Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 13 Jun 2012 20:32:11 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Greg Knaddison <greg.knaddison@...uia.com>
Subject: Re: CVE Request for Drupal contributed modules

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Apologies for the delay in CRUPAL SA-CONTRIB CVE assignments, here's
the current batch:


CVE-2012-2699 SA-CONTRIB-2012-073 - Glossary - Cross-Site Scripting (XSS)
CVE-2012-2700 SA-CONTRIB-2012-074 - Contact Forms - Access Bypass
CVE-2012-2701 SA-CONTRIB-2012-075 - Take Control - Cross Site Request
Forgery (CSRF)
CVE-2012-2702 SA-CONTRIB-2012-076 - Ubercart Product Keys Access Bypass
CVE-2012-2703 SA-CONTRIB-2012-077 - Advertisement - Cross Site
Scripting & Information Disclosure - XSS
CVE-2012-2704 SA-CONTRIB-2012-077 - Advertisement - Cross Site
Scripting & Information Disclosure - Information Disclosure
CVE-2012-2705 SA-CONTRIB-2012-078 - Smart Breadcrumb - Cross Site
Scripting (XSS)
CVE-2012-2706 SA-CONTRIB-2012-079 - Post Affiliate Pro - Cross Site
Scripting (XSS) and Access Bypass - Unsupported
CVE-2012-2707 SA-CONTRIB-2012-080 - Hostmaster (Aegir) - Access Bypass
and Cross Site Scripting (XSS) - access bypass
CVE-2012-2708 SA-CONTRIB-2012-080 - Hostmaster (Aegir) - Access Bypass
and Cross Site Scripting (XSS) - XSS
CVE-2012-2709 SA-CONTRIB-2012-081 - Aberdeen - Cross Site Scripting
CVE-2012-2710 SA-CONTRIB-2012-082 - Zen - Cross Site Scripting
CVE-2012-2711 SA-CONTRIB-2012-083 - Taxonomy List - Cross Site
Scripting (XSS)
CVE-2012-2712 SA-CONTRIB-2012-084 - Search API - Cross Site Scripting
(XSS)
CVE-2012-2713 SA-CONTRIB-2012-085 - BrowserID - Multiple
Vulnerabilities - CSRF
CVE-2012-2714 SA-CONTRIB-2012-085 - BrowserID - Multiple
Vulnerabilities - BrowserID login theft
CVE-2012-2715 SA-CONTRIB-2012-086 - Amadou - Cross Site Scripting
CVE-2012-2716 SA-CONTRIB-2012-087 - Comment Moderation - Cross Site
Request Forgery
CVE-2012-2717 SA-CONTRIB-2012-088 - Mobile Tools - Cross Site
Scripting (XSS)
CVE-2012-2718 SA-CONTRIB-2012-089 - Counter - SQL Injection (unsupported)
CVE-2012-2719 SA-CONTRIB-2012-090 - File depot - Session Management
Vulnerability
CVE-2012-2720 SA-CONTRIB-2012-091 - Token Authentication - Access bypass
CVE-2012-2721 SA-CONTRIB-2012-092 - Organic Groups - Cross Site
Scripting (XSS) and Access Bypass
CVE-2012-2722 SA-CONTRIB-2012-093 - Node Embed - Access Bypass
CVE-2012-2723 SA-CONTRIB-2012-094 - Maestro module - Cross Site
Request Forgery (CSRF), Cross Site Scripting (XSS)
CVE-2012-2724 SA-CONTRIB-2012-095 - Simplenews - Information Disclosure
CVE-2012-2725 SA-CONTRIB-2012-096 - Authoring HTML - Cross Site
Scripting (XSS)
CVE-2012-2726 SA-CONTRIB-2012-097 - Protest - Cross Site Scripting (XSS)
CVE-2012-2727 SA-CONTRIB-2012-098 - Janrain Capture - Open Redirect
CVE-2012-2728 SA-CONTRIB-2012-099 - Node Hierarchy - Cross Site
Request Forgery (CSRF)
CVE-2012-2729 SA-CONTRIB-2012-100 - SimpleMeta - Cross Site Request
Forgery (CSRF)
CVE-2012-2730 SA-CONTRIB-2012-101 - Protected Node - Access Bypass
CVE-2012-2731 SA-CONTRIB-2012-102 - Ubercart AJAX Cart - Potential
Disclosure of user Session ID
CVE-2012-2732 SA-CONTRIB-2012-103 - Global Redirect - Open Redirect


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=6Pqs
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.