Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 22 May 2015 22:28:19 +0800
From: Jing Wang <justqdjing@...il.com>
To: oss-security@...ts.openwall.com
Subject: Feed2JS v1.7 XSS Web Security Vulnerabilities - CVE Request

Hello,

Could you assign a CVE reference ID for the following vulnerability?
Thank you very much.


http://seclists.org/fulldisclosure/2015/May/35
http://www.osvdb.org/show/osvdb/121852
http://packetstormsecurity.com/files/131840/Feed2JS-1.7-Cross-Site-Scripting.html
http://tetraph.com/security/xss-vulnerability/feed2js-v1-7-xss/
http://permalink.gmane.org/gmane.comp.security.fulldisclosure/1958
http://cxsecurity.com/issue/WLB-2015050068
http://www.intelligentexploit.com/view-details.html?id=21315




========

Exploit Title:
Feed2JS v1.7 XSS (Cross-site Scripting) Web Security Vulnerabilities

Product:
Feed2JS

Vendor:
feed2js.org

Vendor Link:
https://feed2js.org/index.php?s=download

Vulnerable Versions:
v1.7

Tested Versions:
v1.7

========




Best Regards,
Wang Jing,


Division of Mathematical Sciences (MAS),
School of Physical and Mathematical Sciences (SPMS),
Nanyang Technological University (NTU),
Singapore.
http://www.tetraph.com/wangjing/
https://twitter.com/justqdjing

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ