Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 1 Mar 2014 14:52:52 -0500 (EST)
From: cve-assign@...re.org
To: henri@...v.fi
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: CMS Made Simple SQL injection fixed in 1.11.10

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Can I get 2014 CVE for CMS Made Simple News sortby Parameter SQL
> injection vulnerability.
> 
> http://www.cmsmadesimple.org/2014/02/Announcing-CMSMS-1-11-10-Pinzon/
> http://dev.cmsmadesimple.org/project/changelog/4602

Use CVE-2014-2245.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEbBAEBAgAGBQJTEjnnAAoJEKllVAevmvmsmP4H+NcDLAzkxhCwnmOy255sv9a9
cYc0/cfT45GJgaDWiRJ65d8zqVVjeLCSFQM/JwX8PI0uTvqvrIM/uGqvZwB+My6a
swjCDjF/UKgJxsJrl84OJNhsZJ5ZXUeLYmVL0g7WibWn7GULKwsxwZQ4FCeHQWuQ
kgNb14BJ5xSAWNttaafdY9j3JR68vr0md2lUthNI9baSSJrNwLltTQIx6MHeTfD6
WyRNsMf6L9b1lJ+an8qKlQgzVLtPVLNFW+LCLzBB8fBSHv1eh8zlS1v54q3WXwTQ
qYHs2tFXJ2s+14bHwvDC/AAYfkF0wLsB5cnH5BzW0UXlcTUdNx0vrRWm6uBPwA==
=JpoX
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ