Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 4 Aug 2015 18:09:12 +0300
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: CVE request: WordPress 4.2.3 and earlier multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Please ignore this CVE request as https://codex.wordpress.org/Version_4.2.4 says:

"WordPress 4.2.4 fixes three cross-site scripting vulnerabilities and a
potential SQL injection that could be used to compromise a site
(CVE-2015-2213)."

Sorry for mistake/noise.

- -- 
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBAgAGBQJVwNWXAAoJECet96ROqnV0Z00QAL2VTMLRjsLul1gNV3Eyz6rY
vXc6WjNKOxtnKWZAWGTspwPlQSUEoC0gqOo0z4UCBvCqHpZgMBT0uHhg4yFqxMGK
d5Z5c8vBP7YOz21b0IfRF21PXmsX2ildvOrkcqJ8CMb1tyroYkphDLPSYZkOWiO2
1dUUOGFipHPqYVvfSsWCYujn5ms4CIHezPjONdvNFQfYZ4s0R6LHUYUt3LLblYiC
IcWA3Oeiw3i/0ZsgLNihoHMkBKUnBiLbefTKzDzlRRQjMhQlS1Rt/p6wRd5Aq6ki
d5snKSxSlUPnun2b2NBo49jvpSUyhllzwSDGHWpqTC3judo+rVuxSuLG+Jlcy5qb
zrRiMhvFqBrMEE0oQubw/avrkX01hkBq/nYfHdEB1Rr2P8yoiMHvG+AoQTNbTLpX
zi7kvYHZHe1SRR1IcC+GZri5Wnvpsc9PMzZbzt/xsgc35P7WJ3Tml4jzDsDFJdKF
FzqJzNsNB89gbPUhUpdJ/YJ8MWg+Yz+/HodHNeu+OXK4nXpCISVOhL0Hehy0GymO
1k93ll5dgWpUl1D03xFOiIrGBOTTXzwrqwEBRP7SS7rnnexxLRla3xkx6sslDHSq
UXW0RrChHX967oZ+pXp0hGBy+WNAw/8yzzivzXzkLHwK6t8xuQOyWjdqKfqsKga8
v10bcym51WjelsvvOngU
=ggBf
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.