|
Message-Id: <201311121246.rACCkG6M023918@linus.mitre.org> Date: Tue, 12 Nov 2013 07:46:16 -0500 (EST) From: cve-assign@...re.org To: oss-security@...ts.openwall.com Cc: cve-assign@...re.org Subject: CVE-2013-6780 for YUI 2.x 2013-11-11 uploader.swf issue -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 See https://yuilibrary.com/support/20131111-vulnerability/ for the vendor's disclosure. In some previous cases, YUI CVE assignments were made in conjunction with new releases of an open-source product such as Bugzilla or Moodle. In this case, CVE-2013-6780 was coordinated with YUI upstream, and will supersede any private CVE assignments that might have been planned for this YUI issue within Bugzilla, Moodle, etc. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJSgiKyAAoJEKllVAevmvms6pMH/3n01VK7TSBep/Ju0YRwTovD wAx9jd++NtKtYfOmhuW7FgSVpsy1e+spjcPb4R9cfa/kQkO/khbpN7aIqHUzhkCK Sc5IgM9H6BZ4z/L8JNipenq15EKv14nQfUUq7/n5wl9XHRaxis5Omq525IiII/Y+ D5Z4cA2uINKXsItQjV6/GoNqpCCBFIViLXCQhdUgvP167lnBzgcT87KT/7aCthbl T/QkdZmDwhpowC/8V7KZeFbKHr2QirLtbgz2JqtoziwHJO9MPn4d+gtMHSU//lUI B9g1deUiFwUjAuVhlCUlZDKN9FYSXw5KP+BxQUGLmxZe5Pgf6cfwaCGEM3Scg0Q= =94PZ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.