|
Message-Id: <201406260020.s5Q0KLMc001531@linus.mitre.org> Date: Wed, 25 Jun 2014 20:20:21 -0400 (EDT) From: cve-assign@...re.org To: hanno@...eck.de Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request: piwigo before 2.6.3 sql injection -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The unspecified vulnerability "[security] security failure reported and fixed by Christopher Chrapka, ojezu.org" in http://piwigo.org/releases/2.6.3 is assigned CVE-2014-4648. The SQL injection that was apparently first identified in 2.6.2 and (thus far) only fixed in 2.7.0beta2 (see the http://piwigo.org/bugs/view.php?id=3089 page) is assigned CVE-2014-4649. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJTq2aPAAoJEKllVAevmvmsMwAH/Rejl52Ahj5KKrCr5oAkpWaR QJtsBTFQbFGBg36aV9NnG13GLcrfHWVoLORwSr6M6W9UvslQQAA09fHfWlzj8hH9 9Ed19JIF9PFJhfb3NVs2BwpcC2Jq5tuPEBHKZ/zP+DSP4SgKo7v8UUpkNGCAa4A4 fL4jdfn8o4AW6laH2tZt7PlXxFsf2SW+PF4QqUT0aYbQrMqWrS7g+eNZQQB4LjwR SsRPo8pPGW+5fGOxjwU1e5TcekbnPGOymhzHdHx/3vIzWiIlh5pQ5bvG/OXPTed/ CWwQ66VxYKGXQ0Uw43QT6USZY2/oyW1nGcjTq2H8oudg/KW+QJG/f1htOrawXr8= =+pZa -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.