Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 28 Oct 2015 00:55:17 -0400 (EDT)
From: cve-assign@...re.org
To: carnil@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, csmall@...ian.org, security@...dpress.org
Subject: Re: CVE Request: Wordpress: Cross-site scripting vulnerability in the user list table

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://wordpress.org/news/2015/09/wordpress-4-3-1/
> https://github.com/WordPress/WordPress/commit/f91a5fd10ea7245e5b41e288624819a37adf290a

Use CVE-2015-7989.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=V1nO
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ