|
Message-Id: <201312120453.rBC4rdum026102@linus.mitre.org> Date: Wed, 11 Dec 2013 23:53:39 -0500 (EST) From: cve-assign@...re.org To: matthew@...thewwilkes.co.uk Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request for Plone -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Filesystem path information leak CVE-2013-7060 Privilege escalation through exposed underlying API CVE-2013-7061 Reflexive XSS in browser_id_manager Reflexive XSS in OFS.Image Use CVE-2013-7062 for both of these XSS issues. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJSqUEUAAoJEKllVAevmvmsTzsH+wcw9KNSoshZz4l+ZOlKdU12 SI/PaxKPDeqkSoRyp2sRGnfyjlA2GQPpKC38GI0aGcUTUa14oplaTcJE5kCytQxS AZi70cyJQnRf8sViq8w3SpBugpTzvvsm7BJw45Ty8i39TYS4FuwebfK6avqhc6nF PeofM3myFlD7V5pETKY9YdmW161hNp18K/a5HRDxubiNeSFbrAVLJa1dtcOJ7Kie abGR9jmSwDgrvQQ8uOgxUYLzQD0T35sc/jd0ri1d/pmmncwUw160TdxL78UlC1c5 D08k/8Rm8l+qjyurhuOrfF3HYdXZcwhMKhNGngkC1EZ+KXlmoDzWwKi+k5JMEJ0= =x346 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.