Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 31 Jan 2015 08:45:16 -0500 (EST)
From: cve-assign@...re.org
To: henri@...v.fi
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: Roundcube cross-site scripting vulnerability fixed in 1.0.5

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://roundcube.net/news/2015/01/24/security-update-1.0.5/
> http://trac.roundcube.net/wiki/Changelog#RELEASE1.0.5
> http://trac.roundcube.net/ticket/1490227

Use CVE-2015-1433.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUzNwOAAoJEKllVAevmvmslFEIAMe4o0bGJX2E/Sx7bEFPU7/H
6Q0BSvtpT0fB/uTaq/5uyS9gs6QcL0T2cJQLZI2UPfVC08SsZPZoZIKn3kTw30ON
hpgmydfQxE5ouzSiUDoSFgpZvN5KUsbinsMmEIjgdtw6eCt44wGvJyZonYKoTNSf
1XG8ilwLg5XoP8gb0QbwTXEWwnloU9yntlRLSGwTqG8kcxHOoNFmOoxsjigJPh85
AQtWD3LFiJfUjHDsQmmQZ2frIUJZ7KPvj3wNxOm3973+WmOYRmYlA4UtIdhFMCjK
063qLViWYzk0QdJRtXPyoS654ukKhBPilWpYH1Vz6GpcmR0m3iI6KeTxVW3qJu0=
=mdVb
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ