This section lists the most recent news and blogs uncovered via the daylife API (and for older items, the technorati API),
Office Professional 2007, which mention or in any other case talk about this vulnerability. None uncovered at this time Comments
Add Comment Conceal Add Comment
No Remarks. 70101 : Accept Signups Plugin for WordPress wp-contentpluginsaccept-signupsaccept-signups_submit.php electronic mail Parameter XSS Printer | | Electronic mail This | Edit Vulnerability Views This Week Views All Time Added to OSVDB Last Modified Modified (since 2008) Percent Complete 21 291 2 months ago 2 months ago 3 times 100% Timeline Disclosure Date 2010-12-21 Description Accept Signups Plugin for WordPress contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the 'email' parameter upon submission to the 'wp-contentpluginsaccept-signupsaccept-signups_submit.php' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. Classification Location: Remote Network Access Attack Type: Input Manipulation Impact: Loss of Integrity Solution: Solution Unknown Exploit: Exploit Public Disclosure: Uncoordinated Disclosure OSVDB: Web Related Technical Plugin was created by an anonymous user, not WordPress itself. Solution OSVDB is not aware of a solution for this vulnerability. Merchandise WordPress Accept Signups Plugin for WordPress 0.1 References Exploit Database: 15808 Secunia Advisory ID: 42641 Manual Testing Notes style="color: black; background-color: rgb(153, 255, 153);">accept<B>-<B style="color: black; background-color: rgb(255,
Office 2010 Pro Plus Key, 153, 153);">signups<B><B style="color: black; background-color: rgb(153, 255, 153);">accept<B>-signups_submit.php?email=<B style="color: black; background-color: rgb(255,
Windows 7 Ultimate, 255, 102);">clshack<B><script>alert(String.fromCharCode (72,
Office Standard 2007, 101, 108, 108,
Windows 7 X86, 111, 32, 58, 68, 32))<script>* Credit clshack - clshack.it CVSSv2 Score We currently have no CVSS2 data on this vulnerability. Feel free to suggest it. BlogsThis product uses the Daylife API but is not endorsed or certified by Daylife.