4-21 announce the developer of Jforum by e-mail
> 2021-04-22 Jforum fixed the vulnerability, and will include this fix in
> next release
> 2021-09-02 send this mail to bugtraq&fulldisclosure
CVE-2021-40509 has been assigned for this vulnerability.
https://cve.m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, May 31, 2019 at 10:48:05AM +0200, Daniel Bishtawi wrote:
> Netsparker Advisory Reference: NS-19-004
Please use CVE-2019-12935 for this vulnerability.
- --
Henri Salo
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdF
; value="nopriv_frontend_show_map_fmc">nopriv_frontend_show_map_fmc
> show_matrix_fmc
> value="nopriv_frontend_show_matrix_fmc">nopriv_frontend_show_matrix_fmc
> value="frontend_paypal_inf
paypal_info
> checkpaypal
> value="get_frontend_stats">get_frontend_stats
> frontend_show_map
> value="frontend_show_matrix">frontend_show_matrix
> value="frontend_paypal_info">frontend_payp
are Link: https://wordpress.org/plugins/contact-form-builder
> # Version: 1.0.67
> # Tested on: WordPress 5.1.1
MITRE assigned CVE-2019-11557 for this vulnerability.
- --
Henri Salo
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEE/aVSDznAZReWTkxKJ633pE6qdXQFAlzDe4kACgkQJ633pE6q
dXRxjg//V58
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 05, 2019 at 04:31:24PM +0100, Tim Coen wrote:
> https://security-consulting.icu/blog/2019/02/wordpress-yop-poll-xss/
MITRE assigned CVE-2019-9914 for this vulnerability.
- --
Henri Salo
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdF
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 05, 2019 at 04:30:37PM +0100, Tim Coen wrote:
> https://security-consulting.icu/blog/2019/02/wordpress-wp-livechat-xss/
MITRE assigned CVE-2019-9913 for this vulnerability.
- --
Henri Salo
-BEGIN PGP SIGNAT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 05, 2019 at 04:29:38PM +0100, Tim Coen wrote:
> https://security-consulting.icu/blog/2019/02/wordpress-wpgooglemaps-xss/
MITRE assigned CVE-2019-9912 for this vulnerability.
- --
Henri Salo
-BEGIN PGP SIGNAT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 05, 2019 at 04:28:42PM +0100, Tim Coen wrote:
> https://security-consulting.icu/blog/2019/02/wordpress-social-networks-auto-poster-xss/
MITRE assigned CVE-2019-9911 for this vulnerability.
- --
Henri Salo
-BEGIN PGP SIGNAT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 05, 2019 at 04:27:46PM +0100, Tim Coen wrote:
> https://security-consulting.icu/blog/2019/02/wordpress-kingcomposer-xss/
MITRE assigned CVE-2019-9910 for this vulnerability.
- --
Henri Salo
-BEGIN PGP SIGNAT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 05, 2019 at 04:26:55PM +0100, Tim Coen wrote:
> https://security-consulting.icu/blog/2019/02/wordpress-give-xss/
MITRE assigned CVE-2019-9909 for this vulnerability.
- --
Henri Salo
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdF
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 05, 2019 at 04:26:09PM +0100, Tim Coen wrote:
> https://security-consulting.icu/blog/2019/02/wordpress-font-organizer-xss/
Please use CVE-2019-9908.
- --
Henri Salo
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdF
se of WordPress plugins your solution is not correct. This vulnerability
can be exploited even plugin is disabled. Plugin must be deleted in order to
mitigate this.
- --
Henri Salo
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEE/aVSDznAZReWTkxKJ633pE6qdXQFAlyOVtMACgkQJ633pE6q
dXTdBA/+J/m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 05, 2019 at 04:25:25PM +0100, Tim Coen wrote:
> https://security-consulting.icu/blog/2019/02/wordpress-contact-form-email-xss-csrf/
MITRE assigned CVE-2019-9646 for this vulnerability.
- --
Henri Salo
-BEGIN PGP SIGNAT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 05, 2019 at 04:22:05PM +0100, Tim Coen wrote:
> https://security-consulting.icu/blog/2019/02/wordpress-blog2social-xss/
MITRE assigned CVE-2019-9576 for this vulnerability.
- --
Henri Salo
-BEGIN PGP SIGNAT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Feb 05, 2019 at 04:21:06PM +0100, Tim Coen wrote:
> https://security-consulting.icu/blog/2019/02/wordpress-quiz-and-survey-master-xss/
MITRE assigned CVE-2019-9575 for this vulnerability.
- --
Henri Salo
-BEGIN PGP SIGNAT
ion vulnerability.
- --
Henri Salo
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEE/aVSDznAZReWTkxKJ633pE6qdXQFAlx9zwAACgkQJ633pE6q
dXScdQ/+NVNYUW7vnrffGyXzEN1sL/A+R+VUGbAoLTSE/Dex6U0eur+0QviumgwY
r77Z4BANUCzO6YXckNRVkQiQB4fD/P5IKwQlrsepaEija2ez6fizCLMHJxlevGMa
cWex/Lv0iGZkggt0q+gdmRDV
On Wed, Jan 30, 2019 at 09:28:15AM +0100, Daniel Bishtawi wrote:
> https://www.netsparker.com/web-applications-advisories/ns-18-052-reflected-cross-site-scripting-in-collabtive/
CVE-2019-8935 has been assigned for this vulnerability.
--
Henri S
ting-in-coppermine/
Fixed in 1.5.48. Vendor advisory:
http://forum.coppermine-gallery.net/index.php/topic,79577.0.html
You might want to repeat your security testing on modified parts of the
application.
--
Henri Salo
___
Sent through the Full Discl
On Wed, Jan 09, 2019 at 10:45:51AM +0200, Henri Salo wrote:
> On Mon, Dec 03, 2018 at 03:37:25PM +0100, Daniel Bishtawi wrote:
> > https://www.netsparker.com/web-applications-advisories/ns-18-025-reflected-cross-site-scripting-in-cubecart/
Please use CVE-2018-20703.
--
H
commit/4efac90ed89a5c009108b641e2e95683791a165a
Is this correct?
--
Henri Salo
signature.asc
Description: PGP signature
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
ixed in what version or commit? Did you request CVE identifier for this
vulnerability?
--
Henri Salo
signature.asc
Description: PGP signature
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Ar
ct vendor?
--
Henri Salo
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
anuary 2019 - Advisory Released
How did you contact vendor? Are you sure that they didn't fix this? Latest
version is 1.1.2 according to https://microweber.com/download. Do you plan to
follow-up on this or is this case closed from your point of view?
--
Henri Salo
n be
found from https://gitlab.com/libtiff/libtiff.
--
Henri Salo
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
3
> # Link to code diff: https://plugins.trac.wordpress.org/changeset/1173611/
> # Changelog: https://wordpress.org/plugins/wordpress-mobile-pack/changelog/
> # CVE Status: None/Unassigned/Fresh
CVE-2015-9269 has been assigned for this vulnerability.
--
Henri Salo
s
.txt "fix
vulnerability that permits to see server files", which was released 2018-08-04.
Didn't manually verify.
--
Henri Salo
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
in distros. Did you report this to the
upstream?
--
Henri Salo
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
ast to version 1.3.3:
This seems to be the same vulnerability as CVE-2014-7183[1] found by
Netsparker[2]. CVE-2014-7183 was fixed in version 1.2 according to the
changelog.
1: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7183
2: https://www.netsparker.com/xss-vulnerabilities-in-li
go, but never received any
response. These issues look similar to CVE-2007-1231. Please see:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-1231
- --
Henri Salo
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
iQIcBAEBAgAGBQJWQIopAAoJECet96ROqnV0RVYQAMl+kf/u586FYo5ck4brx
On Mon, Jul 20, 2015 at 05:16:00AM +, Shi,Tong wrote:
> http://bugs.cacti.net/view.php?id=2582
> Will a CVE number be assigned for it?
CVE requested already in:
http://www.openwall.com/lists/oss-security/2015/07/18/4
--
Henri Salo
__
David from litespeedtech.com replied:
"These are two bugs used to be in v1.3.10 and we fixed all of them in 1.3.11
now."
--
Henri Salo
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
We
nymore since Hue 3 so indeed we should remove
the part warning about not being run as root
"""
--
Henri Salo
___
Sent through the Full Disclosure mailing list
https://nmap.
n the latest version,
please update your Mailbird.
Latest version after downloading the application is 2.0.16.0 dated as May 15,
which is still vulnerable to this cross-site scripting vulnerability. Nothing in
changelog about this case.
Mitigation: use different application :)
--
Henri
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021 says:
"pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial
of service (out-of-bounds-read) via a crafted length value in an encrypted PDF
file."
- ---
Henri Salo
-BEGIN PGP SIGNATURE-
Versio
Site http://truecrypt.sourceforge.net/ says "WARNING: Using TrueCrypt is not
secure as it may contain unfixed security issues" does someone have any
information about this?
---
Henri Salo
signature.asc
Description: Digital signature
___
Se
to list vulnerable systems. I can't for example list all
non-updated WordPress installations with their version numbers even this
information is available to anyone.
---
Henri Salo
signature.asc
Description: Digital signature
___
Sent through the
37 matches
Mail list logo