Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat, 5 Dec 2015 09:39:37 +0200
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Cc: security@...mine.org, cve-assign@...re.org
Subject: CVE request: Redmine: cross-site scripting vulnerability fixed in
 3.0.0 and 2.6.2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Please assign a CVE identifier for cross-site scripting vulnerability fixed in
Redmine versions 3.0.0 and 2.6.2 (2015-02-19).

https://www.redmine.org/issues/19117
http://www.redmine.org/projects/redmine/wiki/Security_Advisories

- -- 
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBAgAGBQJWYpS5AAoJECet96ROqnV0uVwP/RzIZtm/NTo5NBrfwcusGbZh
7HiNrdSlQWpQTOIUjRRk1furlhXWsKZDJAjR7rBmWJTaamCMqA8PfCgNMBQmAK6H
ObuWpAqCTfFXdfe/APCD0JVGpqO4mR6RuO+v34WSH88fDk8DqfqBKBJpcgAI47cy
mg4uL+4hYhA0d8M7MNTKeKngtyVbposyu0LKEqwK7f1hQpYmI4Dq3XWU7SJ+1Sho
nr6w5oELoVhW2Zv2kyB/Ai0vAnC+OryOhq7lQqhZFTQxs8Ny4PTQB/jd9BuZCzc7
1l+rwmjsTCWpukCEzNCetKEIRe0IUT+yfM/rxhT7sITQpHNmKGRhQTr17DqAh/Sv
a+z24BOfbF6zWEWpj84f1AI1ZyI07K/w6hN+bNxEzj/bwCzebyIxyR4pJQHhJ9/w
TSMi/53IOF0f+/8tag+024aF7B+dEj2YYC0JlEZaOXQXAL37xX5NIfykeruXbwI1
W8KNrQgecwdEIhLFhY1QwNcKmTvOtZsh7xakMegSzndirlfS1isXOHW3QX6urR93
gQtSXOLu8PyF4D+8PZSs/o/JfnPveGV6sx0z/EBe0ycxV88fMGUek/St8fWZn0aE
fFKUk1IndUHiv+/FZFgL0Zt6PfPoAo68Gbke/w2ikuwb/MnrDZ4yMhY+OyC1EHk0
Gl9Wm7vudynfkmndsOCB
=Uqov
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ