|
Message-ID: <8352bc24d40a4601ad80e0bf3387f0bd@imshyb02.MITRE.ORG> Date: Fri, 18 Nov 2016 18:05:34 -0500 From: <cve-assign@...re.org> To: <oss-security@...ts.openwall.com> CC: <cve-assign@...re.org> Subject: Re: CVE Request: Blind SQL Injection Vulnerability in Exponent CMS 2.4.0 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > https://github.com/exponentcms/exponent-cms/commit/fffb2038de4c603931b785a4c3ec69cfd06181ba For completeness, we can mention that this was assigned CVE-2016-9272. (The discoverer used both oss-security and https://cveform.mitre.org to contact us about the same issue.) - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJYL4i7AAoJEHb/MwWLVhi2tWUQAJIYiYNLgoGa8OGxe+Uv7VpT FzRozJNTHJ8PDlLsBzMmHJ+Xew9nWqpZGabdkqwRi4QTUf3K64HBVRy5o0qho+Cm ej6FbydqbYJz7UHoj2IQuHlPSoHCfNpS9Crh8xEfC8vrntQf9tfCyWyeM7My8kY7 AnqeM74rS/6UhYpOdZ/hdTNYXrzy8GiTC9W0cVh34JgeH/PKiJdxiJ5qsKPdsFDZ Z7tXz1uXby0T/hhacoLVlSQKq/IZoHyW9udYn/6edg/oPM4nVz48zcg2LSQU8jDR 7IQUSNwPvHBLveQjXjvmUNx/GYSw5V5F4m+xy0egibb83TccF8oWerOgwwcRCnMx mALiuCBhaiW8s7gtOk5COWIHLdID+VKVU/oQswOmV3PHM/yPGa50JdjOOF5QJJru vFro8h6/vguI3ZEKDzaVhjpvU/B/d70WsCQFIkgyDet7spSX9ngFWM6fV9s5A5gv sQvZsOueHkW351urKasAT/OfM17LBaHZzmJxf/uVcCuUBKPOg/U2t7Kiy3xl20/P SCM+iRg3o9haIhHWsFKHW3Yz745OYq+jElRYmdFZRghJy1QZdmUdkXXTSb6RVmXZ BKbGveANdHpyLRLXS6yVSsnYmVKl4aYGHmQbSN/0n5H5x00zdzqveb65/tiMQF7V /nuVsQacfRvfDYsB2/ol =T1Cp -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.