Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 28 Oct 2015 00:55:17 -0400 (EDT)
From: cve-assign@...re.org
To: carnil@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, csmall@...ian.org, security@...dpress.org
Subject: Re: CVE Request: Wordpress: Cross-site scripting vulnerability in the user list table

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://wordpress.org/news/2015/09/wordpress-4-3-1/
> https://github.com/WordPress/WordPress/commit/f91a5fd10ea7245e5b41e288624819a37adf290a

Use CVE-2015-7989.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJWMFQ3AAoJEL54rhJi8gl5GQMQAMDxIJOz+Fh48/EwWQoOcTO5
8q0Wu1yEQgqca5fw1e3aYVhfQ21bmdqxloRfqF3zE/gqpzg+j+gw3/ycvHCfROoA
B3c5yHVndCdq/YS5/bwexnmh1SPkkP+Ds2ABxqCRffrmywzcOV9omcdf+dWV2OQ8
Xzv2AC9rYtnjzRXQDovvfqiy5DP79y0oPmy/5tzwxTD5n5H3vIqOETpOCDTm6gqn
8pO/Lug1BrPwKAfsbqPgya1TaHpgWhpd2MliArp7uO+XmgJcevH6DJ6if+6eHbDe
z7YugvfiD1VCZgFYvRaVjZnJANAkFLLz8U6JFRpQ/6UecyiRQzeju8WGxU1ish2i
/JdKyzPLclP2cqF/Eovit+X/hZGcNKPSDI3qN1QULtRKXV/zfBQP6Ldc4eoo/zFz
sNs1YDfZVL1HEpwvPT5WIxrtj5HPn9dxgU/zl+3UsfEVRdvcSdpLt6uuMOdq4Ial
TBavDN9yTB/5AykRt/dFHirmOS17L2NoxLtCNoRged8nwH2YksokGmmFe7mkUZ2V
x9cGGQmaQGo9mumTAF8KpJXyPTByD84GFOKtrEJNz6y6hH0Y65zFhb9pGFiFv0w4
psEze9vFOwMX/5Heyo3CoypcvnSt9Q4M+54DdIJa4RnLoAnN7tPmQFdjzzsnkTT8
fDubBH73vO4eAITxzf03
=V1nO
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.