|
Message-ID: <Pine.LNX.4.64.1412021941360.27520@beijing.mitre.org> Date: Tue, 2 Dec 2014 19:42:45 -0500 (EST) From: cve-assign@...re.org To: oss-security@...ts.openwall.com Subject: Re: CVE request: OpenVAS Manager SQL injection (OVSA20141128) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 >An SQL injection flaw has been fixed in OpenVAS Manager: > >http://www.openvas.org/OVSA20141128.html Use CVE-2014-9220. The original finder, Michael Eissele, has requested that Michael Meyer (mime), also of Greenbone Networks, be publicly recognized because he "worked out the final exploitation PoC which was needed to get some output of the Database." - --- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEVAwUBVH5bPqllVAevmvmsAQItJQgAhhxh8qKdxuykhmBRq98HN102+RJjglak 5DsBO8jBtqiNgI7dWGCMQjxScWkfIVR3wNOl+2nKRq2g8mljjpIYTHwB3953NDVJ yF7g9KBCwYroMYkTEhQVnI+NK4nh/URXmAdOxYwkFVh+kFcbrMxHt4eS1/UN0EnB 1OAvH7Deadj69+F56rgoU3jMvVUe+6GBOhxwIqx8ySSLBoEsuiJ+HTjvBqHkX+gV MoAaysX4yo9BzL6CIwNAfYe70AQpWKY+gBJVqqpp62Sl1vKtkIc9S6KfpfnocQBv 6bY5kX2RNEv5cGGzAHY4nMeFfrchIpRe7QZeRrlVyRb4NiXtgbwNHw== =+rTC -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.