Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 1 Apr 2014 13:50:55 -0400 (EDT)
From: cve-assign@...re.org
To: carnil@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Shaarli: Several XSS in index.php

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Multiple cross-site scripting vulnerabilities were reported in
> Shaarli
> 
> https://github.com/sebsauvage/Shaarli/issues/134
> https://github.com/sebsauvage/Shaarli/commit/53da201749f8f362323ef278bf338f1d9f7a925a

Use CVE-2013-7351.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTOvwDAAoJEKllVAevmvmsKxMH/i/Uabd6Xi/o6C5RvRb7x3Kl
ewJogaUG1cLFv3PjYpeYqSnoe1lyzMBcipGLVIZQp6EZS25p+CnMft3u9Te/CVMf
wwGLQYsSO0Kz/uQZSNnshkUykqNvWF089/GCDwIQZtFfk8480Uh6sAP54Fv3DLo3
4U2nSvCewE5ExFjMYDRI1KvxvY8P+3bbuPU5kKV1+RaWiq8Z0SZCxRIxz2+PL3G/
BaBI9MWW9+Q11EzcFY/6khIPnPggevhoGgWKmEpkD+JBxEdKz125nPFO1d90Sygc
mQLTHPUjVQ/b61CJJqULutA8UfWrG8r96PEC14220U0g/lB0o7ymazE07Dq29IQ=
=Zu78
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.