Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 17 Jul 2016 10:01:25 +0200
From: Summer of Pwnage <lists@...urify.nl>
To: oss-security@...ts.openwall.com
Subject: Multiple reflected Cross-Site Scripting vulnerabilities affecting
 seven WordPress Plugins

Please see attached advisories for more information. These issues were 
found during Summer of Pwnage (https://sumofpwn.nl), a Dutch community 
project. Its goal is to contribute to the security of popular, widely 
used OSS projects in a fun and educational way.



View attachment "cross_site_scripting_vulnerability_in_email_users_wordpress_plugin.txt" of type "text/plain" (4172 bytes)

View attachment "cross_site_scripting_vulnerability_in_google_forms_wordpress_plugin.txt" of type "text/plain" (4307 bytes)

View attachment "cross_site_scripting_vulnerability_in_master_slider_wordpress_plugin.txt" of type "text/plain" (4778 bytes)

View attachment "cross_site_scripting_vulnerability_in_profile_builder_wordpress_plugin.txt" of type "text/plain" (4071 bytes)

View attachment "cross_site_scripting_vulnerability_in_simple_membership_wordpress_plugin.txt" of type "text/plain" (4512 bytes)

View attachment "cross_site_scripting_vulnerability_in_top_10___popular_posts_plugin_for_wordpress.txt" of type "text/plain" (3965 bytes)

View attachment "cross_site_scripting_vulnerability_in_wp_no_external_links_wordpress_plugin.txt" of type "text/plain" (3998 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ