Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 22 May 2015 22:25:15 -0400 (EDT)
From: cve-assign@...re.org
To: adrimf85@...il.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: Multiple vulnerabilities in some WordPress plugins: NewStatPress & WordPress Landing Pages.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> - Multiple vulnerabilities in WordPress plugin "NewStatPress"
> * vulnerable version: 0.9.8
> * patched version: 0.9.9
> * changelog: https://wordpress.org/plugins/newstatpress/changelog/

> SQLi

Use CVE-2015-4062.


> XSS

Use CVE-2015-4063.


> - Multiple vulnerabilities in WordPress plugin "WordPress Landing Pages"
> * vulnerable version: 1.8.4
> * patched version: 1.8.5
> * changelog: https://wordpress.org/plugins/landing-pages/changelog/

> SQLi

Use CVE-2015-4064.


> XSS

Use CVE-2015-4065.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVX+QTAAoJEKllVAevmvmsC04H/iVkGWEDHkaaqhTNpAUM7Dvo
itWHZ9rVHPGpRNEPIyNUBCsDEuhJftghsr0nHlZWe6bLC76zSHfuGUR1rU03q8FI
ci9P74q2v03uHPIFLPMPoPPc9qFsqFXCkI05MqB4+3/4wC/eAgpjbPRFZy1PpIIP
rA+vdcyk+AWpk39gZglS5qiV37fj9YLxV4drONopbWOZwNZ5lrmgldV8quNw5Ebw
8nDiob6HLP3LyRm+vEE7aILU30QP9DucOgbr3uPHcRnL9pvjJVexIGQd58xgphlQ
Znl9XdlaxCY1pXnaTFra9wUT+LN+Aj/faA/xmqlRLgSCfW0YO1VYYWIoblFKyyM=
=q7v0
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.