Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.64.1412021941360.27520@beijing.mitre.org>
Date: Tue, 2 Dec 2014 19:42:45 -0500 (EST)
From: cve-assign@...re.org
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: OpenVAS Manager SQL injection
 (OVSA20141128)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>An SQL injection flaw has been fixed in OpenVAS Manager:
>
>http://www.openvas.org/OVSA20141128.html

Use CVE-2014-9220.

The original finder, Michael Eissele, has requested that Michael Meyer
(mime), also of Greenbone Networks, be publicly recognized because he
"worked out the final exploitation PoC which was needed to get some
output of the Database."

- ---

CVE assignment team, MITRE CVE Numbering Authority M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEVAwUBVH5bPqllVAevmvmsAQItJQgAhhxh8qKdxuykhmBRq98HN102+RJjglak
5DsBO8jBtqiNgI7dWGCMQjxScWkfIVR3wNOl+2nKRq2g8mljjpIYTHwB3953NDVJ
yF7g9KBCwYroMYkTEhQVnI+NK4nh/URXmAdOxYwkFVh+kFcbrMxHt4eS1/UN0EnB
1OAvH7Deadj69+F56rgoU3jMvVUe+6GBOhxwIqx8ySSLBoEsuiJ+HTjvBqHkX+gV
MoAaysX4yo9BzL6CIwNAfYe70AQpWKY+gBJVqqpp62Sl1vKtkIc9S6KfpfnocQBv
6bY5kX2RNEv5cGGzAHY4nMeFfrchIpRe7QZeRrlVyRb4NiXtgbwNHw==
=+rTC
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.