-
Notifications
You must be signed in to change notification settings - Fork 8
/
theme_vulns.json
1 lines (1 loc) · 92.9 KB
/
theme_vulns.json
1
[{"crius":{"vulnerabilities":[{"id":7306,"title":"Crius - VideoJS Cross-Site Scripting Vulnerability","url":["http://seclists.org/fulldisclosure/2013/May/77"],"secunia":["53427"],"created_at":"2014-08-01T10:59:16.000Z","updated_at":"2014-08-01T10:59:16.000Z"}]}},{"source":{"vulnerabilities":[{"id":7307,"title":"Source - VideoJS Cross-Site Scripting Vulnerability","url":["http://seclists.org/fulldisclosure/2013/May/77"],"secunia":["53457"],"created_at":"2014-08-01T10:59:16.000Z","updated_at":"2014-08-01T10:59:16.000Z"}]}},{"i-love-it":{"vulnerabilities":[{"id":7308,"title":"I Love It - VideoJS Cross-Site Scripting Vulnerability","url":["http://seclists.org/fulldisclosure/2013/May/77"],"secunia":["53548"],"created_at":"2014-08-01T10:59:16.000Z","updated_at":"2014-08-01T10:59:16.000Z"}]}},{"smartstart":{"vulnerabilities":[{"id":7309,"title":"Smart Start - VideoJS Cross-Site Scripting Vulnerability","url":["http://seclists.org/fulldisclosure/2013/May/77"],"secunia":["53460"],"created_at":"2014-08-01T10:59:16.000Z","updated_at":"2014-08-01T10:59:16.000Z"}]}},{"covertvideopress":{"vulnerabilities":[{"id":7310,"title":"Covert Videopress - VideoJS Cross-Site Scripting Vulnerability","url":["http://seclists.org/fulldisclosure/2013/May/77"],"secunia":["53494"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"photolio":{"vulnerabilities":[{"id":7311,"title":"Photolio - VideoJS Cross-Site Scripting Vulnerability","url":["http://seclists.org/fulldisclosure/2013/May/77"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"onepagewebsite":{"vulnerabilities":[{"id":7312,"title":"onepagewebsite - Full Path Disclosure vulnerability","url":["http://1337day.com/exploit/20027"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"vithy":{"vulnerabilities":[{"id":7313,"title":"vithy - Full Path Disclosure vulnerability","url":["http://1337day.com/exploit/20040"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"},{"id":7314,"title":"vithy - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/19830"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"},{"id":7315,"title":"vithy - Custom Background Shell Upload","url":["http://packetstormsecurity.com/files/125827/"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"appius":{"vulnerabilities":[{"id":7316,"title":"appius - Full Path Disclosure vulnerability","url":["http://1337day.com/exploit/20039"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"},{"id":7317,"title":"appius - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/19831"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"},{"id":7318,"title":"appius - Custom Background Shell Upload","url":["http://packetstormsecurity.com/files/125827/"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"yvora":{"vulnerabilities":[{"id":7319,"title":"yvora - Full Path Disclosure vulnerability","url":["http://1337day.com/exploit/20038"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"},{"id":7320,"title":"yvora - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/19834"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"shotzz":{"vulnerabilities":[{"id":7321,"title":"Shotzz - Full Path Disclosure vulnerability","url":["http://1337day.com/exploit/20041"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"},{"id":7322,"title":"Shotzz - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/19829"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"},{"id":7323,"title":"Shotzz - Custom Background Shell Upload","url":["http://packetstormsecurity.com/files/125827/"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"dagda":{"vulnerabilities":[{"id":7324,"title":"dagda - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/19832"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"},{"id":7325,"title":"dagda - Custom Background Shell Upload","url":["http://packetstormsecurity.com/files/125827/"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"moneymasters":{"vulnerabilities":[{"id":7326,"title":"moneymasters - Full Path Disclosure vulnerability","url":["http://1337day.com/exploit/20077"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"},{"id":7327,"title":"moneymasters - File Upload Vulnerability (metasploit)","url":["http://1337day.com/exploit/20076"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"ovum":{"vulnerabilities":[{"id":7328,"title":"XSS vulnerability in Imediapixel premium WordPress themes","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"avanix":{"vulnerabilities":[{"id":7328,"title":"XSS vulnerability in Imediapixel premium WordPress themes","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"ebiz":{"vulnerabilities":[{"id":7328,"title":"XSS vulnerability in Imediapixel premium WordPress themes","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"ecobiz":{"vulnerabilities":[{"id":7328,"title":"XSS vulnerability in Imediapixel premium WordPress themes","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-imediapixel.html"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"traject":{"vulnerabilities":[{"id":7329,"title":"XSS vulnerability in Parallelus premium WordPress themes","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"intersect":{"vulnerabilities":[{"id":7329,"title":"XSS vulnerability in Parallelus premium WordPress themes","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"salutation":{"vulnerabilities":[{"id":7329,"title":"XSS vulnerability in Parallelus premium WordPress themes","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"unite":{"vulnerabilities":[{"id":7329,"title":"XSS vulnerability in Parallelus premium WordPress themes","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-parallelus-premium.html"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"shapeless":{"vulnerabilities":[{"id":7330,"title":"Shapeless - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html"],"osvdb":["85919"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"brisk":{"vulnerabilities":[{"id":7331,"title":"Brisk - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html"],"osvdb":["85918"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"blaze":{"vulnerabilities":[{"id":7332,"title":"Blaze - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html"],"osvdb":["85917"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"eunice":{"vulnerabilities":[{"id":7333,"title":"Eunice - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html"],"osvdb":["85916"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"explicit":{"vulnerabilities":[{"id":7334,"title":"Explicit - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html"],"osvdb":["85915"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"essence":{"vulnerabilities":[{"id":7335,"title":"Essence - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html"],"osvdb":["85914"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"paramount":{"vulnerabilities":[{"id":7336,"title":"Paramount - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html"],"osvdb":["85913"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"picturefactory":{"vulnerabilities":[{"id":7337,"title":"PictureFactory - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html"],"osvdb":["85912"],"created_at":"2014-08-01T10:59:17.000Z","updated_at":"2014-08-01T10:59:17.000Z"}]}},{"sparky":{"vulnerabilities":[{"id":7338,"title":"Sparky - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html"],"osvdb":["85911"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"theagency":{"vulnerabilities":[{"id":7339,"title":"TheAgency - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html"],"osvdb":["85910"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"konzept":{"vulnerabilities":[{"id":7340,"title":"Konzept - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html"],"osvdb":["85920"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"},{"id":7560,"title":"Konzept 1.0 - Arbitrary File Upload","url":["http://1337day.com/exploit/22667"],"created_at":"2014-09-19T07:15:16.000Z","updated_at":"2014-09-21T09:54:22.000Z"}]}},{"daisho":{"vulnerabilities":[{"id":7341,"title":"Daisho - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/09/xss-vulnerability-in-multiple-premium.html"],"osvdb":["85921"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"choices":{"vulnerabilities":[{"id":7342,"title":"Choices - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html"],"osvdb":["86755"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"brightbox":{"vulnerabilities":[{"id":7343,"title":"Brightbox - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html"],"osvdb":["86756"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"broadscope":{"vulnerabilities":[{"id":7344,"title":"Broadscope - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html"],"osvdb":["86757"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"corona":{"vulnerabilities":[{"id":7345,"title":"Corona - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html"],"osvdb":["86758"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"flashlight":{"vulnerabilities":[{"id":7346,"title":"Flashlight - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html"],"osvdb":["86759"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"coalition":{"vulnerabilities":[{"id":7347,"title":"Coalition - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html"],"osvdb":["86760"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"shoutbox":{"vulnerabilities":[{"id":7348,"title":"Shoutbox - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html"],"osvdb":["86761"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"velvet":{"vulnerabilities":[{"id":7349,"title":"Velvet - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html"],"osvdb":["86762"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"upscale":{"vulnerabilities":[{"id":7350,"title":"Upscale - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html"],"osvdb":["86763"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"expose":{"vulnerabilities":[{"id":7351,"title":"Expose - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html"],"osvdb":["86764"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"abundance":{"vulnerabilities":[{"id":7352,"title":"Abundance - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html"],"osvdb":["86765"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"eunoia":{"vulnerabilities":[{"id":7353,"title":"Eunoia - Unspecified XSS","url":["http://jannefi.blogspot.fi/2012/10/xss-vulnerability-in-wp-themes-by-kriesi.html"],"osvdb":["86766"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"wise":{"vulnerabilities":[{"id":7354,"title":"Site5 Wordpress Themes Email Spoofing","url":["http://packetstormsecurity.org/files/114750/"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"webfolio":{"vulnerabilities":[{"id":7354,"title":"Site5 Wordpress Themes Email Spoofing","url":["http://packetstormsecurity.org/files/114750/"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z","fixed_in":"2.0"}]}},{"colorbold":{"vulnerabilities":[{"id":7354,"title":"Site5 Wordpress Themes Email Spoofing","url":["http://packetstormsecurity.org/files/114750/"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"rockwell":{"vulnerabilities":[{"id":7354,"title":"Site5 Wordpress Themes Email Spoofing","url":["http://packetstormsecurity.org/files/114750/"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"xmas":{"vulnerabilities":[{"id":7354,"title":"Site5 Wordpress Themes Email Spoofing","url":["http://packetstormsecurity.org/files/114750/"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"designpile":{"vulnerabilities":[{"id":7354,"title":"Site5 Wordpress Themes Email Spoofing","url":["http://packetstormsecurity.org/files/114750/"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"alltuts":{"vulnerabilities":[{"id":7354,"title":"Site5 Wordpress Themes Email Spoofing","url":["http://packetstormsecurity.org/files/114750/"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z","fixed_in":"2.0"}]}},{"boldy":{"vulnerabilities":[{"id":7354,"title":"Site5 Wordpress Themes Email Spoofing","url":["http://packetstormsecurity.org/files/114750/"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z","fixed_in":"2.0"}]}},{"simplo":{"vulnerabilities":[{"id":7354,"title":"Site5 Wordpress Themes Email Spoofing","url":["http://packetstormsecurity.org/files/114750/"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"diary":{"vulnerabilities":[{"id":7354,"title":"Site5 Wordpress Themes Email Spoofing","url":["http://packetstormsecurity.org/files/114750/"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z","fixed_in":"2.0"}]}},{"journalcrunch":{"vulnerabilities":[{"id":7354,"title":"Site5 Wordpress Themes Email Spoofing","url":["http://packetstormsecurity.org/files/114750/"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z","fixed_in":"2.0"}]}},{"prosume":{"vulnerabilities":[{"id":7354,"title":"Site5 Wordpress Themes Email Spoofing","url":["http://packetstormsecurity.org/files/114750/"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z","fixed_in":"2.0"}]}},{"famous":{"vulnerabilities":[{"id":7355,"title":"Famous 2.0.5 - Shell Upload","url":["http://packetstormsecurity.org/files/113842/"],"osvdb":["83013"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"deep-blue":{"vulnerabilities":[{"id":7356,"title":"Deep-Blue 1.9.2 - Arbitrary File Upload Vulnerability","url":["http://packetstormsecurity.org/files/113843/"],"osvdb":["83014"],"secunia":["49611"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"classipress":{"vulnerabilities":[{"id":7357,"title":"Classipress \u003c= 3.1.4 - Stored XSS","url":["http://cxsecurity.com/issue/WLB-2011110001"],"osvdb":["76712"],"cve":["2011-5257"],"exploitdb":["18053"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z","fixed_in":"3.1.5"}]}},{"merchant":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"smpl":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"drawar":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"sentient":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"whitelight":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"unsigned":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"shelflife":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"olya":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"sliding":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"beveled":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"empire-commerce":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"buro-commerce":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"briefed-commerce":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"wikeasi":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"currents":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"emporium":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"biznizz-commerce":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"kaboodle-commerce":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"inspire-commerce":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"teamster":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"argentum":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"statua-commerce":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"simplicity-commerce":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"canvas-commerce":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"wootique":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"woostore":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"coquette":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"buro":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"swatch":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"announcement":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"empire":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"supportpress":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"editorial":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"statua":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"briefed":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"faultpress":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"kaboodle":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"savinggrace":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"premiere":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"simplicity":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"deliciousmagazine":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"bookclub":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"boldnews":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"placeholder":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"biznizz":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"auld":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"listings":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"elefolio":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"chapters":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"continuum":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"diner":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"skeptical":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"caffeinated":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"crisp":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"sealight":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"estate":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"tma":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"coda":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"inspire":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"apz":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"spectrum":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"diarise":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"boast":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"retreat":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"cityguide":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"canvas":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"postcard":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"delegate":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"mystream":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"optimize":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"backstage":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"bueno":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"digitalfarm":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"headlines":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"therapy":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"rockstar":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"dailydeal":{"vulnerabilities":[{"id":7359,"title":"DailyDeal - File Upload Remote Code Execution","url":["http://packetstormsecurity.com/files/123748/","http://templatic.com/app-themes/daily-deal-premium-wordpress-app-theme"],"osvdb":["98924"],"created_at":"2014-08-01T10:59:20.000Z","updated_at":"2014-08-01T10:59:20.000Z"},{"id":7482,"title":"Dailydeal - Templatic Theme CSRF File Upload Vulnerability","url":["http://1337day.com/exploit/22091"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"dailyedition":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"object":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"coffeebreak":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"mainstream":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"featurepitch":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"thejournal":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"aperture":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"metamorphosis":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"bloggingstream":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"thestation":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"groovyvideo":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"irresistible":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"cushy":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"wootube":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"abstract":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"busybee":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"blogtheme":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"typebased":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"overeasy":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"snapshot":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"openair":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"freshnews":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"livewire":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"flashnews":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"},{"id":7360,"title":"Flash News - thumb.php src Parameter XSS","url":["http://packetstormsecurity.com/files/120037/","http://seclists.org/fulldisclosure/2013/Feb/8","http://cxsecurity.com/issue/WLB-2013020010"],"osvdb":["89887"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"},{"id":7361,"title":"Flash News - Multiple Script Path Disclosure","url":["http://packetstormsecurity.com/files/120037/","http://seclists.org/fulldisclosure/2013/Feb/8","http://cxsecurity.com/issue/WLB-2013020010"],"osvdb":["89888"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"},{"id":7362,"title":"Flash News - includes/test.php a Parameter XSS","url":["http://packetstormsecurity.com/files/120037/","http://seclists.org/fulldisclosure/2013/Feb/8","http://cxsecurity.com/issue/WLB-2013020010"],"osvdb":["89889"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"},{"id":7363,"title":"Flash News - includes/test.php Direct Request Information Disclosure","url":["http://packetstormsecurity.com/files/120037/","http://seclists.org/fulldisclosure/2013/Feb/8","http://cxsecurity.com/issue/WLB-2013020010"],"osvdb":["89890"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"},{"id":7364,"title":"Flash News - thumb.php src Parameter File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/120037/","http://seclists.org/fulldisclosure/2013/Feb/8","http://cxsecurity.com/issue/WLB-2013020010"],"osvdb":["89891"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"},{"id":7365,"title":"Flash News - thumb.php src Parameter Remote DoS","url":["http://packetstormsecurity.com/files/120037/","http://seclists.org/fulldisclosure/2013/Feb/8","http://cxsecurity.com/issue/WLB-2013020010"],"osvdb":["89892"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"}]}},{"gazette":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"premiumnews":{"vulnerabilities":[{"id":7358,"title":"WooThemes WooFramework Remote Unauthenticated Shortcode Execution","url":["https://gist.github.com/2523147"],"created_at":"2014-08-01T10:59:18.000Z","updated_at":"2014-08-01T10:59:18.000Z"}]}},{"dt-chocolate":{"vulnerabilities":[{"id":7366,"title":"dt-chocolate - jPlayer XSS","url":["http://packetstormsecurity.com/files/124756/"],"secunia":["56379"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"},{"id":7367,"title":"dt-chocolate - Image Open redirect","url":["http://cxsecurity.com/issue/WLB-2013020011"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"},{"id":7368,"title":"Multiple vulnerabilities in Chocolate WP theme for WordPress","url":["http://seclists.org/fulldisclosure/2013/Jan/215"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"}]}},{"sandbox":{"vulnerabilities":[{"id":7369,"title":"sandbox - Arbitrary File Upload/FD Vulnerability","url":["http://1337day.com/exploit/20228"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"}]}},{"clockstone":{"vulnerabilities":[{"id":7370,"title":"Clockstone 1.2 - upload.php Arbitrary File Upload Vulnerability","url":["http://www.exploit-db.com/exploits/23494","http://www.securityfocus.com/bid/56988","http://xforce.iss.net/xforce/xfdb/80725"],"osvdb":["88622"],"secunia":["51619"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"}]}},{"archin":{"vulnerabilities":[{"id":7371,"title":"Archin 3.2 - Cross-Site Scripting and Arbitrary File Upload Vulnerabilities","secunia":["50711"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"},{"id":7372,"title":"Archin 3.2 - hades_framework/option_panel/ajax.php Configuration Option Manipulation","osvdb":["86991"],"exploitdb":["21646"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"}]}},{"purity":{"vulnerabilities":[{"id":7373,"title":"Purity - Multiple Cross-Site Scripting Vulnerabilities","secunia":["50627"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"}]}},{"pinboard":{"vulnerabilities":[{"id":7374,"title":"Pinboard 1.0.6 - includes/theme-options.php tab Parameter XSS","url":["http://seclists.org/oss-sec/2013/q1/274","http://cxsecurity.com/issue/WLB-2013020062"],"osvdb":["90070"],"cve":["2013-0286"],"secunia":["52079"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"},{"id":7375,"title":"Pinboard - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124151/"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"}]}},{"montezuma":{"vulnerabilities":[{"id":7376,"title":"montezuma \u003c= 1.1.3 - XSS in ZeroClipboard.swf","url":["http://1337day.com/exploit/20396"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"}]}},{"scarlet":{"vulnerabilities":[{"id":7377,"title":"scarlet \u003c= 1.1.3 - XSS in ZeroClipboard.swf","url":["http://1337day.com/exploit/20396"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"}]}},{"allure-real-estate-theme-for-placester":{"vulnerabilities":[{"id":7378,"title":"allure-real-estate-theme-for-placester \u003c= 0.1.1 - XSS in ZeroClipboard.swf","url":["http://1337day.com/exploit/20396"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"}]}},{"allure-real-estate-theme-for-real-estate":{"vulnerabilities":[{"id":7379,"title":"allure-real-estate-theme-for-real-estate \u003c= 0.1.1 - XSS in ZeroClipboard.swf","url":["http://1337day.com/exploit/20396"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"}]}},{"felici":{"vulnerabilities":[{"id":7380,"title":"felici - XSS Vulnerability","url":["http://1337day.com/exploit/20560"],"created_at":"2014-08-01T10:59:21.000Z","updated_at":"2014-08-01T10:59:21.000Z"},{"id":7381,"title":"felici - Custom Background Shell Upload","url":["http://packetstormsecurity.com/files/125830/"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"classic":{"vulnerabilities":[{"id":7382,"title":"Classic 1.5 - PHP_SELF XSS","osvdb":["38450"],"cve":["2007-4483"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"brilliant":{"vulnerabilities":[{"id":7383,"title":"brilliant - File Upload Vulnerability","url":["http://ruinedsec.wordpress.com/2013/04/03/wordpress-themes-exploits-are-in-action-wpscan/"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"colormix":{"vulnerabilities":[{"id":7384,"title":"Colormix - Multiple vulnerabilities","url":["http://packetstormsecurity.com/files/121372/","http://seclists.org/fulldisclosure/2013/Apr/172"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"jobroller":{"vulnerabilities":[{"id":7385,"title":"XSS in jobroller theme","url":["http://cxsecurity.com/issue/WLB-2013060089"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"ambience":{"vulnerabilities":[{"id":7386,"title":"Xss In wordpress ambience theme","url":["http://www.websecuritywatch.com/wordpress-ambience-xss/"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"slash-wp":{"vulnerabilities":[{"id":7387,"title":"Slash WP - FPD, XSS and CS vulnerabilities","url":["http://packetstormsecurity.com/files/123748/","http://seclists.org/fulldisclosure/2013/Jun/166"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"persuasion":{"vulnerabilities":[{"id":7388,"title":"Multiple Themes - PrettyPhoto DOM XSS","url":["http://www.rafayhackingarticles.net/2013/05/kali-linux-dom-based-xss-writeup.html","http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0177.html","http://packetstormsecurity.com/files/124960/"],"cve":["2013-6837"],"secunia":["54924","56583"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-09-27T14:38:17.000Z"},{"id":7389,"title":"Persuasion \u003c= 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":["http://packetstormsecurity.com/files/124547/","http://www.securityfocus.com/bid/64501"],"osvdb":["101330"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z","fixed_in":"2.5"},{"id":7390,"title":"Persuasion \u003c= 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":["http://packetstormsecurity.com/files/124547/","http://www.securityfocus.com/bid/64501"],"osvdb":["101331"],"secunia":["56359"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z","fixed_in":"2.5"}]}},{"more":{"vulnerabilities":[{"id":7388,"title":"Multiple Themes - PrettyPhoto DOM XSS","url":["http://www.rafayhackingarticles.net/2013/05/kali-linux-dom-based-xss-writeup.html","http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0177.html","http://packetstormsecurity.com/files/124960/"],"cve":["2013-6837"],"secunia":["54924","56583"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-09-27T14:38:17.000Z"}]}},{"silverorchid":{"vulnerabilities":[{"id":7392,"title":"silverOrchid \u003c= 1.5.0 - XSS Vulnerability","url":["http://packetstormsecurity.com/files/122986/"],"osvdb":["96723"],"secunia":["54662"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"caulk":{"vulnerabilities":[{"id":7393,"title":"Caulk - path disclosure vulnerability","url":["http://packetstormsecurity.com/files/120632/","http://themeforest.net/item/caulk/76108"],"osvdb":["90889"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"wplocalplaces":{"vulnerabilities":[{"id":7394,"title":"WPLocalPlaces - File Upload Remote Code Execution","url":["http://packetstormsecurity.com/files/123697/"],"osvdb":["98806"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"photocrati-theme":{"vulnerabilities":[{"id":7395,"title":"Photocrati 4.7.3 - photocrati-gallery/ecomm-sizes.php prod_id Parameter Reflected XSS","url":["http://packetstormsecurity.com/files/124986/"],"osvdb":["102717"],"secunia":["56690"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"},{"id":7396,"title":"Photocrati - Multiple Script Direct Request Path Disclosure","url":["http://seclists.org/fulldisclosure/2013/Apr/238"],"osvdb":["92836"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"music":{"vulnerabilities":[{"id":7397,"title":"Music - Multiple Script Direct Request Path Disclosure","url":["http://seclists.org/fulldisclosure/2013/Apr/238"],"osvdb":["92837"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"imperial-fairytale":{"vulnerabilities":[{"id":7398,"title":"Imperial Fairytale - Multiple Script Direct Request Path Disclosure","url":["http://seclists.org/fulldisclosure/2013/Apr/238"],"osvdb":["92838"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"},{"id":7399,"title":"Imperial Fairytale - jPlayer Cross-Site Scripting Vulnerability","url":["http://seclists.org/oss-sec/2013/q2/177"],"secunia":["53210"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"feather12":{"vulnerabilities":[{"id":7400,"title":"Feather12 - Multiple Script Direct Request Path Disclosure","url":["http://seclists.org/fulldisclosure/2013/Apr/238"],"osvdb":["92839"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"studiozen":{"vulnerabilities":[{"id":7401,"title":"Studio Zen - Multiple Script Direct Request Path Disclosure","url":["http://seclists.org/fulldisclosure/2013/Apr/238"],"osvdb":["92840"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"area53":{"vulnerabilities":[{"id":7402,"title":"AREA53 \u003c= 1.0.5 - File Upload Code Execution","url":["http://www.securityfocus.com/bid/63306","http://1337day.com/exploit/21442"],"osvdb":["98927"],"exploitdb":["29068"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"sahifa":{"vulnerabilities":[{"id":7403,"title":"Sahifa 2.4.0 - Multiple Script Path Disclosure Direct Request Path Disclosure","url":["http://packetstormsecurity.com/files/119191/","http://www.securityfocus.com/bid/57109"],"osvdb":["88926"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"},{"id":7404,"title":"Sahifa 2.4.0 - Site Setting Reset CSRF","url":["http://packetstormsecurity.com/files/119191/","http://www.securityfocus.com/bid/57109"],"osvdb":["88927"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"simpledark":{"vulnerabilities":[{"id":7405,"title":"SimpleDark 1.2.10 - 's' Parameter Cross Site Scripting Vulnerability","url":["http://www.securityfocus.com/bid/46615"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"geoplaces4":{"vulnerabilities":[{"id":7406,"title":"GeoPlaces - File Upload Handling Remote Command Execution","url":["http://packetstormsecurity.com/files/123773/"],"osvdb":["98975"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"geoplaces4beta":{"vulnerabilities":[{"id":7406,"title":"GeoPlaces - File Upload Handling Remote Command Execution","url":["http://packetstormsecurity.com/files/123773/"],"osvdb":["98975"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"curvo":{"vulnerabilities":[{"id":7407,"title":"Curvo - wp-content/themes/curvo/functions/upload-handler.php File Upload CSRF","url":["http://packetstormsecurity.com/files/123799/","http://packetstormsecurity.com/files/123820/"],"osvdb":["99043"],"exploitdb":["29211"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"moneytheme":{"vulnerabilities":[{"id":7408,"title":"Money - wp-content/themes/MoneyTheme/uploads/upload.php File Upload Remote Code Execution","url":["http://packetstormsecurity.com/files/123819/"],"osvdb":["99187"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"saico":{"vulnerabilities":[{"id":7409,"title":"Saico - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/21440"],"exploitdb":["29150"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"thisway":{"vulnerabilities":[{"id":7410,"title":"ThisWay - remote shell upload vulnerability","url":["http://packetstormsecurity.com/files/123895/"],"secunia":["55587"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"thinkresponsive":{"vulnerabilities":[{"id":7411,"title":"Think Responsive 1.0 - Arbitrary shell upload vulnerability","url":["http://packetstormsecurity.com/files/123880/"],"exploitdb":["29332"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-08-01T10:59:22.000Z"}]}},{"anthology":{"vulnerabilities":[{"id":7412,"title":"Anthology - Remote File Upload Vulnerability","url":["http://1337day.com/exploit/21460"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"amoveo":{"vulnerabilities":[{"id":7413,"title":"Amoveo - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/21451"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"switchblade":{"vulnerabilities":[{"id":7414,"title":"Switchblade 1.3 - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/21457"],"osvdb":["88918"],"exploitdb":["29330"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"magnitudo":{"vulnerabilities":[{"id":7415,"title":"Magnitudo - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/21457"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"ghost":{"vulnerabilities":[{"id":7416,"title":"Ghost - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/21416"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"rightnow":{"vulnerabilities":[{"id":7417,"title":"Right Now - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/21420"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"coldfusion":{"vulnerabilities":[{"id":7418,"title":"Cold Fusion - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/21431"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"chameleon":{"vulnerabilities":[{"id":7419,"title":"Chameleon - Arbitrary File Upload Vulnerability","url":["http://1337day.com/exploit/21449"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"kernel-theme":{"vulnerabilities":[{"id":7420,"title":"Kernel Theme - functions/upload-handler.php File Upload Remote Code Execution","url":["http://packetstormsecurity.com/files/123954/"],"osvdb":["99553"],"exploitdb":["29482"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"rockstar-theme":{"vulnerabilities":[{"id":7421,"title":"Rockstar - Remote File Upload Vulnerability","url":["http://packetstormsecurity.com/files/123999/","http://packetstormsecurity.com/files/124232/","http://1337day.com/exploit/21510"],"exploitdb":["29946"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"reganto-theme":{"vulnerabilities":[{"id":7422,"title":"Reganto - Remote File Upload Vulnerability","url":["http://packetstormsecurity.com/files/123999/","http://packetstormsecurity.com/files/124232/","http://1337day.com/exploit/21511"],"exploitdb":["29946"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"rayoflight-theme":{"vulnerabilities":[{"id":7423,"title":"Ray of Light - Remote File Upload Vulnerability","url":["http://packetstormsecurity.com/files/123999/","http://packetstormsecurity.com/files/124232/","http://1337day.com/exploit/21512"],"exploitdb":["29946"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"radial-theme":{"vulnerabilities":[{"id":7424,"title":"Radial - Remote File Upload Vulnerability","url":["http://packetstormsecurity.com/files/123999/","http://packetstormsecurity.com/files/124232/","http://1337day.com/exploit/21513"],"exploitdb":["29946"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"oxygen-theme":{"vulnerabilities":[{"id":7425,"title":"Oxygen - Remote File Upload Vulnerability","url":["http://packetstormsecurity.com/files/123999/","http://packetstormsecurity.com/files/124232/","http://1337day.com/exploit/21514"],"exploitdb":["29946"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"bulteno-theme":{"vulnerabilities":[{"id":7426,"title":"Bulteno - Remote File Upload Vulnerability","url":["http://packetstormsecurity.com/files/123999/","http://packetstormsecurity.com/files/124232/","http://1337day.com/exploit/21515"],"exploitdb":["29946"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"bordeaux-theme":{"vulnerabilities":[{"id":7427,"title":"Bordeaux - Remote File Upload Vulnerability","url":["http://packetstormsecurity.com/files/123999/","http://packetstormsecurity.com/files/124232/","http://1337day.com/exploit/21516"],"exploitdb":["29946"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"agritourismo-theme":{"vulnerabilities":[{"id":7428,"title":"Agritourismo - Remote File Upload Vulnerability","url":["http://packetstormsecurity.com/files/124232/"],"exploitdb":["29946"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"highlight":{"vulnerabilities":[{"id":7429,"title":"Highlight Powerful Premium - upload-handler.php File Upload CSRF","url":["http://packetstormsecurity.com/files/123974/"],"osvdb":["99703"],"secunia":["55671"],"exploitdb":["29525"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"euclid":{"vulnerabilities":[{"id":7430,"title":"Euclid - CSRF Vulnerability","url":["http://packetstormsecurity.com/files/124043/","http://1337day.com/exploit/21538"],"exploitdb":["29667"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"dimension":{"vulnerabilities":[{"id":7431,"title":"Dimension - CSRF Vulnerability","url":["http://packetstormsecurity.com/files/124042/","http://1337day.com/exploit/21537"],"exploitdb":["29668"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"amplus":{"vulnerabilities":[{"id":7432,"title":"Amplus - CSRF Vulnerability","url":["http://packetstormsecurity.com/files/124041/","http://1337day.com/exploit/21535"],"exploitdb":["29669"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"make_a_statement":{"vulnerabilities":[{"id":7433,"title":"Make A Statement - CSRF Vulnerability","url":["http://packetstormsecurity.com/files/124044/","http://1337day.com/exploit/21536"],"exploitdb":["29670"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"ithemes2":{"vulnerabilities":[{"id":7434,"title":"iThemes2 - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"suco":{"vulnerabilities":[{"id":7435,"title":"Suco - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124094/"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"elemin":{"vulnerabilities":[{"id":7436,"title":"Elemin - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124149/"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"folo":{"vulnerabilities":[{"id":7437,"title":"Folo - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124150/"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"},{"id":7438,"title":"Folo - Cross Site Scripting","url":["http://packetstormsecurity.com/files/124230/"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"bloggie":{"vulnerabilities":[{"id":7439,"title":"Bloggie - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124152/"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"blogfolio":{"vulnerabilities":[{"id":7440,"title":"Blogfolio - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124156/"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"optimizepress":{"vulnerabilities":[{"id":7441,"title":"OptimizePress - File Upload Vulnerability","url":["http://packetstormsecurity.com/files/124246/","http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/"],"osvdb":["100509"],"cve":["2013-7102"],"secunia":["56379"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z","metasploit":"exploit/unix/webapp/php_wordpress_optimizepress","fixed_in":"1.6"}]}},{"blooog":{"vulnerabilities":[{"id":7442,"title":"Blooog 1.1 - jplayer.swf Cross Site Scripting","url":["http://packetstormsecurity.com/files/124240/","http://xforce.iss.net/xforce/xfdb/89356"],"osvdb":["92254"],"cve":["2013-7129"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"toolbox":{"vulnerabilities":[{"id":7443,"title":"Toolbox 1.4 - flyer.php mls Parameter SQL Injection","url":["http://www.securityfocus.com/bid/56745"],"osvdb":["88293"],"created_at":"2014-08-01T10:59:23.000Z","updated_at":"2014-08-01T10:59:23.000Z"}]}},{"oberliga_theme":{"vulnerabilities":[{"id":7444,"title":"Oberliga - team.php team Parameter SQL Injection","url":["http://packetstormsecurity.org/files/118368/","http://xforce.iss.net/xforce/xfdb/80273"],"osvdb":["88454"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z"}]}},{"cstardesign":{"vulnerabilities":[{"id":7445,"title":"CStar Design 2.0 - flashmoXML.php id Parameter SQL Injection","url":["http://www.securityfocus.com/bid/56694"],"osvdb":["88291"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z"}]}},{"malmonation":{"vulnerabilities":[{"id":7446,"title":"Malmonation - debate.php id Parameter SQL Injection","url":["http://packetstormsecurity.org/files/118340/","http://xforce.iss.net/xforce/xfdb/80252"],"osvdb":["87866"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z"}]}},{"lightspeed":{"vulnerabilities":[{"id":7447,"title":"LightSpeed - Valums Uploader Shell Upload Exploit","url":["http://packetstormsecurity.com/files/119241/"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z"}]}},{"eptonic":{"vulnerabilities":[{"id":7448,"title":"Eptonic - Valums Uploader Shell Upload Exploit","url":["http://packetstormsecurity.com/files/119241/"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z"}]}},{"nuance":{"vulnerabilities":[{"id":7449,"title":"Nuance - Valums Uploader Shell Upload Exploit","url":["http://packetstormsecurity.com/files/119241/"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z"}]}},{"dejavu":{"vulnerabilities":[{"id":7450,"title":"DejaVu 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101330"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.5"},{"id":7451,"title":"DejaVu 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101331"],"secunia":["56359"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.5"}]}},{"elegance":{"vulnerabilities":[{"id":7452,"title":"Elegance - lib/scripts/dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Access","url":["http://packetstormsecurity.com/files/126989/"],"osvdb":["108100"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z"},{"id":7453,"title":"Elegance 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101330"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.5"},{"id":7454,"title":"Elegance 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101331"],"secunia":["56359"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.5"}]}},{"echelon":{"vulnerabilities":[{"id":7455,"title":"Echelon - media-upload.php Remote File Upload","url":["http://www.securityfocus.com/bid/67080","http://packetstormsecurity.com/files/126327/"],"osvdb":["106929"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z"},{"id":7456,"title":"Echelon 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101330"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.5"},{"id":7457,"title":"Echelon 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101331"],"secunia":["56359"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.5"}]}},{"modular":{"vulnerabilities":[{"id":7458,"title":"Modular 2.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101330"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.5"},{"id":7459,"title":"Modular 2.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101331"],"secunia":["56359"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.5"}]}},{"fusion":{"vulnerabilities":[{"id":7460,"title":"Fusion 2.1 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101330"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.2"},{"id":7461,"title":"Fusion 2.1 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101331"],"secunia":["56359"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.2"}]}},{"method":{"vulnerabilities":[{"id":7462,"title":"Method 2.1 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101330"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.5"},{"id":7463,"title":"Method 2.1 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101331"],"secunia":["56359"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.2"}]}},{"myriad":{"vulnerabilities":[{"id":7464,"title":"Myriad 2.0 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101330"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.5"},{"id":7465,"title":"Myriad 2.0 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101331"],"secunia":["56359"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.1"}]}},{"construct":{"vulnerabilities":[{"id":7466,"title":"Construct 1.4 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101330"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.5"},{"id":7467,"title":"Construct 1.4 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101331"],"secunia":["56359"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"1.5"}]}},{"awake":{"vulnerabilities":[{"id":7468,"title":"Awake 3.3 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101330"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"2.5"},{"id":7469,"title":"Awake 3.3 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101331"],"secunia":["56359"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"3.4"}]}},{"infocus":{"vulnerabilities":[{"id":7470,"title":"InFocus - lib/scripts/dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Access","url":["http://packetstormsecurity.com/files/126988/"],"osvdb":["108099"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z"},{"id":7472,"title":"InFocus 3.3 - dl-skin.php _mysite_delete_skin_zip Parameter Absolute Path Traversal Remote Directory Deletion","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101330"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:24.000Z","updated_at":"2014-08-01T10:59:24.000Z","fixed_in":"3.4"},{"id":7473,"title":"InFocus 3.3 - dl-skin.php _mysite_download_skin Parameter Absolute Path Traversal Remote File Download","url":["http://www.securityfocus.com/bid/64501"],"osvdb":["101331"],"secunia":["56359"],"exploitdb":["30443"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z","fixed_in":"3.4"},{"id":7388,"title":"Multiple Themes - PrettyPhoto DOM XSS","url":["http://www.rafayhackingarticles.net/2013/05/kali-linux-dom-based-xss-writeup.html","http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0177.html","http://packetstormsecurity.com/files/124960/"],"cve":["2013-6837"],"secunia":["54924","56583"],"created_at":"2014-08-01T10:59:22.000Z","updated_at":"2014-09-27T14:38:17.000Z"}]}},{"elegant-grunge":{"vulnerabilities":[{"id":7474,"title":"Elegant Grunge 1.0.3 - s Parameter XSS","url":["http://www.securityfocus.com/bid/49869"],"osvdb":["75942"],"cve":["2011-3856"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z","fixed_in":"1.0.4"}]}},{"simplebalance":{"vulnerabilities":[{"id":7475,"title":"Simple Balance \u003c= 2.2.1 - index.php s Parameter XSS","url":["http://packetstormsecurity.com/files/106341/"],"osvdb":["76722"],"secunia":["46671"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"codilight":{"vulnerabilities":[{"id":7476,"title":"Codilight Premium 1.0.0 - admin/front-end/options.php reset Parameter XSS","osvdb":["100791"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"iloveit":{"vulnerabilities":[{"id":7477,"title":"Love It - XSS / Content Spoofing / Path Disclosure","url":["http://packetstormsecurity.com/files/122386/"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"dandelion":{"vulnerabilities":[{"id":7478,"title":"Dandelion - Arbitry File Upload","url":["http://packetstormsecurity.com/files/125098/"],"osvdb":["99043"],"exploitdb":["31424"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"kiddo":{"vulnerabilities":[{"id":7479,"title":"Kiddo - remote shell upload vulnerability","url":["http://packetstormsecurity.com/files/125138/"],"secunia":["56874"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"thecotton_v114":{"vulnerabilities":[{"id":7480,"title":"The Cotton - Remote File Upload Vulnerability","url":["http://packetstormsecurity.com/files/125506/","http://www.securityfocus.com/bid/65958","http://seclists.org/bugtraq/2014/Mar/9"],"osvdb":["103911"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"realestate":{"vulnerabilities":[{"id":7481,"title":"Real Estate - Templatic Theme CSRF File Upload Vulnerability","url":["http://1337day.com/exploit/22091"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"nightlife":{"vulnerabilities":[{"id":7483,"title":"Nightlife - Templatic Theme CSRF File Upload Vulnerability","url":["http://1337day.com/exploit/22091"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"5star":{"vulnerabilities":[{"id":7484,"title":"5star - Templatic Theme CSRF File Upload Vulnerability","url":["http://1337day.com/exploit/22091"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"specialist":{"vulnerabilities":[{"id":7485,"title":"Specialist - Templatic Theme CSRF File Upload Vulnerability","url":["http://1337day.com/exploit/22091"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"flatshop":{"vulnerabilities":[{"id":7486,"title":"Flatshop - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"magazine":{"vulnerabilities":[{"id":7487,"title":"Magazine - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"parallax":{"vulnerabilities":[{"id":7488,"title":"Parallax - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"bold":{"vulnerabilities":[{"id":7489,"title":"Bold - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"metro":{"vulnerabilities":[{"id":7490,"title":"Metro - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"pinshop":{"vulnerabilities":[{"id":7491,"title":"Pinshop - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"agency":{"vulnerabilities":[{"id":7492,"title":"Agency - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"slide":{"vulnerabilities":[{"id":7493,"title":"Slide - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"postline":{"vulnerabilities":[{"id":7494,"title":"Postline - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"fullscreen":{"vulnerabilities":[{"id":7495,"title":"Fulscreen - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"shopo":{"vulnerabilities":[{"id":7496,"title":"Shopo - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"minshop":{"vulnerabilities":[{"id":7497,"title":"Minshop - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"notes":{"vulnerabilities":[{"id":7498,"title":"Notes - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:25.000Z","updated_at":"2014-08-01T10:59:25.000Z"}]}},{"shopdock":{"vulnerabilities":[{"id":7499,"title":"Shopdock - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"phototouch":{"vulnerabilities":[{"id":7500,"title":"Phototouch - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"basic":{"vulnerabilities":[{"id":7501,"title":"Basic - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"responz":{"vulnerabilities":[{"id":7502,"title":"Responz - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"simfo":{"vulnerabilities":[{"id":7503,"title":"Simfo - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"grido":{"vulnerabilities":[{"id":7504,"title":"Grido - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"tisa":{"vulnerabilities":[{"id":7505,"title":"Tisa - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"funki":{"vulnerabilities":[{"id":7506,"title":"Funki - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"minblr":{"vulnerabilities":[{"id":7507,"title":"Minblr - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"newsy":{"vulnerabilities":[{"id":7508,"title":"Newsy - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"wumblr":{"vulnerabilities":[{"id":7509,"title":"Wumblr - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"rezo":{"vulnerabilities":[{"id":7510,"title":"Rezo - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"photobox":{"vulnerabilities":[{"id":7511,"title":"Photobox - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"edmin":{"vulnerabilities":[{"id":7512,"title":"Edmin - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"koi":{"vulnerabilities":[{"id":7513,"title":"Koi - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"bizco":{"vulnerabilities":[{"id":7514,"title":"Bizco - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"thememin":{"vulnerabilities":[{"id":7515,"title":"Thememin - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"wigi":{"vulnerabilities":[{"id":7516,"title":"Wigi - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"sidepane":{"vulnerabilities":[{"id":7517,"title":"Sidepane - themify-ajax.php File Upload Arbitrary Code Execution","url":["http://packetstormsecurity.com/files/124097/","http://1337day.com/exploit/22090"],"osvdb":["100271"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"sixtees":{"vulnerabilities":[{"id":7518,"title":"Sixtees - Shell Upload","url":["http://packetstormsecurity.com/files/125491/"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"linenity":{"vulnerabilities":[{"id":7519,"title":"LineNity 1.20 - download.php imgurl Parameter Remote Path Traversal File Access","osvdb":["105767"],"exploitdb":["32861"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"scv1":{"vulnerabilities":[{"id":7520,"title":"SCv1 - download.php file Parameter Traversal Remote File Access","url":["http://packetstormsecurity.com/files/127022/"],"osvdb":["107940"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"magazine-basic":{"vulnerabilities":[{"id":7521,"title":"Magazine Basic - wp-content/themes/magazine-basic/view_artist.php id Parameter SQL Injection","url":["http://packetstormsecurity.com/files/118321/","http://www.securityfocus.com/bid/56664"],"osvdb":["87838"],"created_at":"2014-08-01T10:59:26.000Z","updated_at":"2014-08-01T10:59:26.000Z"}]}},{"cakifo":{"vulnerabilities":[{"id":7534,"title":"Cakifo 1.0 - 1.6.1 XSS Vulnerability","url":["http://jayj.dk/security/JVN27531188.html"],"osvdb":["110118"],"cve":["2014-3903"],"created_at":"2014-09-17T14:57:41.000Z","updated_at":"2014-09-17T15:00:03.000Z","fixed_in":"1.6.2"}]}},{"IncredibleWP":{"vulnerabilities":[{"id":7540,"title":"WordPress Slider Revolution Vulnerability","url":["http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html","http://marketblog.envato.com/general/affected-themes/"],"osvdb":["109645"],"exploitdb":["34511"],"created_at":"2014-09-17T17:32:24.000Z","updated_at":"2014-09-17T17:32:24.000Z"}]}},{"ultimatum":{"vulnerabilities":[{"id":7540,"title":"WordPress Slider Revolution Vulnerability","url":["http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html","http://marketblog.envato.com/general/affected-themes/"],"osvdb":["109645"],"exploitdb":["34511"],"created_at":"2014-09-17T17:32:24.000Z","updated_at":"2014-09-17T17:32:24.000Z"}]}},{"medicate":{"vulnerabilities":[{"id":7540,"title":"WordPress Slider Revolution Vulnerability","url":["http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html","http://marketblog.envato.com/general/affected-themes/"],"osvdb":["109645"],"exploitdb":["34511"],"created_at":"2014-09-17T17:32:24.000Z","updated_at":"2014-09-17T17:32:24.000Z"}]}},{"Centum":{"vulnerabilities":[{"id":7540,"title":"WordPress Slider Revolution Vulnerability","url":["http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html","http://marketblog.envato.com/general/affected-themes/"],"osvdb":["109645"],"exploitdb":["34511"],"created_at":"2014-09-17T17:32:24.000Z","updated_at":"2014-09-17T17:32:24.000Z"}]}},{"Avada":{"vulnerabilities":[{"id":7540,"title":"WordPress Slider Revolution Vulnerability","url":["http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html","http://marketblog.envato.com/general/affected-themes/"],"osvdb":["109645"],"exploitdb":["34511"],"created_at":"2014-09-17T17:32:24.000Z","updated_at":"2014-09-17T17:32:24.000Z"}]}},{"striking_r":{"vulnerabilities":[{"id":7540,"title":"WordPress Slider Revolution Vulnerability","url":["http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html","http://marketblog.envato.com/general/affected-themes/"],"osvdb":["109645"],"exploitdb":["34511"],"created_at":"2014-09-17T17:32:24.000Z","updated_at":"2014-09-17T17:32:24.000Z"}]}},{"beach_apollo":{"vulnerabilities":[{"id":7540,"title":"WordPress Slider Revolution Vulnerability","url":["http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html","http://marketblog.envato.com/general/affected-themes/"],"osvdb":["109645"],"exploitdb":["34511"],"created_at":"2014-09-17T17:32:24.000Z","updated_at":"2014-09-17T17:32:24.000Z"}]}},{"urbancity":{"vulnerabilities":[{"id":7570,"title":" Urban City - download.php Local File Inclusion (LFI)","url":["http://packetstormsecurity.com/files/128185/"],"osvdb":["111206"],"created_at":"2014-09-20T19:26:55.000Z","updated_at":"2014-09-24T10:03:15.000Z"}]}},{"NativeChurch":{"vulnerabilities":[{"id":7622,"title":"NativeChurch Theme - Arbitrary File Download","url":["http://www.intelligentexploit.com/view-details.html?id=19753"],"created_at":"2014-09-28T10:02:31.000Z","updated_at":"2014-09-28T10:02:31.000Z"}]}},{"lote27":{"vulnerabilities":[{"id":7623,"title":"lote27 Theme - Arbitrary File Download","url":["http://www.intelligentexploit.com/view-details.html?id=19752"],"created_at":"2014-09-28T10:04:59.000Z","updated_at":"2014-09-28T10:04:59.000Z"}]}},{"refraction":{"vulnerabilities":[{"id":7628,"title":"Refraction Theme Multiple Vulnerabilities (XSS, FPD)","url":["http://seclists.org/fulldisclosure/2014/Oct/3"],"created_at":"2014-10-01T08:08:36.000Z","updated_at":"2014-10-01T08:10:09.000Z"}]}},{"rt_refraction_wp":{"vulnerabilities":[{"id":7628,"title":"Refraction Theme Multiple Vulnerabilities (XSS, FPD)","url":["http://seclists.org/fulldisclosure/2014/Oct/3"],"created_at":"2014-10-01T08:08:36.000Z","updated_at":"2014-10-01T08:10:09.000Z"}]}},{"trinity":{"vulnerabilities":[{"id":7632,"title":"Trinity - Arbitrary File Download","url":["http://packetstormsecurity.com/files/128212/"],"osvdb":["111391"],"created_at":"2014-10-06T16:57:44.000Z","updated_at":"2014-10-06T16:58:21.000Z"}]}}]