Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 14 May 2014 22:22:35 -0400 (EDT)
From: cve-assign@...re.org
To: pabs3@...edaddy.net
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: various NodeJS module vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

These happen to end up with one CVE ID per advisory:

https://nodesecurity.io/advisories/printer_potential_command_injection CVE-2014-3741
https://nodesecurity.io/advisories/hapi_File_descriptor_leak_DoS_vulnerability CVE-2014-3742
https://nodesecurity.io/advisories/marked_multiple_content_injection_vulnerabilities CVE-2014-3743
https://nodesecurity.io/advisories/st_directory_traversal CVE-2014-3744
https://nodesecurity.io/advisories/codem-transcode_command_injection CVE-2013-7377
https://nodesecurity.io/advisories/Hubot_Potential_command_injection_in_email.coffee CVE-2013-7378
https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness CVE-2013-7379
https://nodesecurity.io/advisories/ep_imageconvert_command_injection CVE-2013-7380
https://nodesecurity.io/advisories/libnotify_potential_command_injection_in_libnotify.notify CVE-2013-7381

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTdCSZAAoJEKllVAevmvmsAIoH/ia/49VXn5UOiZV8T29iH2GD
mLz4pfz+v+BRckNkNW7IhzLScoe5bRjbZRc82HxS3zA+h94USLeNCNhwSWizsrKz
UZj8Jov9wDcYF9L4BbmKwNlrkv9erTvp4MaJbXpDbNCRi/tK1J8H5LecwMQogGrZ
A0fZll0ykPOI/uNIeGEAXO6SRepDRjOci6CDY6rcJ5UfxQzgTKrogHcEizmqxxyw
J2EvflJTk/MqAIO9jvLo00KvoHCGOsguDsT6wqYfuY0U1vU6KNATeGzQ8ypxW2K5
E4fRAPjIWjr4UJdPRM6Kk8a9Dygc+ktROTPSpnCp7zZo3P6kTGSlP2etGg5+2Hk=
=pMRL
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ