Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201312120453.rBC4rdum026102@linus.mitre.org>
Date: Wed, 11 Dec 2013 23:53:39 -0500 (EST)
From: cve-assign@...re.org
To: matthew@...thewwilkes.co.uk
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request for Plone

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Filesystem path information leak CVE-2013-7060
Privilege escalation through exposed underlying API CVE-2013-7061

Reflexive XSS in browser_id_manager
Reflexive XSS in OFS.Image

Use CVE-2013-7062 for both of these XSS issues.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJSqUEUAAoJEKllVAevmvmsTzsH+wcw9KNSoshZz4l+ZOlKdU12
SI/PaxKPDeqkSoRyp2sRGnfyjlA2GQPpKC38GI0aGcUTUa14oplaTcJE5kCytQxS
AZi70cyJQnRf8sViq8w3SpBugpTzvvsm7BJw45Ty8i39TYS4FuwebfK6avqhc6nF
PeofM3myFlD7V5pETKY9YdmW161hNp18K/a5HRDxubiNeSFbrAVLJa1dtcOJ7Kie
abGR9jmSwDgrvQQ8uOgxUYLzQD0T35sc/jd0ri1d/pmmncwUw160TdxL78UlC1c5
D08k/8Rm8l+qjyurhuOrfF3HYdXZcwhMKhNGngkC1EZ+KXlmoDzWwKi+k5JMEJ0=
=x346
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.