[Serendipity] url=http://www.s9y.org/ safe=2.0.5 old_safe=1.7.9 vuln=CVE-2016-9681 file=serendipity_config.inc.php variable=$serendipity['version'] subdir=0 [Wordpress] url=http://www.wordpress.org/ safe=4.9.4 old_safe=4.8.6,4.8.5,4.7.10,4.7.9,4.6.11,4.6.10,4.5.14,4.5.13,4.4.15,4.4.14,4.3.16,4.3.15,4.2.20,4.2.19,4.1.23,4.1.22,4.0.23,4.0.22,3.9.24,3.9.23,3.8.26,3.8.25,3.7.26,3.7.25 vuln=https://wordpress.org/news/2018/02/wordpress-4-9-4-maintenance-release/ file=version.php variable=$wp_version subdir=1 extra_match=The WordPress version string [SimplePHPBlog] url=http://www.simplephpblog.com/ safe=0.5.1 vuln=CVE-2007-5071 file=sb_functions.php variable=$sb_info[ 'version' ] subdir=1 [b2evolution] url=http://b2evolution.net/ safe=1.9.2 old_safe=1.8.7 vuln=CVE-2007-0175 file=_application.php variable=$app_version extra_match=This is b2evolution subdir=2 [nucleuscms] url=http://www.nucleuscms.org/ safe=3.40 vuln=CVE-2009-0929 file=globalfunctions.php variable=$nucleus['version'] subdir=2 [sBlog] url=http://sblog.se # Last release 0.7.3 since 2006-03-09 safe= vuln=CVE-2007-1801 file=version.ini variable=conf_current_version subdir=1 extra_match=[sblog_version_info] [Movable_Type] url=http://www.movabletype.com/ # movable type has a crazy versioning scheme, that makes it basically # impossible to really use freewvs properly, latest is 5.2.3 safe=5.13 old_safe=5.2.3,5.2.2,5.2.1 vuln=CVE-2010-3921 file=mt.php variable=VERSION_ID subdir=1 [artmedic_weblog] url=http://www.artmedic-phpscripts.de/ safe= # 1.0 as of 20080325 vuln=CVE-2008-0798 file=artmedic_index.php variable=# artmedic weblog subdir=0 [DotClear] url=http://www.dotclear.net/ safe=2.2.3 vuln=CVE-2011-1584 file=LISEZMOI.txt variable=DotClear subdir=0