Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 22 Jun 2016 10:09:55 -0500
From: John Lightsey <john@...nuts.net>
To: oss-security <oss-security@...ts.openwall.com>
Subject: CVE request: SQL injection in MovableType xml-rpc interface

Hi there,

SixApart just released new versions of MovableType 6.2 and 6.1 to fix an SQL
injection in the xml-rpc interface. The vulnerability also affects the older
GPLv2 licensed MovableType 5.2.13.

Could you please assign a CVE identifier for tracking this issue?

https://movabletype.org/news/2016/06/movable_type_626_and_613_released.html
[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ