Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 25 Jul 2013 02:47:15 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Hanno Böck <hanno@...eck.de>
Subject: Re: cve request: cms made simple XSS before 1.11.7

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/21/2013 09:10 AM, Hanno Böck wrote:
> cmsmadesimple 1.11.7 fixes an XSS. Not much info though:
> 
> https://twitter.com/LeakFree/status/336942367351394305 
> http://forum.cmsmadesimple.org/viewtopic.php?f=1&t=66590&p=299356#p299356
>
>  Please assign CVE.
> 

Please use CVE-2013-4167 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=LznB
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ