Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <201204231324.q3NDOLqo018724@linus.mitre.org>
Date: Mon, 23 Apr 2012 09:24:21 -0400 (EDT)
From: cve-assign@...re.org
To: henri@...v.fi, oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: Security vulnerabilities fixed in WordPress 3.3.2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>Page http://codex.wordpress.org/Version_3.3.2 says:

>I asked from WordPress if these vulnerabilities already have CVE-identifiers

Note that http://nvd.nist.gov/download/nvd-rss.xml is also among
the sources to check for recent CVE assignments:

CVE-2012-2399
CVE-2012-2400
CVE-2012-2401
CVE-2012-2402
CVE-2012-2403
CVE-2012-2404

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S S145
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/obtain_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (SunOS)

iQEcBAEBAgAGBQJPlVfBAAoJEGvefgSNfHMdwy0H/2817pGAY9/u31GMvJRNfzLU
LhQvbBg15wXXvQ9T7iyWPaY0h6FXHOxZI2SLlLszlcr47b8hDdz+SJbUvzF0Lji+
HsgQI/Wz6ptpIsh6Z4wg7lus4IasvxFMT0M/+T2q/SHn5b9CrmHmmhlv2ceC0bZT
h0XZ4uwqW+i08KquLZz3EtHzSmLdNPj5FIwMc0jlrViHsnIFnrsSslHGqqeljaM6
/0bE3SdoDafLBTRAgmTfsOpynVE8uJFL5xGIqvpb6sKWen9vTg9hTlyU3X5Va4VJ
HJ35UblozCZKN+WU9Ko7wfKfRD0RbG/PgS0EHBzRL6YhzIfnwU/f8Rmh3nud+AY=
=2UOc
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.