Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20150209124858.BDB1642E064@smtpvbsrv1.mitre.org>
Date: Mon,  9 Feb 2015 07:48:58 -0500 (EST)
From: cve-assign@...re.org
To: marina@...dle.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, kseifried@...hat.com
Subject: Re: CVE request for Moodlee MDL-48980 Security: Always clean the result from min_get_slash_argument - Moodle

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> We already had CVE for this issue: CVE-2015-0246

>> Use CVE-2015-1493.

CVE-2015-1493 will continue to be the ID for the "MSA-15-0009:
Directory Traversal Attack possible through some files serving JS"
issue (MDL-48980 and MDL-48990). We will reject the CVE-2015-0246 ID
with a pointer to CVE-2015-1493.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJU2KvjAAoJEKllVAevmvms1mEH/iqPDDn96KErVjn/kUJxOMy0
mQVImv0njIEt9MmV1f4spiMLVtxoirGup5hZrcj9O2pAvDiOivV8skOOk9CCfKtS
0jIj0Du2WublCn49bsXGy+tsLEMaqKZ0Xc5LuTakwCNZBQgEeM8Fx8t6C5z2aCj4
RsS+u4FqGW9oxCwYM36exInzTYMxPrTOtDxIm1vxDkSLOVdvi2HLFvVFA6S2YeIB
LEq1NEtWTyqvuhFGI07nC2EdU5UxeaziwaHbuIWc0ah2U1cqz1CLswo4rWNh3fMt
F1xfgTm1CwrsHqntJjA0oB5l0JioYMjVVlBAK/F6zEQgODrI11cjyKYcZh1grvA=
=+xEI
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.