Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 4 Jan 2012 00:04:27 +0200
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Subject: CVE-request: Multiple e107 vulnerabilities

1) Multiple Script URI XSS
http://osvdb.org/show/osvdb/78047

2) e107_admin/users.php resend_name Parameter XSS
http://osvdb.org/show/osvdb/78048

3) User Signatures link BBCode XSS
http://osvdb.org/show/osvdb/78049

4) usersettings.php username Parameter SQL Injection
http://osvdb.org/show/osvdb/78050

Secunia advisory: http://secunia.com/advisories/46706/

I do not know where to find SCM links. Secunia can probably help if needed.

- Henri Salo

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.