Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon,  4 Jan 2016 18:58:55 -0500 (EST)
From: cve-assign@...re.org
To: carnil@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, elbrus@...ian.org
Subject: Re: CVE Request: cacti: SQL injection vulnerability in graphs_new.php

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> Another SQL injection vulnerability via graphs_new.php in cacti was
> found, reported to the bug http://bugs.cacti.net/view.php?id=2652

http://bugs.cacti.net/view.php?id=2652 is CVE-2015-8604.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=lOoB
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.