Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <a5a9f33f-b61b-6f95-fa81-f0a3cd8defb1@securify.nl>
Date: Thu, 4 Aug 2016 19:40:14 +0200
From: Summer of Pwnage <lists@...urify.nl>
To: oss-security@...ts.openwall.com
Subject: Multiple Cross-Site Scripting vulnerabilities affecting seven
 WordPress Plugins

Please see attached advisories for more information. These issues were 
found during Summer of Pwnage (https://sumofpwn.nl), a Dutch community 
project. Its goal is to contribute to the security of popular, widely 
used OSS projects in a fun and educational way.



View attachment "cross_site_scripting_in_activity_log_wordpress_plugin.txt" of type "text/plain" (3984 bytes)

View attachment "cross_site_scripting_in_count_per_day_wordpress_plugin.txt" of type "text/plain" (3422 bytes)

View attachment "cross_site_scripting_in_formbuilder_wordpress_plugin.txt" of type "text/plain" (4163 bytes)

View attachment "cross_site_scripting_in_wordpress_landing_pages_plugin.txt" of type "text/plain" (3802 bytes)

View attachment "cross_site_scripting_vulnerability_in_events_made_easy_wordpress_plugin.txt" of type "text/plain" (12233 bytes)

View attachment "cross_site_scripting_vulnerability_in_search_function_activity_log_wordpress_plugin.txt" of type "text/plain" (3991 bytes)

View attachment "stored_cross_site_scripting_vulnerability_in_count_per_day_wordpress_plugin.txt" of type "text/plain" (4232 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.