Date: Mon, 27 Apr 2015 12:47:58 -0600 From: Kurt Seifried <kseifried@...hat.com> To: nacin@...dpress.org, Assign a CVE Identifier <cve-assign@...re.org>, "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: WordPress 4.2.1 security update - CVE please http://codex.wordpress.org/Version_4.2.1 Version 4.2.1 addressed a security issue. For more information, see the release notes. From the announcement post, WordPress 4.2.1 fixes a critical cross-site scripting (XSS) vulnerability, which could enable commenters to compromise a site. -- Kurt Seifried -- Red Hat -- Product Security -- Cloud PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 [ CONTENT OF TYPE application/pgp-signature SKIPPED ]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ