Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 4 Aug 2015 18:09:12 +0300
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: CVE request: WordPress 4.2.3 and earlier multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Please ignore this CVE request as https://codex.wordpress.org/Version_4.2.4 says:

"WordPress 4.2.4 fixes three cross-site scripting vulnerabilities and a
potential SQL injection that could be used to compromise a site
(CVE-2015-2213)."

Sorry for mistake/noise.

- -- 
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=ggBf
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ