Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 6 May 2014 16:20:53 -0400 (EDT)
From: cve-assign@...re.org
To: pnigos70@...il.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request ---- SOAPpy 0.12.5 Multiple Vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://www.pnigos.com/?p=260

> <!ENTITY xxe SYSTEM "file:///etc/passwd">

Use CVE-2014-3242.


> <!ENTITY lol2
>  "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;">

Use CVE-2014-3243.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTaUDDAAoJEKllVAevmvmsFrsH/jWsJ/LyyMnOb2oVR3KoFlhZ
qBUpqc0X9dUTlHHKkx0ztrNd9FoWwjqbSzwiLgIaYumEYHMJYluPQ9quqrUZai38
VAFMyTosVuaOHI9ml9JUvXcpr3RfxdG1Pxe/CAUuUl9iFtk+sAD1eVC57R1LUx4w
r/Eg028CCUX/wzqgALAsu/FZMtL9waT1TS8/LgpXskaV7+sRAjd8Sb/aOmANR3JZ
0E53iVMaNSiogT7BVfJgr3zVGmH3XIpGSopGb8WqUdJD2ufLzGBcQtdkEQHXMUA/
V7Df/hPG/6dBrPW9VoSEwVxlMTKPoc0P3VYdNmMv06OEtkWLEoo3bBfu8PoO3Ds=
=syp0
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ