Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 4 Jan 2012 00:04:27 +0200
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Subject: CVE-request: Multiple e107 vulnerabilities

1) Multiple Script URI XSS
http://osvdb.org/show/osvdb/78047

2) e107_admin/users.php resend_name Parameter XSS
http://osvdb.org/show/osvdb/78048

3) User Signatures link BBCode XSS
http://osvdb.org/show/osvdb/78049

4) usersettings.php username Parameter SQL Injection
http://osvdb.org/show/osvdb/78050

Secunia advisory: http://secunia.com/advisories/46706/

I do not know where to find SCM links. Secunia can probably help if needed.

- Henri Salo

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ