Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 14 Mar 2015 10:05:30 +0200
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Cc: Edric Teo <edric@...rterbitbybit.com>
Subject: CVE-2015-2289: Serendipity CMS cross-site scripting vulnerability in
 2.0 version

Affected: 2.0
Fixed in: 2.0.1
Original advisory: http://seclists.org/bugtraq/2015/Mar/69
Vendor advisory: http://blog.s9y.org/archives/263-Serendipity-2.0.1-released.html

-- 
Henri Salo

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ