Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 22 Apr 2015 17:19:34 -0400 (EDT)
From: cve-assign@...re.org
To: Pere Orga <pere@...a.cat>
cc: oss-security@...ts.openwall.com, cve-assign@...re.org
Subject: Re: CVE requests for Drupal contributed modules


>SA-CONTRIB-2015-034 - Commerce WeDeal - Open Redirect
>https://www.drupal.org/node/2420089

Use CVE-2015-3393.

>SA-CONTRIB-2015-035 - Ajax Timeline - Cross Site Scripting (XSS)
>https://www.drupal.org/node/2420099

Use CVE-2015-3392.

>SA-CONTRIB-2015-036 - Public Download Count - Cross Site Scripting (XSS)
>https://www.drupal.org/node/2420119

Use CVE-2015-3389.

>SA-CONTRIB-2015-037 - Path Breadcrumbs - Access Bypass
>https://www.drupal.org/node/2420139

Use CVE-2015-3391.

>SA-CONTRIB-2015-038 - Facebook Album Fetcher - Cross Site Scripting (XSS)
>https://www.drupal.org/node/2420161

Use CVE-2015-3390.

---

CVE assignment team, MITRE CVE Numbering Authority M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ