Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 28 May 2015 09:35:40 +0300
From: Henri Salo <henri@...v.fi>
To: "Seaman, Chad" <cseaman@...mai.com>
Cc: oss-security@...ts.openwall.com
Subject: Re: CVE Request, multiple WordPress plugins and themes

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Wed, May 27, 2015 at 06:53:16PM +0000, Seaman, Chad wrote:
> I'm not sure if these should be broken down by individual vulnerability or
> lumped per plugin/theme, there are 21 plugins/themes affected in total.

Hard to read and does not have enough information for CVE request. One email
with all needed details for CVE request per plugin is better way to get these
assigned.

https://github.com/RedHatProductSecurity/CVE-HOWTO#how-to-write-a-cve-request

Could you list affected versions?
Could you provide proof-of-concept code or what file and parameter/function is
affected?
Have you reported these issues to plugins@...dpress.org?

There are plenty of good CVE requests for WordPress plugins in list archive. For
example: http://www.openwall.com/lists/oss-security/2014/08/19/3

If you need any help please reply or contact me off-list for support.

- -- 
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=w2CS
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ