Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 19 Apr 2016 22:49:49 -0400 (EDT)
From: cve-assign@...re.org
To: vangheem@...il.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Unauthorized disclosure of site content - Plone

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://plone.org/security/20160419/unauthorized-disclosure-of-site-content
> 
> A vulnerability that allows attackers to gain information about
> unpublished site content.
> 
> An attacker can potentially gain information on the ID of private
> content on your site.

Use CVE-2016-4042.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=pRwJ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.