Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20150201123920.696C4332051@smtpvbsrv1.mitre.org>
Date: Sun,  1 Feb 2015 07:39:20 -0500 (EST)
From: cve-assign@...re.org
To: steffen.roesemann1986@...il.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE-Request -- Zerocms <= v. 1.3.3 -- SQL injection vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> article_id parameter used in zero_view_article.php

This seems to be a duplicate report; please see:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4034


> user_id parameter used in a POST request in zero_transact_user.php

Use CVE-2015-1442.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUzh4BAAoJEKllVAevmvmsSHcIAKCYb0CAnhJYgTux5fSGQyiK
XNeJhfTWsAlsThIi4PTXcX2s67zRbQRtzlAlczPxDbCWNlpl5SCl7rnOlv1lPUT1
xJUZleKRhkI0U5GQC3xPzMCuS729ccbktET+s1QfWS+7iZ1QXWNExyATEQasLM3r
X0V1wi455h2u4cYlzYd4MLYLOwCrHxq8UDbgHrW1VDU9avODSwvQrzEyKOj3Gjw5
zQWCvqager/1BJP/vtQfocLzCeJ9g+leJ0VoLRdXtgubkGclk1to3biyXBUNfHfV
wm6geuzGccgHM6SnLBLfubsA5xo2ccBwLQkrTxOYAHXi+WhR/knVeIyrRZdnYDY=
=WRkR
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.