[Serendipity-mycalendar] url=https://s9y.org safe=0.13 vuln=CVE-2007-6390 file=serendipity_event_mycalendar.php variable=$propbag->add('version' subdir=0 [Serendipity-freetag] url=https://s9y.org safe=3.69 vuln=https://github.com/s9y/additional_plugins/commit/3edecdb7eccc24e0d5c63a3d5702dba54599bda3 file=serendipity_event_freetag.php variable=$propbag->add('version' subdir=0 [SquirrelMail-gpg] url=https://squirrelmail.org/plugin_view.php?id=153 safe=2.1 vuln=CVE-2007-3779 file=gpg_pref_functions.php variable=$GPG_VERSION subdir=0 [Drupal-Views] url=https://www.drupal.org/project/views safe=2.13 vuln=CVE-2011-4113 file=views.info variable=version = "6.x subdir=0 [Wordpress-timthumb] url=https://github.com/GabrielGil/TimThumb safe=2.8.14 vuln=CVE-2014-4663 file=timthumb.php variable=('VERSION', extra_match=TimThumb subdir=0 [Wordpress-timthumb-renamed] url=https://github.com/GabrielGil/TimThumb safe=2.8.14 vuln=CVE-2014-4663 file=thumb.php variable=('VERSION', extra_match=TimThumb subdir=0 [Joomla-JCE] url=https://www.joomlacontenteditor.net/ safe=2.1 vuln=CVE-2012-2902 file=editor.php variable=$_version extra_match=JCE class subdir=3 [WP Super Cache] url=https://wordpress.org/plugins/wp-super-cache/ safe=1.6.9 latest=1.7.0 vuln=https://odd.blog/2019/07/25/wp-super-cache-1-6-9-security-update/ file=wp-cache.php variable=Version: extra_match=Plugin Name: WP Super Cache subdir=0 [W3 Total Cache] url=https://wordpress.org/plugins/w3-total-cache/ safe=0.9.7.4 vuln=https://www.cybersecurity-help.cz/vdb/SB2019050701 file=w3-total-cache.php variable=Version: extra_match=Plugin Name: W3 Total Cache subdir=0 [phpThumb] url=http://phpthumb.sourceforge.net/ safe=1.7.10 vuln=CVE-2010-1598 file=phpthumb.class.php variable=$phpthumb_version subdir=0 [Wordpress-Jetpack] url=https://jetpack.com/ safe=7.9.1 vuln=https://jetpack.com/2019/11/19/jetpack-7-9-1-maintenance-security/ file=jetpack.php variable=JETPACK__VERSION subdir=0 [Wordpress-MailPoet] url=https://www.mailpoet.com/ safe=2.6.8 vuln=CVE-2014-4726 file=base.php variable=static $version extra_match=WYSIJA_object subdir=0 [Wordpress-CustomContact] url=https://wordpress.org/plugins/custom-contact-forms/ safe=5.1.0.4 vuln=http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html file=custom-contact-forms.php variable=Version subdir=0 [Wordpress-SliderRevolution] url=https://revolution.themepunch.com/ # unclear about exact version safe=4.2.3 vuln=CVE-2015-5151 file=revslider.php variable=$revSliderVersion subdir=0 [Wordpress-NextGEN] url=https://wordpress.org/plugins/nextgen-gallery/ safe=3.2.11 vuln=2019-14314 file=nggallery.php variable=NGG_PLUGIN_VERSION subdir=0 [Wordpress-Akismet] url=https://wordpress.org/plugins/akismet/ safe=3.1.5 vuln=CVE-2015-9357 file=akismet.php variable=AKISMET_VERSION subdir=0 [Wordpress-AllInOneSEO] url=https://semperplugins.com/all-in-one-seo-pack-changelog/ safe=3.2.7 vuln=CVE-2019-16520 file=all_in_one_seo_pack.php variable=define( 'AIOSEOP_VERSION' subdir=0 [Wordpress-DownloadManager] url=https://wordpress.org/plugins/download-manager/ safe=2.7.5 vuln=http://blog.sucuri.net/2014/12/security-advisory-high-severity-wordpress-download-manager.html file=download-manager.php variable=define('WPDM_Version' subdir=0 [Wordpress-Fancybox] url=https://wordpress.org/plugins/fancybox-for-wordpress/ safe=3.0.4 vuln=CVE-2015-1494 file=fancybox.php variable=FBFW_VERSION subdir=0 [Joomla-Googlemaps] url=http://joomlacode.org/gf/project/mambot_google1/ safe=3.1 vuln=http://joomlacode.org/gf/project/mambot_google1/news/?id=4119 file=plugin_googlemap3.perm variable= subdir=0 [Wordpress-SEObyYoast] url=https://wordpress.org/plugins/wordpress-seo/ safe=11.6.0 vuln=2019-13478 file=wp-seo-main.php variable=WPSEO_VERSION subdir=0 [Wordpress-GoogleAnalyticsbyMonsterInsights] url=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/ safe=5.4.5 vuln=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/ file=googleanalytics.php variable=GAWP_VERSION subdir=0 [Wordpress-Captcha] url=https://wordpress.org/plugins/captcha/ safe=4.4.5 vuln=https://www.wordfence.com/blog/2017/12/backdoor-captcha-plugin/ file=captcha.php variable=Version: subdir=0