Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 22 Feb 2015 13:26:28 -0500 (EST)
From: cve-assign@...re.org
To: carnil@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: TYPO3-CORE-SA-2015-001: Authentication Bypass in TYPO3 CMS 4.5

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Could you please assign a CVE for the authentication bypass
> vulnerability in typo3, as repleased per TYPO3-CORE-SA-2015-001?
> 
> https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-001
> https://review.typo3.org/#/c/37013/

Use CVE-2015-2047.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJU6h7pAAoJEKllVAevmvms8K8IALDOteuYRBpdsIWJ/7UgsmB1
ssSg0ASfw8G2onMi3aAKxeuRppMSzvGZ+vIJBzyA6ULmNN6nRZbgSqqTSI4UmuQV
dC5hxFIqVNcbIRwBCoUt3OI1Q5W1IAkYjAMs0lX8k+sPvopGq/huo39AuwcO2Apq
dEysbH/vgVQA2XQgsMVC9IyKEbP52mwiFmAotpIqnnWktbXzq2KdPMuU+ykP6TvM
KBJnTYV0Z39SiaB/HHW1KsnK5sGqS7tmpst2AXHjer4QsKrZhyvy1vvW9kD4ffw3
NXJRXfYS/3OxhS7Kg8w1s2g78PvYiCdDE2qzdFFkrYO1o3to1e5ZvJ1ibtaUz7c=
=RFQW
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.