1
Candidate: CVE-2015-6943
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6943
5
http://blog.s9y.org/archives/265-Serendipity-2.0.2-Security-Fix-Release.html
6
http://seclists.org/fulldisclosure/2015/Sep/10
7
http://packetstormsecurity.com/files/133428/Serendipity-2.0.1-Blind-SQL-Injection.html
8
http://blog.curesec.com/article/blog/Serendipity-201-Blind-SQL-Injection-52.html
10
SQL injection vulnerability in the serendipity_checkCommentToken function
11
in include/functions_comments.inc.php in Serendipity before 2.0.2, when
12
"Use Tokens for Comment Moderation" is enabled, allows remote
13
administrators to execute arbitrary SQL commands via the serendipity[id]
14
parameter to serendipity_admin.php.
23
upstream: https://github.com/s9y/Serendipity/releases/tag/2.0.2
24
upstream_serendipity: released (2.0.2)
25
precise_serendipity: ignored (reached end-of-life)
26
precise/esm_serendipity: DNE (precise was needed)
27
trusty_serendipity: DNE
28
vivid_serendipity: DNE
29
vivid/stable-phone-overlay_serendipity: DNE
30
vivid/ubuntu-core_serendipity: DNE
32
xenial_serendipity: DNE
33
yakkety_serendipity: DNE
34
zesty_serendipity: DNE
35
devel_serendipity: DNE