Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20181002100714.vjc6guekvqkcp3j3@tunkki.bugs.fi>
Date: Tue, 2 Oct 2018 13:07:14 +0300
From: Henri Salo <henri@...v.fi>
To: Nitin Venkatesh <venkatesh.nitin@...il.com>
Cc: oss-security@...ts.openwall.com
Subject: Re: CVE Request - Information Exposure Vulnerability
 in WordPress Mobile Pack Wordpress Plugin v2.1.2 (and certain versions of
 v2.1.3 - prior to June 3, 2015)

On Sun, Jul 19, 2015 at 11:19:08AM +0000, Nitin Venkatesh wrote:
> I discovered Information Exposure Vulnerability in WordPress Mobile Pack
> Wordpress Plugin v2.1.2 which was responsibly disclosed to the vendor who
> fixed the issues in v2.1.3. The vulnerability is also present in certain
> versions of v2.1.3 (prior to June 3, 2015), hence users who have those
> versions also need to upgrade/reinstall.
> 
> I request a CVE for the same.
> 
> References:
> http://seclists.org/fulldisclosure/2015/Jul/97
> 
> Thanks & regards,
> Nitin Venkatesh

CVE-2015-9269 has been assigned for this vulnerability.

-- 
Henri Salo

Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.