Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 11 Jul 2014 03:20:26 -0400 (EDT)
From: cve-assign@...re.org
To: kseifried@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Zend Framework CVEs

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> http://framework.zend.com/security/advisory/ZF2014-03
> ZF2014-03: Potential XSS vector in multiple view helpers

Use CVE-2014-4913.


> http://framework.zend.com/security/advisory/ZF2014-04
> ZF2014-04: Potential SQL injection in the ORDER implementation of
> Zend_Db_Select

Use CVE-2014-4914.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTv4/eAAoJEKllVAevmvmsrlEIAKTeNhFouPxxjXrFCpbo3iKT
3XI0N90/qNLWOrasMxCzu57fSf1p+z70WiF277mRMVfPrAAKNwaeqUi9reHXvZmK
ot80tstqfFWbVCNh0rJJZPAtee1KR0e90TPPKAk7mHpzVlJpAiL/ZeTTCUsS8kPU
ZyTlAfh9iL4kL0QDIc2/howgYdS7a3h0RYqBAd6mKp2ghwjlWAf55j1sA45vqSdw
bLCDZpjyikwe9LhnBkDi+LilNwEl9WGcsutLuRwAyo/tCuIa8vA3Ev+TcpmJh8Qx
kfpsZNBM/tsct8YsdNW339g8d4Qgnt5+BkynOyWhy9PjrIsVvtSgOuy1fCit2hY=
=CAcB
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ