|
Message-ID: <Pine.GSO.4.51.0903171624470.17171@faron.mitre.org> Date: Tue, 17 Mar 2009 16:24:54 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com cc: Steven Christey <coley@...us.mitre.org> Subject: Re: CVE request: nucleus cms < 3.40 (3.33 and below) directory traversal ====================================================== Name: CVE-2009-0929 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0929 Reference: CONFIRM:http://www.nucleuscms.org/index.php/item/index.php/item/3051 Reference: SECUNIA:34180 Reference: URL:http://secunia.com/advisories/34180 Reference: VUPEN:ADV-2009-0637 Reference: URL:http://www.vupen.com/english/advisories/2009/0637 Reference: XF:nucleuscms-mediamanager-directory-traversal(49142) Reference: URL:http://xforce.iss.net/xforce/xfdb/49142 Directory traversal vulnerability in the media manager in Nucleus CMS before 3.40 allows remote attackers to read arbitrary files via unknown vectors.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.