Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 4 Aug 2016 19:40:14 +0200
From: Summer of Pwnage <lists@...urify.nl>
To: oss-security@...ts.openwall.com
Subject: Multiple Cross-Site Scripting vulnerabilities affecting seven
 WordPress Plugins

Please see attached advisories for more information. These issues were 
found during Summer of Pwnage (https://sumofpwn.nl), a Dutch community 
project. Its goal is to contribute to the security of popular, widely 
used OSS projects in a fun and educational way.



View attachment "cross_site_scripting_in_activity_log_wordpress_plugin.txt" of type "text/plain" (3984 bytes)

View attachment "cross_site_scripting_in_count_per_day_wordpress_plugin.txt" of type "text/plain" (3422 bytes)

View attachment "cross_site_scripting_in_formbuilder_wordpress_plugin.txt" of type "text/plain" (4163 bytes)

View attachment "cross_site_scripting_in_wordpress_landing_pages_plugin.txt" of type "text/plain" (3802 bytes)

View attachment "cross_site_scripting_vulnerability_in_events_made_easy_wordpress_plugin.txt" of type "text/plain" (12233 bytes)

View attachment "cross_site_scripting_vulnerability_in_search_function_activity_log_wordpress_plugin.txt" of type "text/plain" (3991 bytes)

View attachment "stored_cross_site_scripting_vulnerability_in_count_per_day_wordpress_plugin.txt" of type "text/plain" (4232 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ