Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <8352bc24d40a4601ad80e0bf3387f0bd@imshyb02.MITRE.ORG>
Date: Fri, 18 Nov 2016 18:05:34 -0500
From: <cve-assign@...re.org>
To: <oss-security@...ts.openwall.com>
CC: <cve-assign@...re.org>
Subject: Re: CVE Request: Blind SQL Injection Vulnerability in Exponent CMS 2.4.0

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> https://github.com/exponentcms/exponent-cms/commit/fffb2038de4c603931b785a4c3ec69cfd06181ba

For completeness, we can mention that this was assigned CVE-2016-9272.
(The discoverer used both oss-security and https://cveform.mitre.org
to contact us about the same issue.)

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJYL4i7AAoJEHb/MwWLVhi2tWUQAJIYiYNLgoGa8OGxe+Uv7VpT
FzRozJNTHJ8PDlLsBzMmHJ+Xew9nWqpZGabdkqwRi4QTUf3K64HBVRy5o0qho+Cm
ej6FbydqbYJz7UHoj2IQuHlPSoHCfNpS9Crh8xEfC8vrntQf9tfCyWyeM7My8kY7
AnqeM74rS/6UhYpOdZ/hdTNYXrzy8GiTC9W0cVh34JgeH/PKiJdxiJ5qsKPdsFDZ
Z7tXz1uXby0T/hhacoLVlSQKq/IZoHyW9udYn/6edg/oPM4nVz48zcg2LSQU8jDR
7IQUSNwPvHBLveQjXjvmUNx/GYSw5V5F4m+xy0egibb83TccF8oWerOgwwcRCnMx
mALiuCBhaiW8s7gtOk5COWIHLdID+VKVU/oQswOmV3PHM/yPGa50JdjOOF5QJJru
vFro8h6/vguI3ZEKDzaVhjpvU/B/d70WsCQFIkgyDet7spSX9ngFWM6fV9s5A5gv
sQvZsOueHkW351urKasAT/OfM17LBaHZzmJxf/uVcCuUBKPOg/U2t7Kiy3xl20/P
SCM+iRg3o9haIhHWsFKHW3Yz745OYq+jElRYmdFZRghJy1QZdmUdkXXTSb6RVmXZ
BKbGveANdHpyLRLXS6yVSsnYmVKl4aYGHmQbSN/0n5H5x00zdzqveb65/tiMQF7V
/nuVsQacfRvfDYsB2/ol
=T1Cp
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.