|
Message-ID: <528A7C70.4090404@redhat.com> Date: Mon, 18 Nov 2013 13:45:36 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: CVE request for Drupal contributed modules -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Top posting because lazy: CVE-2013-4594 SA-CONTRIB-2013-087 - Payment for Webform - Access Bypass CVE-2013-4595 SA-CONTRIB-2013-088 - Secure Pages - Missing Encryption of Sensitive Data CVE-2013-4596 SA-CONTRIB-2013-089 - Node Access Keys - Access Bypass CVE-2013-4597 SA-CONTRIB-2013-090 - Revisioning - Access Bypass CVE-2013-4598 SA-CONTRIB-2013-091 - Groups, Communities and Co (GCC) - Access Bypass CVE-2013-4599 SA-CONTRIB-2013-092 - Misery - Denial of Service (DOS) vulnerability On 11/17/2013 10:34 PM, Forest Monsen wrote: > Hi there, I'd like to request CVEs for: > > SA-CONTRIB-2013-087 - Payment for Webform - Access Bypass > https://drupal.org/node/2129373 > > SA-CONTRIB-2013-088 - Secure Pages - Missing Encryption of > Sensitive Data https://drupal.org/node/2129381 > > SA-CONTRIB-2013-089 - Node Access Keys - Access Bypass > https://drupal.org/node/2129379 > > SA-CONTRIB-2013-090 - Revisioning - Access Bypass > https://drupal.org/node/2135257 > > SA-CONTRIB-2013-091 - Groups, Communities and Co (GCC) - Access > Bypass https://drupal.org/node/2135267 > > SA-CONTRIB-2013-092 - Misery - Denial of Service (DOS) > vulnerability https://drupal.org/node/2135273 (Says multiple, but > it seems to me this is really just a single DoS vuln.) Agreed. > Thanks Kurt. > > Best, Forest > - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAEBAgAGBQJSinxwAAoJEBYNRVNeJnmTfsYQAKDd6OXXbuBLaimNkuLSc0Np xnfjCJJy991BduMAzzya2hbW5GSP4pwW+yPInf5HeDZTbGfmncoss4HE3EUHbOrI 8DXhRtLHbUOHii0jONB6ESxMGT5F45oQQO5R4LmIzVsJ1ImPa3kcUUCE8/okibx5 LlozL5GDTo4YMGD0VrlUkEi7j3Ec1Eel/DMPytmI5dUJE+OFIw7Hm2TsvwrKp55y 422pwFI/sBQHwcZRKNlteQ8W3nK+nMd7ll88o5ewf3fynkoj5GILGnaV4wSKVbQm iPXj/Wa/dUsGOR4VUZpMdD6fmKvTjLtLPrTSm/qARbqS4qAiuv9V9e3ZqUskD8Xy RL/iglLv27wnOl3oj0PKHlJJNjmXnL5s/BW5ctJauiwSjKD0diA4qBjCyxwaNxIq 1f2LWcUq0pX1199tachsp7BKB7GoZDaSaV5PA+MXd4uPYpTswvNIiRgtf8KX6kq6 rFstkjpDM7W/f2YLsKgtGw9OrLmBNSUJBCWFpEk35FrEO/8tla/jJAMaSkHAjc3I N1tLDpN+0O0h1CSDkyN5oB9UcC32uF9FIMdqdPNz+1Fy6ypusgjGS4OgamOf1NcB PQ7Tv1bBWbZkkKsFkUdrHvamgXxBihubFL2mjpzaDEql0YC1DK73tiakix3CWU6m sZ3Ka4UuFzwMuqYJI2Z9 =6vwF -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.