From 1be510f9529cb082f802408b472a77d074b394c0 Mon Sep 17 00:00:00 2001 From: Nicolas Vigier Date: Sun, 14 Apr 2013 13:46:12 +0000 Subject: Add zarb MLs html archives --- zarb-ml/mageia-dev/2013-January/022037.html | 99 +++++++++++++++++++++++++++++ 1 file changed, 99 insertions(+) create mode 100644 zarb-ml/mageia-dev/2013-January/022037.html (limited to 'zarb-ml/mageia-dev/2013-January/022037.html') diff --git a/zarb-ml/mageia-dev/2013-January/022037.html b/zarb-ml/mageia-dev/2013-January/022037.html new file mode 100644 index 000000000..8b9c54dcf --- /dev/null +++ b/zarb-ml/mageia-dev/2013-January/022037.html @@ -0,0 +1,99 @@ + + + + [Mageia-dev] Freeze push: wordpress 3.5.1 + + + + + + + + + +

[Mageia-dev] Freeze push: wordpress 3.5.1

+ FundaWang + fundawang at fundawang.name +
+ Fri Jan 25 06:07:16 CET 2013 +

+
+ +
Hello,
+Could wordpress 3.5.1 be pushed? It addresses the following security issues:
+* A server-side request forgery vulnerability and remote port scanning using pingbacks. This vulnerability, which could potentially be used to expose information and compromise a site, affects all previous WordPress versions. This was fixed by the WordPress security team. We’d like to thank security researchers Gennady Kovshenin and Ryan Dewhurst for reviewing our work.
+* Two instances of cross-site scripting via shortcodes and post content. These issues were discovered by Jon Cave of the WordPress security team.
+* A cross-site scripting vulnerability in the external library Plupload. Thanks to the Moxiecode team for working with us on this, and for releasing Plupload 1.5.5 to address this issue.
+Regards. 		 	   		  
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+

+ +
+More information about the Mageia-dev +mailing list
+ -- cgit v1.2.1