[Secure-testing-commits] r20469 - data/CVE
Luciano Bello
luciano at alioth.debian.org
Sat Nov 10 14:33:43 UTC 2012
Author: luciano
Date: 2012-11-10 14:33:43 +0000 (Sat, 10 Nov 2012)
New Revision: 20469
Modified:
data/CVE/list
Log:
Zope / Plone: Multiple vectors corrected within 20121106 fix
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2012-11-09 14:13:05 UTC (rev 20468)
+++ data/CVE/list 2012-11-10 14:33:43 UTC (rev 20469)
@@ -746,54 +746,102 @@
RESERVED
CVE-2012-5509
RESERVED
-CVE-2012-5508
+CVE-2012-5508 [ Zope/Plone: PRNG isn't reseeded ]
RESERVED
-CVE-2012-5507
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/24
+CVE-2012-5507 [ Zope/Plone: Timing attack in password validation ]
RESERVED
-CVE-2012-5506
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/23
+CVE-2012-5506 [ Zope/Plone: DoS through RSS on private folder ]
RESERVED
-CVE-2012-5505
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/22
+CVE-2012-5505 [ Zope/Plone: Attempting to access a view with no name returns an internal data structure ]
RESERVED
-CVE-2012-5504
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/21
+CVE-2012-5504 [ Zope/Plone: Persistent XSS ]
RESERVED
-CVE-2012-5503
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/20
+CVE-2012-5503 [ Zope/Plone: Users connected through FTP can list hidden folder contents ]
RESERVED
-CVE-2012-5502
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/19
+CVE-2012-5502 [ Zope/Plone: Persistent XSS via filtering bypass ]
RESERVED
-CVE-2012-5501
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/18
+CVE-2012-5501 [ Zope/Plone: Crafted URL allows downloading of BLOBs that are not visible to the user ]
RESERVED
-CVE-2012-5500
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/17
+CVE-2012-5500 [ Zope/Plone: Anonymous users can batch change titles of content items ]
RESERVED
-CVE-2012-5499
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/16
+CVE-2012-5499 [ Zope/Plone: Partial denial of service through internal function ]
RESERVED
-CVE-2012-5498
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/15
+CVE-2012-5498 [ Zope/Plone: Partial denial of service through Collections functionality ]
RESERVED
-CVE-2012-5497
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/14
+CVE-2012-5497 [ Zope/Plone: Anonymous users can list user account names ]
RESERVED
-CVE-2012-5496
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/13
+CVE-2012-5496 [ Zope/Plone: DoS through unsanitised inputs into Kupu ]
RESERVED
-CVE-2012-5495
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/12
+CVE-2012-5495 [ Zope/Plone: Restricted Python injection ]
RESERVED
-CVE-2012-5494
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/11
+CVE-2012-5494 [ Zope/Plone: Reflexive XSS ]
RESERVED
-CVE-2012-5493
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/10
+CVE-2012-5493 [ Zope/Plone: Restricted Python sandbox escape ]
RESERVED
-CVE-2012-5492
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/09
+CVE-2012-5492 [ Zope/Plone: Partial permissions bypass ]
RESERVED
-CVE-2012-5491
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/08
+CVE-2012-5491 [ Zope/Plone: Form detail exposure ]
RESERVED
-CVE-2012-5490
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/07
+CVE-2012-5490 [ Zope/Plone: Reflexive XSS ]
RESERVED
-CVE-2012-5489
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/06
+CVE-2012-5489 [ Zope/Plone: Partial restricted Python sandbox escape ]
RESERVED
-CVE-2012-5488
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/05
+CVE-2012-5488 [ Zope/Plone: Restricted Python injection ]
RESERVED
-CVE-2012-5487
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/04
+CVE-2012-5487 [ Zope/Plone: Restricted Python sandbox escape ]
RESERVED
-CVE-2012-5486
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/03
+CVE-2012-5486 [ Zope/Plone: Reflexive HTTP header injection ]
RESERVED
-CVE-2012-5485
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/02
+CVE-2012-5485 [ Restricted Python injection ]
RESERVED
+ - zope2.12 <unfixed> (bug #692899)
+ NOTE: https://plone.org/products/plone/security/advisories/20121106/01
CVE-2012-5484
RESERVED
CVE-2012-5483
More information about the Secure-testing-commits
mailing list