Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAAPiX_+t3qfdyvW+zLahqr=1JjypV_70pG2HRysC1MzNzN1ipQ@mail.gmail.com>
Date: Mon, 4 Jun 2012 11:02:57 -0600
From: Greg Knaddison <greg.knaddison@...uia.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request for Drupal contributed modules

I didn't see a response nor this message in the archives at
http://www.openwall.com/lists/oss-security/2012/05/

But I do see it in twitter at
https://twitter.com/oss_security/status/207950141695606784

Is that lack of acknowledgment a subtle way to say "Greg, you really
really need to sign your mails!" If so I will figure it out :)

Greg

On Wed, May 30, 2012 at 2:54 PM, Greg Knaddison
<greg.knaddison@...uia.com> wrote:
> Hello,
>
> This is a batch CVE request for several advisories of contributed
> modules released recently. Let me know if you have any questions.
>
> Thanks,
> Greg Knaddison on behalf of the Drupal Security Team
>
> http://drupal.org/node/1608864 | SA-CONTRIB-2012-090 - File depot -
> Session Management Vulnerability
> http://drupal.org/node/1608854 | SA-CONTRIB-2012-089 - Counter - SQL
> Injection (unsupported)
> http://drupal.org/node/1608828 | SA-CONTRIB-2012-088 - Mobile Tools -
> Cross Site Scripting (XSS)
> http://drupal.org/node/1608822 | SA-CONTRIB-2012-087 - Comment
> Moderation - Cross Site Request Forgery
> http://drupal.org/node/1608780 | SA-CONTRIB-2012-086 - Amadou - Cross
> Site Scripting
> http://drupal.org/node/1597414 | SA-CONTRIB-2012-085 - BrowserID -
> Multiple Vulnerabilities
> * CSRF that leads to privilege escalation/impersonation
>
> http://drupal.org/node/1597364 | SA-CONTRIB-2012-084 - Search API -
> Cross Site Scripting (XSS)
> http://drupal.org/node/1597262 | SA-CONTRIB-2012-083 - Taxonomy List -
> Cross Site Scripting (XSS)
> http://drupal.org/node/1585960 | SA-CONTRIB-2012-082 - Zen - Cross
> Site Scripting
> http://drupal.org/node/1585890 | SA-CONTRIB-2012-081 - Aberdeen -
> Cross Site Scripting
> http://drupal.org/node/1585678 | SA-CONTRIB-2012-080 - Hostmaster
> (Aegir) - Access Bypass and Cross Site Scripting (XSS)
> http://drupal.org/node/1585648 | SA-CONTRIB-2012-079 - Post Affiliate
> Pro - Cross Site Scripting (XSS) and Access Bypass - Unsupported
> http://drupal.org/node/1585564 | SA-CONTRIB-2012-078 - Smart
> Breadcrumb - Cross Site Scripting (XSS)
> http://drupal.org/node/1585544 | SA-CONTRIB-2012-077 - Advertisement -
> Cross Site Scripting & Information Disclosure
> http://drupal.org/node/1585532 | SA-CONTRIB-2012-076 - Ubercart
> Product Keys Access Bypass
>
> --
> Director Security Services | +1-720-310-5623
> Skype: greg.knaddison | http://twitter.com/greggleshttp://acquia.com



-- 
Director Security Services | +1-720-310-5623
Skype: greg.knaddison | http://twitter.com/greggleshttp://acquia.com

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.