|
Message-Id: <20150523022515.A3FC4B2E334@smtpvbsrv1.mitre.org> Date: Fri, 22 May 2015 22:25:15 -0400 (EDT) From: cve-assign@...re.org To: adrimf85@...il.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request: Multiple vulnerabilities in some WordPress plugins: NewStatPress & WordPress Landing Pages. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > - Multiple vulnerabilities in WordPress plugin "NewStatPress" > * vulnerable version: 0.9.8 > * patched version: 0.9.9 > * changelog: https://wordpress.org/plugins/newstatpress/changelog/ > SQLi Use CVE-2015-4062. > XSS Use CVE-2015-4063. > - Multiple vulnerabilities in WordPress plugin "WordPress Landing Pages" > * vulnerable version: 1.8.4 > * patched version: 1.8.5 > * changelog: https://wordpress.org/plugins/landing-pages/changelog/ > SQLi Use CVE-2015-4064. > XSS Use CVE-2015-4065. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVX+QTAAoJEKllVAevmvmsC04H/iVkGWEDHkaaqhTNpAUM7Dvo itWHZ9rVHPGpRNEPIyNUBCsDEuhJftghsr0nHlZWe6bLC76zSHfuGUR1rU03q8FI ci9P74q2v03uHPIFLPMPoPPc9qFsqFXCkI05MqB4+3/4wC/eAgpjbPRFZy1PpIIP rA+vdcyk+AWpk39gZglS5qiV37fj9YLxV4drONopbWOZwNZ5lrmgldV8quNw5Ebw 8nDiob6HLP3LyRm+vEE7aILU30QP9DucOgbr3uPHcRnL9pvjJVexIGQd58xgphlQ Znl9XdlaxCY1pXnaTFra9wUT+LN+Aj/faA/xmqlRLgSCfW0YO1VYYWIoblFKyyM= =q7v0 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.