| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20190109084551.iovuogic42ulg3s7@tunkki.bugs.fi>
Date: Wed, 9 Jan 2019 10:45:51 +0200
From: Henri Salo <henri@...v.fi>
To: Daniel Bishtawi <daniel@...sparker.com>
Cc: fulldisclosure@...lists.org
Subject: Re: [FD] Reflected Cross-site Scripting Vulnerability in CubeCart
6.2.2
On Mon, Dec 03, 2018 at 03:37:25PM +0100, Daniel Bishtawi wrote:
> Name: Reflected Cross-site Scripting Vulnerability in CubeCart
> Affected Versions: 6.2.2
> Status: Fixed
> https://www.netsparker.com/web-applications-advisories/ns-18-025-reflected-cross-site-scripting-in-cubecart/
Fixed in what version or commit? Did you request CVE identifier for this
vulnerability?
--
Henri Salo
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists