Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 14 Jan 2013 18:47:30 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Forest Monsen <forest.monsen@...il.com>
Subject: Re: CVE request for Drupal contributed modules

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 01/11/2013 12:49 PM, Forest Monsen wrote:
> Hi there -- I'd like to request CVE identifiers for two issues
> with Drupal contributed modules:
> 
> SA-CONTRIB-2013-001 - Search API - Cross Site Scripting 
> https://drupal.org/node/1884332

Please use CVE-2013-0181 for this issue.

> SA-CONTRIB-2013-002 - Payment - Access Bypass 
> https://drupal.org/node/1884360

Please use CVE-2013-0182 for this issue.

> Thanks!
> 
> Forest
> 

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=OzSX
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ