Subject mail: CVE-2015-7320 - Multiple Reflective XSS in Appointment Booking Calendar 1.1.7 WordPress plugin

2015-09-28 Thread ibemed
Vulnerability title: Multiple Reflective XSS in Appointment Booking Calendar 1.1.7 WordPress plugin CVE: CVE-2015-7320 Vendor: WordPress DWBooster Product: Appointment Booking Calendar Affected version: 1.1.7 Fixed version: 1.1.8 Reported by: Ibéria Medeiros Vulnerability Details:

[NGENUITY] - Ticket Subject Persistent XSS in Kayako SupportSuite

2009-08-10 Thread Adam Baldwin
nGenuity Information Services – Security Advisory Advisory ID: NGENUITY-2009-008 - Ticket Subject Persistent XSS in Kayako SupportSuite Application: SupportSuite v3.50.06 Vendor: Kayako Vendor website: http://www.kayako.com Author: Adam Baldwin (adam_bald...@ngenuity-is.com

AST-2008-009: (Corrected subject) Remote crash vulnerability in ooh323 channel driver

2008-06-05 Thread Asterisk Security Team
Asterisk Project Security Advisory - AST-2008-009 ++ | Product | Asterisk-Addons |

MITKRB5-SA-2008-002: array overrun in RPC library used by kadmin (resend, corrected subject)

2008-03-18 Thread raeburn
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 MITKRB5-SA-2008-002 MIT krb5 Security Advisory 2008-002 Original release: 2008-03-18 Last update: 2008-03-18 Topic: array overrun in RPC library used by kadmind CVE-2008-0947, CVE-2008-0948 VU#374121 Use of high-numbered file descriptors in the RPC

Subnet Bandwidth Management (SBM) Protocol subject to attack via the Resource Reservation Protocol (RSVP)

2003-08-14 Thread root
Network Penetration www.networkpenetration.com Copyright (c) 2003 Ste Jones [EMAIL PROTECTED] Subnet Bandwidth Management (SBM) Protocol subject to attack via the Resource Reservation Protocol (RSVP) Introduction The resource reservation protocol (RSVP) is used within

Re: PHP-Nuke block-Forums.php subject vulnerabilities

2003-04-02 Thread Frog Man
you think about : $title2 = htmlspecialchars($title2, ENT_QUOTES); From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: PHP-Nuke block-Forums.php subject vulnerabilities Date: 31 Mar 2003 11:15:54 - The block-Forums.php file have a vuln if an attacker insert a malformatted subject

PHP-Nuke block-Forums.php subject vulnerabilities

2003-03-31 Thread lethalman
The block-Forums.php file have a vuln if an attacker insert a malformatted subject to a topic of Splatt Forum. A type of subject is: lt;scriptgt;alert('bug');lt;/scriptgt; The 'alt' tag is closed by and the other text is normal html. This bug is very bad if a subject is: lt;scriptgt

PROGENY-SA-2001-04: OpenSSH subject to traffic analysis

2001-04-13 Thread Progeny Security Team
: OpenSSH subject to traffic analysis Category: net Module: openssh Announced: 2001-04-12 Credits:Solar Designer [EMAIL PROTECTED] BugTraq Mailing List [EMAIL PROTECTED] Affects:Progeny Debian (openssh prior to 2.5.2p2

Re: A subject line buffer overflow in Outlook Express (was Re: EML Content Spoofing and Informed Consent)

2001-04-09 Thread Daniel Naber
On Friday 06 April 2001 05:35, you wrote: line buffer of Outlook Express, versions 5.0.x.x and 5.50.x.x. This overflow is exploitable (in the latter version) with the same EML content spoofing being discussed in the previous thread. Regarding buffer overflows: The KMail team offers a test

A subject line buffer overflow in Outlook Express (was Re: EML Content Spoofing and Informed Consent)

2001-04-06 Thread Paul Schmehl
- Original Message - From: "Dan Kaminsky" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, April 04, 2001 5:52 PM Subject: EML Content Spoofing and Informed Consent (was: Re: MS patch Q292108 opens a vulnerability) [snip] [The short version of this: If I try to open

No Subject

2001-04-05 Thread Rajiv Aaron Manglani
from http://www.turbotax.com/atr/update/ Information for Customers Who Imported Investment Tax Information Into TurboTax There was a programming error in TurboTax that inadvertently saved customer passwords. This applies only to customers who electronically imported investment tax information

No Subject

2001-03-07 Thread Nomen Nescio
hi, this is an exploit for wu-ftpd 2.6.1(1) on linux propz to segv for giving this to me bringin' you the 0day from the hackweiser crew, australian +chapter cya, Till /* * Linux wu-ftpd - 2.6.1(1) * * DiGiT */ #include sys/socket.h #include sys/types.h #include stdio.h #include

No Subject

2001-03-07 Thread predator
Nomen Nescio wrote: hi, this is an exploit for wu-ftpd 2.6.1(1) on linux propz to segv for giving this to me bringin' you the 0day from the hackweiser crew, australian +chapter cya, Till /* * Linux wu-ftpd - 2.6.1(1) * * DiGiT */ Correct me if I'm wrong,but this is

No Subject

2001-02-16 Thread Theo de Raadt
Topic:Vulnerability in x86 USER_LDT validation. Version: All versions of NetBSD, on the i386 platform ONLY. Severity: Local users may execute code with system priveleges Fixed:NetBSD-current:January 16, 2001 NetBSD-1.5 branch: January 17, 2001

No Subject

2001-02-16 Thread security-officer
[EMAIL PROTECTED] Subject: NetBSD Security Advisory 2001-003 Organisation: The NetBSD Foundation, Inc. Reply-to: [EMAIL PROTECTED] -BEGIN PGP SIGNED MESSAGE- NetBSD Security Advisory 2001-003 = Topic: Secure

No Subject

2001-02-16 Thread security-officer
[EMAIL PROTECTED] Subject: NetBSD Security Advisory 2001-002 Organisation: The NetBSD Foundation, Inc. Reply-to: [EMAIL PROTECTED] -BEGIN PGP SIGNED MESSAGE- NetBSD Security Advisory 2001-002 = Topic

No Subject

2001-02-01 Thread nobody
From Anonymous [EMAIL PROTECTED] Wed Jan 31 18:06:24 2001 Date: Thu, 31 Jan 2001 18:06:19 -0400 From: Anonymous [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Bind8 exploit Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-Mailer: Int

No Subject

2001-01-23 Thread Ben Li
use multiple floating images crafted to fit exactly over the buttons used by a particular web-based email provider (since this provider is known ahead of time) to avoid the one-big-clickable- image provided in the example above. We only tested DIV (and LAYER to a limited extent). This exploit

pop3d/imap DOS (while we're on the subject)

2000-04-20 Thread Alex Mottram
I noticed the following behavior in the pop3 server as shipped with Redhat 6.1 (still don't see any updates to the imap package so I'm guessing it's still busted). Unfortunately, I never got off my butt and investigated it further or told anybody (until now). Fortunately, it's not very severe...

Re: KEN! security hole (was: -no subject-)

2000-04-17 Thread Thorsten Claus
This hole still exists in the 1.04.30 version. Is it possible to run KEN! under a special UserProfile (at the "service" cpl) and grant this user *only* access to the proxy dir? Im totally new to NT4.0 SP5, so sorry for my dumb question. Thorsten Claus -- Sent through GMX FreeMail -

No Subject

2000-04-16 Thread eAX [Teelicht]
Hi Bugtraq people, This is a a copy of the mail I send to AVM about the Securtity Bugs in Ken! ISDN Proxy Software. eAX --- Dear AVM Team, I found two serious (security) bugs in your internet/isdn proxy software AVM Ken!, and I

No Subject

2000-02-10 Thread Thomas Biege
-BEGIN PGP SIGNED MESSAGE- __ SuSE Security Announcement Package: make-3.77-44 and earlier Date:Wed Feb 9 17:28:43 CET 2000 Affected SuSE versions: 6.1, 6.3

No Subject

1999-11-25 Thread Swen Persson
Kerb wrote: ... No exploit has been released to date, even though 2.6.0 is out. ... ---ifafoffuffoffaf.c--- Here is another - and I'm sure there are more floating around out there... If a vulnerability is reported and a fix provided (as in this case), plug it! Don't wait until you happen to

No Subject

1999-11-22 Thread Anonymous
Kerb wrote: ... No exploit has been released to date, even though 2.6.0 is out. ... ---ifafoffuffoffaf.c--- /* tmogg ifaf ? typo_ integrated ftp attack facility ElCamTuf ifafoffuffoffaf ElCamTuf sounds much better Code by typo/teso '99. http://teso.scene.at/ - DO NOT USE, DO NOT

No Subject

1999-11-12 Thread David R. Conrad
Hi, The problem is with the reception of NXT records, so it doesn't matter what you have in your own zone files. Any nameserver running versions 8.2, 8.2 patchlevel 1, or 8.2.1 can be susceptible to the attack (albeit there are some pre-conditions that must be met for the issue to even come

No Subject

1999-11-10 Thread Ejovi Nuwere
Rob, w00w00 was planning on addressing this issue, but I just can't control the urge to speak... So if I understand correctly, F5 has made many improvements to the security of BigIP. Now was adding a second account with uid 0 without the knowlede of the user part of that plan?

No Subject

1999-10-28 Thread Bill Nottingham
- Red Hat, Inc. Security Advisory Synopsis: security problems with ypserv Advisory ID:RHSA-1999:046-01 Issue date: 1999-10-27 Updated on: 1999-10-27

No Subject

1999-10-11 Thread Bruno Treguier
Hello, On May 10, Jonas Stahre [EMAIL PROTECTED] sent a message about a problem he encountered on Solaris 7 with rmmount not disabling set-uid programs on external devices like CD-ROMs or floppies, in spite of what is written in the man page. (Message-id: [EMAIL PROTECTED] ) I did not pay much

No Subject

1999-10-03 Thread Dennis Conrad
While testing the security of the Sambar HTTP-Server I found it vulnerable to a simple DOS attack. Sending a "GET (...a lot of Xs..) HTTP/1.0" crashes the Server. It will die WITHOUT logging the attack. My testing-environment: Sambar 4.2.1 M$IE 5.0 (de) Windows 95 C (de) Sample exploit

No Subject

1999-09-10 Thread Mark Ultor
I've found a bug in filter on Elm 2.4 PL25. filter got SGID on mail group. sowatech:~$ filter -f `perl -e ' print "A" x 5000'` Segmentation fault btw in elm bugs r everywhere better don't use it Greeetz ___ Ultor [[EMAIL PROTECTED]] - Network Security Adviser " I hack the