Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 1 Apr 2014 13:50:55 -0400 (EDT)
From: cve-assign@...re.org
To: carnil@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Shaarli: Several XSS in index.php

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Multiple cross-site scripting vulnerabilities were reported in
> Shaarli
> 
> https://github.com/sebsauvage/Shaarli/issues/134
> https://github.com/sebsauvage/Shaarli/commit/53da201749f8f362323ef278bf338f1d9f7a925a

Use CVE-2013-7351.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTOvwDAAoJEKllVAevmvmsKxMH/i/Uabd6Xi/o6C5RvRb7x3Kl
ewJogaUG1cLFv3PjYpeYqSnoe1lyzMBcipGLVIZQp6EZS25p+CnMft3u9Te/CVMf
wwGLQYsSO0Kz/uQZSNnshkUykqNvWF089/GCDwIQZtFfk8480Uh6sAP54Fv3DLo3
4U2nSvCewE5ExFjMYDRI1KvxvY8P+3bbuPU5kKV1+RaWiq8Z0SZCxRIxz2+PL3G/
BaBI9MWW9+Q11EzcFY/6khIPnPggevhoGgWKmEpkD+JBxEdKz125nPFO1d90Sygc
mQLTHPUjVQ/b61CJJqULutA8UfWrG8r96PEC14220U0g/lB0o7ymazE07Dq29IQ=
=Zu78
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ