Vulnerability title: Multiple Reflective XSS in Appointment Booking Calendar
1.1.7 WordPress plugin
CVE: CVE-2015-7320
Vendor: WordPress DWBooster
Product: Appointment Booking Calendar
Affected version: 1.1.7
Fixed version: 1.1.8
Reported by: Ibéria Medeiros
Vulnerability Details:
nGenuity Information Services – Security Advisory
Advisory ID: NGENUITY-2009-008 - Ticket Subject Persistent XSS in
Kayako SupportSuite
Application: SupportSuite v3.50.06
Vendor: Kayako
Vendor website: http://www.kayako.com
Author: Adam Baldwin (adam_bald...@ngenuity-is.com
Asterisk Project Security Advisory - AST-2008-009
++
| Product | Asterisk-Addons |
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
MITKRB5-SA-2008-002
MIT krb5 Security Advisory 2008-002
Original release: 2008-03-18
Last update: 2008-03-18
Topic: array overrun in RPC library used by kadmind
CVE-2008-0947, CVE-2008-0948
VU#374121
Use of high-numbered file descriptors in the RPC
Network Penetration
www.networkpenetration.com
Copyright (c) 2003 Ste Jones
[EMAIL PROTECTED]
Subnet Bandwidth Management (SBM) Protocol subject to attack via the
Resource Reservation Protocol (RSVP)
Introduction
The resource reservation protocol (RSVP) is used within
you think about :
$title2 = htmlspecialchars($title2, ENT_QUOTES);
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: PHP-Nuke block-Forums.php subject vulnerabilities
Date: 31 Mar 2003 11:15:54 -
The block-Forums.php file have a vuln if an attacker
insert a malformatted subject
The block-Forums.php file have a vuln if an attacker
insert a malformatted subject to a topic of Splatt
Forum. A type of subject is:
lt;scriptgt;alert('bug');lt;/scriptgt;
The 'alt' tag is closed by and the other text is
normal html. This bug is very bad if a subject is:
lt;scriptgt
: OpenSSH subject to traffic analysis
Category: net
Module: openssh
Announced: 2001-04-12
Credits:Solar Designer [EMAIL PROTECTED]
BugTraq Mailing List [EMAIL PROTECTED]
Affects:Progeny Debian (openssh prior to 2.5.2p2
On Friday 06 April 2001 05:35, you wrote:
line buffer of Outlook Express, versions 5.0.x.x and 5.50.x.x. This
overflow is exploitable (in the latter version) with the same EML
content spoofing being discussed in the previous thread.
Regarding buffer overflows: The KMail team offers a test
- Original Message -
From: "Dan Kaminsky" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, April 04, 2001 5:52 PM
Subject: EML Content Spoofing and Informed Consent (was: Re: MS patch
Q292108 opens a vulnerability)
[snip]
[The short version of this: If I try to open
from http://www.turbotax.com/atr/update/
Information for Customers Who Imported Investment Tax Information Into TurboTax
There was a programming error in TurboTax that inadvertently saved
customer passwords. This applies only to customers who electronically
imported investment tax information
hi,
this is an exploit for wu-ftpd 2.6.1(1) on linux
propz to segv for giving this to me
bringin' you the 0day from the hackweiser crew, australian
+chapter
cya,
Till
/*
* Linux wu-ftpd - 2.6.1(1)
*
* DiGiT
*/
#include sys/socket.h
#include sys/types.h
#include stdio.h
#include
Nomen Nescio wrote:
hi,
this is an exploit for wu-ftpd 2.6.1(1) on linux
propz to segv for giving this to me
bringin' you the 0day from the hackweiser crew, australian
+chapter
cya,
Till
/*
* Linux wu-ftpd - 2.6.1(1)
*
* DiGiT
*/
Correct me if I'm wrong,but this is
Topic:Vulnerability in x86 USER_LDT validation.
Version: All versions of NetBSD, on the i386 platform ONLY.
Severity: Local users may execute code with system priveleges
Fixed:NetBSD-current:January 16, 2001
NetBSD-1.5 branch: January 17, 2001
[EMAIL PROTECTED]
Subject: NetBSD Security Advisory 2001-003
Organisation: The NetBSD Foundation, Inc.
Reply-to: [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
NetBSD Security Advisory 2001-003
=
Topic: Secure
[EMAIL PROTECTED]
Subject: NetBSD Security Advisory 2001-002
Organisation: The NetBSD Foundation, Inc.
Reply-to: [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
NetBSD Security Advisory 2001-002
=
Topic
From Anonymous [EMAIL PROTECTED] Wed Jan 31 18:06:24 2001
Date: Thu, 31 Jan 2001 18:06:19 -0400
From: Anonymous [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Bind8 exploit
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
X-Mailer: Int
use multiple floating images crafted to
fit exactly over the buttons used by a particular web-based email provider
(since this provider is known ahead of time) to avoid the one-big-clickable-
image provided in the example above.
We only tested DIV (and LAYER to a limited extent). This exploit
I noticed the following behavior in the pop3 server as shipped with
Redhat 6.1 (still don't see
any updates to the imap package so I'm guessing it's still busted).
Unfortunately, I never got
off my butt and investigated it further or told anybody (until now).
Fortunately, it's not very
severe...
This hole still exists in the 1.04.30 version.
Is it possible to run KEN! under a special UserProfile (at the "service"
cpl) and grant this user *only* access to the proxy dir?
Im totally new to NT4.0 SP5, so sorry for my dumb question.
Thorsten Claus
--
Sent through GMX FreeMail -
Hi Bugtraq people,
This is a a copy of the mail I send to AVM about the Securtity Bugs in Ken! ISDN Proxy
Software.
eAX
---
Dear AVM Team,
I found two serious (security) bugs in your internet/isdn proxy software AVM Ken!,
and I
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package: make-3.77-44 and earlier
Date:Wed Feb 9 17:28:43 CET 2000
Affected SuSE versions: 6.1, 6.3
Kerb wrote:
...
No exploit has been released to date, even though 2.6.0 is out.
...
---ifafoffuffoffaf.c---
Here is another - and I'm sure there are more floating around out there...
If a vulnerability is reported and a fix provided (as in this case), plug it!
Don't wait until you happen to
Kerb wrote:
...
No exploit has been released to date, even though 2.6.0 is out.
...
---ifafoffuffoffaf.c---
/*
tmogg ifaf ?
typo_ integrated ftp attack facility
ElCamTuf ifafoffuffoffaf
ElCamTuf sounds much better
Code by typo/teso '99. http://teso.scene.at/ - DO NOT USE, DO NOT
Hi,
The problem is with the reception of NXT records, so it doesn't matter what
you have in your own zone files. Any nameserver running versions 8.2, 8.2
patchlevel 1, or 8.2.1 can be susceptible to the attack (albeit there are some
pre-conditions that must be met for the issue to even come
Rob,
w00w00 was planning on addressing this issue, but I just can't control the
urge to speak...
So if I understand correctly, F5 has made many improvements to the
security of BigIP. Now was adding a second account with uid 0 without the
knowlede of the user part of that plan?
-
Red Hat, Inc. Security Advisory
Synopsis: security problems with ypserv
Advisory ID:RHSA-1999:046-01
Issue date: 1999-10-27
Updated on: 1999-10-27
Hello,
On May 10, Jonas Stahre [EMAIL PROTECTED] sent a message about a
problem he encountered on Solaris 7 with rmmount not disabling set-uid
programs
on external devices like CD-ROMs or floppies, in spite of what is written in
the
man page.
(Message-id: [EMAIL PROTECTED]
)
I did not pay much
While testing the security of the Sambar HTTP-Server I found it vulnerable
to a simple DOS attack. Sending a "GET (...a lot of Xs..) HTTP/1.0"
crashes the Server. It will die WITHOUT logging the attack.
My testing-environment:
Sambar 4.2.1
M$IE 5.0 (de)
Windows 95 C (de)
Sample exploit
I've found a bug in filter on Elm 2.4 PL25. filter got SGID on mail group.
sowatech:~$ filter -f `perl -e ' print "A" x 5000'`
Segmentation fault
btw in elm bugs r everywhere better don't use it
Greeetz
___
Ultor [[EMAIL PROTECTED]] - Network Security Adviser
" I hack the
30 matches
Mail list logo