|
Message-ID: <20130326182838.GA16301@kludge.henri.nerv.fi>
Date: Tue, 26 Mar 2013 20:28:38 +0200
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Subject: Re: WordPress plugins vulnerable to CVE-2013-1808
Short update.
bp-code-snippets fixed in version 2.1
cleeng fixed in version 2.3.3
paypal-digital-goods-monetization-powered-by-cleeng fixed in version 2.2.14
tiny-url fixed in version 1.3.4
wp-clone-by-wp-academy fixed in version 2.1.2
Is this information something that list wants to receive in future? At least
this gives some idea of the response time from plugin developers. Some haven't
done anything yet.
--
Henri Salo
Download attachment "signature.asc" of type "application/pgp-signature" (199 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.