Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat, 5 Dec 2015 09:39:37 +0200
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Cc: security@...mine.org, cve-assign@...re.org
Subject: CVE request: Redmine: cross-site scripting vulnerability fixed in
 3.0.0 and 2.6.2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Please assign a CVE identifier for cross-site scripting vulnerability fixed in
Redmine versions 3.0.0 and 2.6.2 (2015-02-19).

https://www.redmine.org/issues/19117
http://www.redmine.org/projects/redmine/wiki/Security_Advisories

- -- 
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=Uqov
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.