Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 28 Nov 2012 16:07:06 -0800
From: Forest Monsen <forest.monsen@...il.com>
To: oss-security@...ts.openwall.com
CC: Kurt Seifried <kseifried@...hat.com>
Subject: CVE request for Drupal contributed modules

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Here's a batch CVE request for several previously published and
resolved issues (except for SA-CONTRIB-2012-171, which was never
resolved) in contributed modules for the Drupal project:

###

SA-CONTRIB-2012-166 - Table of Contents - Access Bypass
http://drupal.org/node/1841046

SA-CONTRIB-2012-167 - Mixpanel - Cross site scripting (XSS)
http://drupal.org/node/1853198

SA-CONTRIB-2012-168 - Services - Information Disclosure
http://drupal.org/node/1853200

SA-CONTRIB-2012-169 - Email Field - Cross Site Scripting and Access bypass
http://drupal.org/node/1853214

SA-CONTRIB-2012-170 - MultiLink - Access Bypass
http://drupal.org/node/1853244

SA-CONTRIB-2012-171 - Webmail Plus - SQL injection - (unsupported)
http://drupal.org/node/1853268

SA-CONTRIB-2012-172 - Zero Point - Cross Site Scripting (XSS)
http://drupal.org/node/1853376

###

Thanks!

Forest




-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iEYEARECAAYFAlC2pyoACgkQ/ILCL9e1Br4+tQCcCxW3lAylwP1RSuOFnGRnff9b
gm8AmgLuMDqIHzQVHoo7WtD+SVsH3d4j
=ZVPx
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.