@ -95,8 +95,8 @@ subdir=0
95 95
 
96 96
 [Wordpress-Jetpack]
97 97
 url=http://jetpack.me/
98
-safe=3.5.3
99
-vuln=https://blog.sucuri.net/2015/05/jetpack-and-twentyfifteen-vulnerable-to-dom-based-xss-millions-of-wordpress-websites-affected-millions-of-wordpress-websites-affected.html
98
+safe=3.7.1
99
+vuln=https://blog.sucuri.net/2015/10/security-advisory-stored-xss-in-jetpack.html
100 100
 file=jetpack.php
101 101
 variable=JETPACK__VERSION
102 102
 subdir=0
Browse code

update seobyyoast

Hanno Böck authored on15/06/2015 13:35:51
Showing1 changed files
... ...
@@ -176,8 +176,8 @@ subdir=0
176 176
 
177 177
 [Wordpress-SEObyYoast]
178 178
 url=https://wpvulndb.com/vulnerabilities/7841https://wordpress.org/plugins/fancybox-for-wordpress/
179
-safe=2.1
180
-vuln=https://yoast.com/coordinated-security-release/
179
+safe=2.2
180
+vuln=https://inventropy.us/blog/yoast-seo-plugin-cross-site-scripting-vulnerability/
181 181
 file=wp-seo-main.php
182 182
 variable=WPSEO_VERSION
183 183
 subdir=0
Browse code

jetpack update

Hanno Böck authored on06/05/2015 20:19:49
Showing1 changed files
... ...
@@ -95,8 +95,8 @@ subdir=0
95 95
 
96 96
 [Wordpress-Jetpack]
97 97
 url=http://jetpack.me/
98
-safe=3.4.3
99
-vuln=https://jetpack.me/2015/04/20/jetpack-3-4-3-coordinated-security-update/
98
+safe=3.5.3
99
+vuln=https://blog.sucuri.net/2015/05/jetpack-and-twentyfifteen-vulnerable-to-dom-based-xss-millions-of-wordpress-websites-affected-millions-of-wordpress-websites-affected.html
100 100
 file=jetpack.php
101 101
 variable=JETPACK__VERSION
102 102
 subdir=0
Browse code

add googleanalytics by yoast

Hanno Böck authored on20/04/2015 22:44:13
Showing1 changed files
... ...
@@ -181,3 +181,11 @@ vuln=https://yoast.com/coordinated-security-release/
181 181
 file=wp-seo-main.php
182 182
 variable=WPSEO_VERSION
183 183
 subdir=0
184
+
185
+[Wordpress-GoogleAnalyticsbyYoast]
186
+url=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/
187
+safe=5.4
188
+vuln=https://blog.sucuri.net/2015/04/security-advisory-xss-vulnerability-affecting-multiple-wordpress-plugins.html
189
+file=googleanalytics.php
190
+variable=GAWP_VERSION
191
+subdir=0
Browse code

wordpress seo by yoast update

Hanno Böck authored on20/04/2015 20:18:15
Showing1 changed files
... ...
@@ -174,10 +174,10 @@ file=plugin_googlemap3.perm
174 174
 variable=<version>
175 175
 subdir=0
176 176
 
177
-[Wordpress-SEO]
178
-url=https://wordpress.org/plugins/fancybox-for-wordpress/
179
-safe=1.7.4
180
-vuln=https://wpvulndb.com/vulnerabilities/7841
177
+[Wordpress-SEObyYoast]
178
+url=https://wpvulndb.com/vulnerabilities/7841https://wordpress.org/plugins/fancybox-for-wordpress/
179
+safe=2.1
180
+vuln=https://yoast.com/coordinated-security-release/
181 181
 file=wp-seo-main.php
182 182
 variable=WPSEO_VERSION
183 183
 subdir=0
Browse code

all in one seo update

Hanno Böck authored on20/04/2015 20:14:59
Showing1 changed files
... ...
@@ -144,8 +144,8 @@ subdir=0
144 144
 
145 145
 [Wordpress-AllInOneSEO]
146 146
 url=http://semperfiwebdesign.com/blog/all-in-one-seo-pack/all-in-one-seo-pack-release-history/
147
-safe=2.1.6
148
-vuln=http://blog.sucuri.net/2014/05/vulnerability-found-in-the-all-in-one-seo-pack-wordpress-plugin.html
147
+safe=2.2.6.2
148
+vuln=http://semperfiwebdesign.com/blog/all-in-one-seo-pack/all-in-one-seo-pack-release-history/
149 149
 file=all_in_one_seo_pack.php
150 150
 variable=define( 'AIOSEOP_VERSION'
151 151
 subdir=0
Browse code

jetpack update

Hanno Böck authored on20/04/2015 19:49:04
Showing1 changed files
... ...
@@ -95,8 +95,8 @@ subdir=0
95 95
 
96 96
 [Wordpress-Jetpack]
97 97
 url=http://jetpack.me/
98
-safe=2.9.3
99
-vuln=CVE-2014-0173
98
+safe=3.4.3
99
+vuln=https://jetpack.me/2015/04/20/jetpack-3-4-3-coordinated-security-update/
100 100
 file=jetpack.php
101 101
 variable=JETPACK__VERSION
102 102
 subdir=0
Browse code

another wp super cache update

Hanno Böck authored on07/04/2015 19:26:01
Showing1 changed files
... ...
@@ -68,9 +68,9 @@ subdir=3
68 68
 
69 69
 [WP Super Cache]
70 70
 url=http://wordpress.org/extend/plugins/wp-super-cache/
71
-safe=1.4.3
71
+safe=1.4.4
72 72
 latest=1.4.4
73
-vuln=https://wordpress.org/plugins/wp-super-cache/changelog/
73
+vuln=http://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html
74 74
 file=wp-cache.php
75 75
 variable=Version:
76 76
 extra_match=Plugin Name: WP Super Cache
Browse code

w3 total cache xss

Hanno Böck authored on05/04/2015 09:26:11
Showing1 changed files
... ...
@@ -78,8 +78,8 @@ subdir=0
78 78
 
79 79
 [W3 Total Cache]
80 80
 url=http://wordpress.org/extend/plugins/w3-total-cache/
81
-safe=0.9.2.9
82
-vuln=CVE-2013-2010
81
+safe=0.9.4.1
82
+vuln=CVE-2014-8724
83 83
 file=w3-total-cache.php
84 84
 variable=Version:
85 85
 extra_match=Plugin Name: W3 Total Cache
Browse code

xss in wp super cache

Hanno Böck authored on05/04/2015 09:07:44
Showing1 changed files
... ...
@@ -68,9 +68,9 @@ subdir=3
68 68
 
69 69
 [WP Super Cache]
70 70
 url=http://wordpress.org/extend/plugins/wp-super-cache/
71
-safe=1.3.2
72
-latest=1.3.2
73
-vuln=CVE-2013-2011
71
+safe=1.4.3
72
+latest=1.4.4
73
+vuln=https://wordpress.org/plugins/wp-super-cache/changelog/
74 74
 file=wp-cache.php
75 75
 variable=Version:
76 76
 extra_match=Plugin Name: WP Super Cache
Browse code

fix name fancybox to seo

Hanno Böck authored on28/03/2015 17:14:16
Showing1 changed files
... ...
@@ -174,7 +174,7 @@ file=plugin_googlemap3.perm
174 174
 variable=<version>
175 175
 subdir=0
176 176
 
177
-[Wordpress-Fancybox]
177
+[Wordpress-SEO]
178 178
 url=https://wordpress.org/plugins/fancybox-for-wordpress/
179 179
 safe=1.7.4
180 180
 vuln=https://wpvulndb.com/vulnerabilities/7841
Browse code

wordpress seo plugin added

Hanno Böck authored on11/03/2015 12:53:11
Showing1 changed files
... ...
@@ -173,3 +173,11 @@ vuln=http://joomlacode.org/gf/project/mambot_google1/news/?id=4119
173 173
 file=plugin_googlemap3.perm
174 174
 variable=<version>
175 175
 subdir=0
176
+
177
+[Wordpress-Fancybox]
178
+url=https://wordpress.org/plugins/fancybox-for-wordpress/
179
+safe=1.7.4
180
+vuln=https://wpvulndb.com/vulnerabilities/7841
181
+file=wp-seo-main.php
182
+variable=WPSEO_VERSION
183
+subdir=0
Browse code

detection for joomla reflection issue after akamai warning

Hanno Böck authored on26/02/2015 12:28:03
Showing1 changed files
... ...
@@ -165,3 +165,11 @@ vuln=CVE-2015-1494
165 165
 file=fancybox.php
166 166
 variable=FBFW_VERSION
167 167
 subdir=0
168
+
169
+[Joomla-Googlemaps]
170
+url=http://joomlacode.org/gf/project/mambot_google1/
171
+safe=3.1
172
+vuln=http://joomlacode.org/gf/project/mambot_google1/news/?id=4119
173
+file=plugin_googlemap3.perm
174
+variable=<version>
175
+subdir=0
Browse code

fancybox / CVE-2015-1494

Hanno Böck authored on06/02/2015 12:04:58
Showing1 changed files
... ...
@@ -157,3 +157,11 @@ vuln=http://blog.sucuri.net/2014/12/security-advisory-high-severity-wordpress-do
157 157
 file=download-manager.php
158 158
 variable=define('WPDM_Version'
159 159
 subdir=0
160
+
161
+[Wordpress-Fancybox]
162
+url=https://wordpress.org/plugins/fancybox-for-wordpress/
163
+safe=3.0.4
164
+vuln=CVE-2015-1494
165
+file=fancybox.php
166
+variable=FBFW_VERSION
167
+subdir=0
Browse code

add wordpress download manager

Hanno Böck authored on23/12/2014 22:19:13
Showing1 changed files
... ...
@@ -149,3 +149,11 @@ vuln=http://blog.sucuri.net/2014/05/vulnerability-found-in-the-all-in-one-seo-pa
149 149
 file=all_in_one_seo_pack.php
150 150
 variable=define( 'AIOSEOP_VERSION'
151 151
 subdir=0
152
+
153
+[Wordpress-DownloadManager]
154
+url=https://wordpress.org/plugins/download-manager/
155
+safe=2.7.5
156
+vuln=http://blog.sucuri.net/2014/12/security-advisory-high-severity-wordpress-download-manager.html
157
+file=download-manager.php
158
+variable=define('WPDM_Version'
159
+subdir=0
Browse code

add wordpress all in one seo

Hanno Böck authored on09/12/2014 20:47:55
Showing1 changed files
... ...
@@ -141,3 +141,11 @@ vuln=http://blog.akismet.com/2012/07/18/erroneous-claims-of-vulnerabilities-in-t
141 141
 file=akismet.php
142 142
 variable=AKISMET_VERSION
143 143
 subdir=0
144
+
145
+[Wordpress-AllInOneSEO]
146
+url=http://semperfiwebdesign.com/blog/all-in-one-seo-pack/all-in-one-seo-pack-release-history/
147
+safe=2.1.6
148
+vuln=http://blog.sucuri.net/2014/05/vulnerability-found-in-the-all-in-one-seo-pack-wordpress-plugin.html
149
+file=all_in_one_seo_pack.php
150
+variable=define( 'AIOSEOP_VERSION'
151
+subdir=0
Browse code

add akismet plugin

Hanno Böck authored on29/11/2014 14:11:42
Showing1 changed files
... ...
@@ -133,3 +133,11 @@ vuln=https://wordpress.org/plugins/nextgen-gallery/changelog/
133 133
 file=nggallery.php
134 134
 variable=NGG_PLUGIN_VERSION
135 135
 subdir=0
136
+
137
+[Wordpress-Akismet]
138
+url=https://wordpress.org/plugins/akismet/
139
+safe=2.5.4
140
+vuln=http://blog.akismet.com/2012/07/18/erroneous-claims-of-vulnerabilities-in-the-akismet-plugin/
141
+file=akismet.php
142
+variable=AKISMET_VERSION
143
+subdir=0
Browse code

add nextgen

Hanno Böck authored on03/11/2014 20:51:06
Showing1 changed files
... ...
@@ -125,3 +125,11 @@ vuln=http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerabil
125 125
 file=revslider.php
126 126
 variable=$revSliderVersion
127 127
 subdir=0
128
+
129
+[Wordpress-NextGEN]
130
+url=https://wordpress.org/plugins/nextgen-gallery/
131
+safe=2.0.66.17
132
+vuln=https://wordpress.org/plugins/nextgen-gallery/changelog/
133
+file=nggallery.php
134
+variable=NGG_PLUGIN_VERSION
135
+subdir=0
Browse code

slider revolution added

Hanno Böck authored on12/09/2014 11:37:17
Showing1 changed files
... ...
@@ -110,10 +110,18 @@ variable=static $version
110 110
 extra_match=WYSIJA_object
111 111
 subdir=0
112 112
 
113
-[Wordpress-CustomerContact]
113
+[Wordpress-CustomContact]
114 114
 url=https://wordpress.org/plugins/custom-contact-forms/
115 115
 safe=5.1.0.4
116 116
 vuln=http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html
117 117
 file=custom-contact-forms.php
118 118
 variable=Version
119 119
 subdir=0
120
+
121
+[Wordpress-SliderRevolution]
122
+url=http://themepunch.com/revolution/
123
+safe=4.2.0
124
+vuln=http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html
125
+file=revslider.php
126
+variable=$revSliderVersion
127
+subdir=0
Browse code

add wordpress-customercontact

Hanno Böck authored on08/08/2014 07:27:36
Showing1 changed files
... ...
@@ -109,3 +109,11 @@ file=base.php
109 109
 variable=static $version
110 110
 extra_match=WYSIJA_object
111 111
 subdir=0
112
+
113
+[Wordpress-CustomerContact]
114
+url=https://wordpress.org/plugins/custom-contact-forms/
115
+safe=5.1.0.4
116
+vuln=http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html
117
+file=custom-contact-forms.php
118
+variable=Version
119
+subdir=0
Browse code

replace url with cve

Hanno Böck authored on24/07/2014 11:42:31
Showing1 changed files
... ...
@@ -104,7 +104,7 @@ subdir=0
104 104
 [Wordpress-MailPoet]
105 105
 url=http://www.mailpoet.com/
106 106
 safe=2.6.8
107
-vuln=http://wordpress.org/plugins/wysija-newsletters/changelog/
107
+vuln=CVE-2014-4726
108 108
 file=base.php
109 109
 variable=static $version
110 110
 extra_match=WYSIJA_object
Browse code

add wordpress-mailpoet

Hanno Böck authored on24/07/2014 11:10:42
Showing1 changed files
... ...
@@ -100,3 +100,12 @@ vuln=CVE-2014-0173
100 100
 file=jetpack.php
101 101
 variable=JETPACK__VERSION
102 102
 subdir=0
103
+
104
+[Wordpress-MailPoet]
105
+url=http://www.mailpoet.com/
106
+safe=2.6.8
107
+vuln=http://wordpress.org/plugins/wysija-newsletters/changelog/
108
+file=base.php
109
+variable=static $version
110
+extra_match=WYSIJA_object
111
+subdir=0
Browse code

add wordpress-jetpack

Hanno Böck authored on10/04/2014 23:48:24
Showing1 changed files
... ...
@@ -92,3 +92,11 @@ vuln=CVE-2010-1598
92 92
 file=phpthumb.class.php
93 93
 variable=$phpthumb_version
94 94
 subdir=0
95
+
96
+[Wordpress-Jetpack]
97
+url=http://jetpack.me/
98
+safe=2.9.3
99
+vuln=CVE-2014-0173
100
+file=jetpack.php
101
+variable=JETPACK__VERSION
102
+subdir=0
Browse code

add phpthumb

Hanno Böck authored on15/09/2013 13:56:42
Showing1 changed files
... ...
@@ -84,3 +84,11 @@ file=w3-total-cache.php
84 84
 variable=Version:
85 85
 extra_match=Plugin Name: W3 Total Cache
86 86
 subdir=0
87
+
88
+[phpThumb]
89
+url=http://phpthumb.sourceforge.net/
90
+safe=1.7.10
91
+vuln=CVE-2010-1598
92
+file=phpthumb.class.php
93
+variable=$phpthumb_version
94
+subdir=0
Browse code

timthumb renamed fix

Hanno Böck authored on15/09/2013 12:46:27
Showing1 changed files
... ...
@@ -36,16 +36,17 @@ safe=2.0
36 36
 vuln=CVE-2011-4106
37 37
 file=timthumb.php
38 38
 variable=('VERSION',
39
+extra_match=TimThumb
39 40
 subdir=0
40 41
 
41
-[Wordpress-timthumb-renamed]
42
+[Wordpress-timthumb_renamed]
42 43
 url=http://code.google.com/p/timthumb/
43 44
 safe=2.0
44 45
 vuln=CVE-2011-4106
45 46
 file=thumb.php
46 47
 variable=('VERSION',
47
-subdir=0
48 48
 extra_match=TimThumb
49
+subdir=0
49 50
 
50 51
 [Wordpress-timthumb-renamed]
51 52
 url=http://code.google.com/p/timthumb/
Browse code

support renamed timthumb

Hanno Böck authored on15/09/2013 12:24:00
Showing1 changed files
... ...
@@ -35,7 +35,25 @@ url=http://code.google.com/p/timthumb/
35 35
 safe=2.0
36 36
 vuln=CVE-2011-4106
37 37
 file=timthumb.php
38
+variable=('VERSION',
39
+subdir=0
40
+
41
+[Wordpress-timthumb-renamed]
42
+url=http://code.google.com/p/timthumb/
43
+safe=2.0
44
+vuln=CVE-2011-4106
45
+file=thumb.php
46
+variable=('VERSION',
47
+subdir=0
48
+extra_match=TimThumb
49
+
50
+[Wordpress-timthumb-renamed]
51
+url=http://code.google.com/p/timthumb/
52
+safe=2.0
53
+vuln=CVE-2011-4106
54
+file=thumb.php
38 55
 variable=define ('VERSION',
56
+extra_match="TimThumb"
39 57
 subdir=0
40 58
 
41 59
 [Joomla-JCE]
Browse code

wp super cache incomplete fix

Hanno Böck authored on25/04/2013 09:51:13
Showing1 changed files
... ...
@@ -49,9 +49,9 @@ subdir=3
49 49
 
50 50
 [WP Super Cache]
51 51
 url=http://wordpress.org/extend/plugins/wp-super-cache/
52
-safe=1.3.1
52
+safe=1.3.2
53 53
 latest=1.3.2
54
-vuln=CVE-2013-2008
54
+vuln=CVE-2013-2011
55 55
 file=wp-cache.php
56 56
 variable=Version:
57 57
 extra_match=Plugin Name: WP Super Cache
Browse code

wordpress caching plugins with remote exec vulns

Hanno Böck authored on25/04/2013 00:29:39
Showing1 changed files
... ...
@@ -47,3 +47,21 @@ variable=$_version
47 47
 extra_match=JCE class
48 48
 subdir=3
49 49
 
50
+[WP Super Cache]
51
+url=http://wordpress.org/extend/plugins/wp-super-cache/
52
+safe=1.3.1
53
+latest=1.3.2
54
+vuln=CVE-2013-2008
55
+file=wp-cache.php
56
+variable=Version:
57
+extra_match=Plugin Name: WP Super Cache
58
+subdir=0
59
+
60
+[W3 Total Cache]
61
+url=http://wordpress.org/extend/plugins/w3-total-cache/
62
+safe=0.9.2.9
63
+vuln=CVE-2013-2010
64
+file=w3-total-cache.php
65
+variable=Version:
66
+extra_match=Plugin Name: W3 Total Cache
67
+subdir=0
Browse code

add jce

Hanno Böck authored on11/12/2012 23:35:15
Showing1 changed files
... ...
@@ -37,3 +37,13 @@ vuln=CVE-2011-4106
37 37
 file=timthumb.php
38 38
 variable=define ('VERSION',
39 39
 subdir=0
40
+
41
+[Joomla-JCE]
42
+url=http://www.joomlacontenteditor.net/
43
+safe=2.1
44
+vuln=CVE-2012-2902
45
+file=editor.php
46
+variable=$_version
47
+extra_match=JCE class
48
+subdir=3
49
+
Browse code

replace views url with cve

Hanno Böck authored on20/11/2011 12:25:46
Showing1 changed files
... ...
@@ -25,7 +25,7 @@ subdir=0
25 25
 [Drupal-Views]
26 26
 url=http://drupal.org/project/views
27 27
 safe=2.13
28
-vuln=http://drupal.org/node/1329898
28
+vuln=CVE-2011-4113
29 29
 file=views.info
30 30
 variable=version = "6.x
31 31
 subdir=0
Browse code

drupal views update

Hanno Böck authored on20/11/2011 12:24:55
Showing1 changed files
... ...
@@ -24,8 +24,8 @@ subdir=0
24 24
 
25 25
 [Drupal-Views]
26 26
 url=http://drupal.org/project/views
27
-safe=2.12
28
-vuln=CVE-2010-4521
27
+safe=2.13
28
+vuln=http://drupal.org/node/1329898
29 29
 file=views.info
30 30
 variable=version = "6.x
31 31
 subdir=0
Browse code

replace urls with cves

Hanno Böck authored on07/11/2011 15:39:58
Showing1 changed files
... ...
@@ -33,7 +33,7 @@ subdir=0
33 33
 [Wordpress-timthumb]
34 34
 url=http://code.google.com/p/timthumb/
35 35
 safe=2.0
36
-vuln=http://markmaunder.com/2011/08/01/zero-day-vulnerability-in-many-wordpress-themes/
36
+vuln=CVE-2011-4106
37 37
 file=timthumb.php
38 38
 variable=define ('VERSION',
39 39
 subdir=0
Browse code

wordpress timthumb plugin

Hanno Böck authored on03/11/2011 12:24:32
Showing1 changed files
... ...
@@ -29,3 +29,11 @@ vuln=CVE-2010-4521
29 29
 file=views.info
30 30
 variable=version = "6.x
31 31
 subdir=0
32
+
33
+[Wordpress-timthumb]
34
+url=http://code.google.com/p/timthumb/
35
+safe=2.0
36
+vuln=http://markmaunder.com/2011/08/01/zero-day-vulnerability-in-many-wordpress-themes/
37
+file=timthumb.php
38
+variable=define ('VERSION',
39
+subdir=0
Browse code

replace urls with CVEs

Hanno Böck authored on10/10/2011 20:34:27
Showing1 changed files
... ...
@@ -9,7 +9,7 @@ subdir=0
9 9
 [Serendipity-freetag]
10 10
 url=http://www.s9y.org
11 11
 safe=3.30
12
-vuln=http://blog.s9y.org/archives/234-Security-fix-for-flash-based-cloud-in-Freetag-plugin.html
12
+vuln=CVE-2011-3610
13 13
 file=serendipity_event_freetag.php
14 14
 variable=$propbag->add('version'
15 15
 subdir=0
Browse code

s9y freetag update

Hanno Böck authored on09/10/2011 01:15:48
Showing1 changed files
... ...
@@ -8,8 +8,8 @@ subdir=0
8 8
 
9 9
 [Serendipity-freetag]
10 10
 url=http://www.s9y.org
11
-safe=3.22
12
-vuln=http://www.rul3z.de/advisories/SSCHADV2011-004.txt
11
+safe=3.30
12
+vuln=http://blog.s9y.org/archives/234-Security-fix-for-flash-based-cloud-in-Freetag-plugin.html
13 13
 file=serendipity_event_freetag.php
14 14
 variable=$propbag->add('version'
15 15
 subdir=0
Browse code

serendipity freetag xss

Hanno Böck authored on12/07/2011 16:03:23
Showing1 changed files
... ...
@@ -8,8 +8,8 @@ subdir=0
8 8
 
9 9
 [Serendipity-freetag]
10 10
 url=http://www.s9y.org
11
-safe=3.09
12
-vuln=CVE-2009-3337
11
+safe=3.22
12
+vuln=http://www.rul3z.de/advisories/SSCHADV2011-004.txt
13 13
 file=serendipity_event_freetag.php
14 14
 variable=$propbag->add('version'
15 15
 subdir=0
Browse code

drupal views url to cve

Hanno Böck authored on26/12/2010 13:35:25
Showing1 changed files
... ...
@@ -25,7 +25,7 @@ subdir=0
25 25
 [Drupal-Views]
26 26
 url=http://drupal.org/project/views
27 27
 safe=2.12
28
-vuln=http://drupal.org/node/999380
28
+vuln=CVE-2010-4521
29 29
 file=views.info
30 30
 variable=version = "6.x
31 31
 subdir=0
Browse code

drupal views update

Hanno Böck authored on16/12/2010 22:28:00
Showing1 changed files
... ...
@@ -24,8 +24,8 @@ subdir=0
24 24
 
25 25
 [Drupal-Views]
26 26
 url=http://drupal.org/project/views
27
-safe=2.11
28
-vuln=http://drupal.org/node/829840
27
+safe=2.12
28
+vuln=http://drupal.org/node/999380
29 29
 file=views.info
30 30
 variable=version = "6.x
31 31
 subdir=0
Browse code

drupal views 2.11

Hanno Böck authored on23/06/2010 21:53:22
Showing1 changed files
... ...
@@ -24,8 +24,8 @@ subdir=0
24 24
 
25 25
 [Drupal-Views]
26 26
 url=http://drupal.org/project/views
27
-safe=2.9
28
-vuln=http://drupal.org/node/765022
27
+safe=2.11
28
+vuln=http://drupal.org/node/829840
29 29
 file=views.info
30 30
 variable=version = "6.x
31 31
 subdir=0
Browse code

drupal views update

Hanno Böck authored on19/04/2010 09:59:33
Showing1 changed files
... ...
@@ -24,8 +24,8 @@ subdir=0
24 24
 
25 25
 [Drupal-Views]
26 26
 url=http://drupal.org/project/views
27
-safe=2.6
28
-vuln=CVE-2009-2076
27
+safe=2.9
28
+vuln=http://drupal.org/node/765022
29 29
 file=views.info
30 30
 variable=version = "6.x
31 31
 subdir=0
Browse code

drupal-views: replace url with cve

Hanno Böck authored on23/12/2009 00:35:43
Showing1 changed files
... ...
@@ -25,7 +25,7 @@ subdir=0
25 25
 [Drupal-Views]
26 26
 url=http://drupal.org/project/views
27 27
 safe=2.6
28
-vuln=http://drupal.org/node/488082
28
+vuln=CVE-2009-2076
29 29
 file=views.info
30 30
 variable=version = "6.x
31 31
 subdir=0
Browse code

s9y freetag url to cve

Hanno Böck authored on27/09/2009 16:36:05
Showing1 changed files
... ...
@@ -9,7 +9,7 @@ subdir=0
9 9
 [Serendipity-freetag]
10 10
 url=http://www.s9y.org
11 11
 safe=3.09
12
-vuln=http://blog.s9y.org/archives/210-Security-update-for-Freetag-Plugin.html
12
+vuln=CVE-2009-3337
13 13
 file=serendipity_event_freetag.php
14 14
 variable=$propbag->add('version'
15 15
 subdir=0
Browse code

s9y freetag

Hanno Böck authored on12/09/2009 11:54:10
Showing1 changed files
... ...
@@ -8,8 +8,8 @@ subdir=0
8 8
 
9 9
 [Serendipity-freetag]
10 10
 url=http://www.s9y.org
11
-safe=2.96
12
-vuln=CVE-2008-0751
11
+safe=3.09
12
+vuln=http://blog.s9y.org/archives/210-Security-update-for-Freetag-Plugin.html
13 13
 file=serendipity_event_freetag.php
14 14
 variable=$propbag->add('version'
15 15
 subdir=0
Browse code

drupal views update

Hanno Böck authored on11/06/2009 00:23:12
Showing1 changed files
... ...
@@ -24,8 +24,8 @@ subdir=0
24 24
 
25 25
 [Drupal-Views]
26 26
 url=http://drupal.org/project/views
27
-safe=2.2
28
-vuln=CVE-2008-6020
27
+safe=2.6
28
+vuln=http://drupal.org/node/488082
29 29
 file=views.info
30 30
 variable=version = "6.x
31 31
 subdir=0
Browse code

adding linklift plugin doesnt work, individual plugin names

Hanno Böck authored on06/05/2009 10:27:22
Showing1 changed files
... ...
@@ -29,11 +29,3 @@ vuln=CVE-2008-6020
29 29
 file=views.info
30 30
 variable=version = "6.x
31 31
 subdir=0
32
-
33
-[Serendipity-Linklift]
34
-url=http://www.linklift.de/
35
-safe=2.11
36
-vuln=http://wiki.schokokeks.org/Problem_mit_Linklift
37
-file=serendipity_plugin_endage.php
38
-variable=LL_PLUGIN_VERSION
39
-subdir=0
Browse code

add linklift plugin

Hanno Böck authored on06/05/2009 10:19:00
Showing1 changed files
... ...
@@ -29,3 +29,11 @@ vuln=CVE-2008-6020
29 29
 file=views.info
30 30
 variable=version = "6.x
31 31
 subdir=0
32
+
33
+[Serendipity-Linklift]
34
+url=http://www.linklift.de/
35
+safe=2.11
36
+vuln=http://wiki.schokokeks.org/Problem_mit_Linklift
37
+file=serendipity_plugin_endage.php
38
+variable=LL_PLUGIN_VERSION
39
+subdir=0
Browse code

cve for drupal views

Hanno Böck authored on18/03/2009 12:33:17
Showing1 changed files
... ...
@@ -25,7 +25,7 @@ subdir=0
25 25
 [Drupal-Views]
26 26
 url=http://drupal.org/project/views
27 27
 safe=2.2
28
-vuln=http://drupal.org/node/348321
28
+vuln=CVE-2008-6020
29 29
 file=views.info
30 30
 variable=version = "6.x
31 31
 subdir=0
Browse code

add drupal views

Hanno Böck authored on18/01/2009 14:01:39
Showing1 changed files
... ...
@@ -21,3 +21,11 @@ vuln=CVE-2007-3779
21 21
 file=gpg_pref_functions.php
22 22
 variable=$GPG_VERSION
23 23
 subdir=0
24
+
25
+[Drupal-Views]
26
+url=http://drupal.org/project/views
27
+safe=2.2
28
+vuln=http://drupal.org/node/348321
29
+file=views.info
30
+variable=version = "6.x
31
+subdir=0
Browse code

Remove Drupal-Views, broken syntax

Hanno Böck authored on18/01/2009 09:42:48
Showing1 changed files
... ...
@@ -21,13 +21,3 @@ vuln=CVE-2007-3779
21 21
 file=gpg_pref_functions.php
22 22
 variable=$GPG_VERSION
23 23
 subdir=0
24
-
25
-
26
-[Drupal-Views]
27
-url=http://drupal.org/project/views
28
-safe=2.2
29
-vuln=http://drupal.org/node/348321
30
-file=views.module
31
-variable=version = 6.x-
32
-
33
-
Browse code

Added Drupal-Views 6.x

Bernd Wurst authored on18/01/2009 09:37:47
Showing1 changed files
... ...
@@ -21,3 +21,13 @@ vuln=CVE-2007-3779
21 21
 file=gpg_pref_functions.php
22 22
 variable=$GPG_VERSION
23 23
 subdir=0
24
+
25
+
26
+[Drupal-Views]
27
+url=http://drupal.org/project/views
28
+safe=2.2
29
+vuln=http://drupal.org/node/348321
30
+file=views.module
31
+variable=version = 6.x-
32
+
33
+
Browse code

unify name scheme

Hanno Böck authored on17/08/2008 02:03:16
Showing1 changed files
... ...
@@ -1,4 +1,4 @@
1
-[s9y mycalendar]
1
+[Serendipity-mycalendar]
2 2
 url=http://www.s9y.org
3 3
 safe=0.13
4 4
 vuln=CVE-2007-6390
... ...
@@ -6,7 +6,7 @@ file=serendipity_event_mycalendar.php
6 6
 variable=$propbag->add('version'
7 7
 subdir=0
8 8
 
9
-[s9y freetag]
9
+[Serendipity-freetag]
10 10
 url=http://www.s9y.org
11 11
 safe=2.96
12 12
 vuln=CVE-2008-0751
... ...
@@ -14,7 +14,7 @@ file=serendipity_event_freetag.php
14 14
 variable=$propbag->add('version'
15 15
 subdir=0
16 16
 
17
-[squirrelmail gpg]
17
+[SquirrelMail-gpg]
18 18
 url=http://www.squirrelmail.org/plugin_view.php?id=153
19 19
 safe=2.1
20 20
 vuln=CVE-2007-3779
Browse code

cve for freetag/s9y

Hanno Böck authored on14/02/2008 22:35:10
Showing1 changed files
... ...
@@ -9,7 +9,7 @@ subdir=0
9 9
 [s9y freetag]
10 10
 url=http://www.s9y.org
11 11
 safe=2.96
12
-vuln=http://bitsploit.de/archives/659-XSS-Schwachstelle-in-Serendpity-Plugin-Freetag.html
12
+vuln=CVE-2008-0751
13 13
 file=serendipity_event_freetag.php
14 14
 variable=$propbag->add('version'
15 15
 subdir=0
Browse code

add freetag/s9y xss

Hanno Böck authored on07/02/2008 22:52:18
Showing1 changed files
... ...
@@ -6,6 +6,14 @@ file=serendipity_event_mycalendar.php
6 6
 variable=$propbag->add('version'
7 7
 subdir=0
8 8
 
9
+[s9y freetag]
10
+url=http://www.s9y.org
11
+safe=2.96
12
+vuln=http://bitsploit.de/archives/659-XSS-Schwachstelle-in-Serendpity-Plugin-Freetag.html
13
+file=serendipity_event_freetag.php
14
+variable=$propbag->add('version'
15
+subdir=0
16
+
9 17
 [squirrelmail gpg]
10 18
 url=http://www.squirrelmail.org/plugin_view.php?id=153
11 19
 safe=2.1
Browse code

add cve to s9y-mycalendar

Hanno Böck authored on17/12/2007 19:22:41
Showing1 changed files
... ...
@@ -1,7 +1,7 @@
1 1
 [s9y mycalendar]
2 2
 url=http://www.s9y.org
3 3
 safe=0.13
4
-vuln=http://www.hboeck.de/archives/572-Some-XSS-issues-in-Serendipity-found.html
4
+vuln=CVE-2007-6390
5 5
 file=serendipity_event_mycalendar.php
6 6
 variable=$propbag->add('version'
7 7
 subdir=0
Browse code

squirrelmail gpg plugin

Hanno Böck authored on14/12/2007 17:01:08
Showing1 changed files
... ...
@@ -5,3 +5,11 @@ vuln=http://www.hboeck.de/archives/572-Some-XSS-issues-in-Serendipity-found.html
5 5
 file=serendipity_event_mycalendar.php
6 6
 variable=$propbag->add('version'
7 7
 subdir=0
8
+
9
+[squirrelmail gpg]
10
+url=http://www.squirrelmail.org/plugin_view.php?id=153
11
+safe=2.1
12
+vuln=CVE-2007-3779
13
+file=gpg_pref_functions.php
14
+variable=$GPG_VERSION
15
+subdir=0
Browse code

add plugins file, first plugin s9y mycalendar

Hanno Böck authored on14/12/2007 16:35:50
Showing1 changed files
1 1
new file mode 100644
... ...
@@ -0,0 +1,7 @@
1
+[s9y mycalendar]
2
+url=http://www.s9y.org
3
+safe=0.13
4
+vuln=http://www.hboeck.de/archives/572-Some-XSS-issues-in-Serendipity-found.html
5
+file=serendipity_event_mycalendar.php
6
+variable=$propbag->add('version'
7
+subdir=0