1
Candidate: CVE-2015-6968
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6968
5
http://seclists.org/fulldisclosure/2015/Sep/6
6
http://blog.s9y.org/archives/265-Serendipity-2.0.2-Security-Fix-Release.html
7
http://packetstormsecurity.com/files/133426/Serendipity-2.0.1-Shell-Upload.html
8
http://blog.curesec.com/article/blog/Serendipity-201-Code-Execution-48.html
10
Multiple incomplete blacklist vulnerabilities in the
11
serendipity_isActiveFile function in include/functions_images.inc.php in
12
Serendipity before 2.0.2 allow remote authenticated users to execute
13
arbitrary PHP code by uploading a file with a (1) .pht or (2) .phtml
23
upstream: https://github.com/s9y/Serendipity/commit/dfd229f921e66b992843461cd2a09ee17fc3ce28
24
upstream_serendipity: released (2.0.2)
25
precise_serendipity: ignored (reached end-of-life)
26
precise/esm_serendipity: DNE (precise was needed)
27
trusty_serendipity: DNE
28
vivid_serendipity: DNE
29
vivid/stable-phone-overlay_serendipity: DNE
30
vivid/ubuntu-core_serendipity: DNE
32
xenial_serendipity: DNE
33
yakkety_serendipity: DNE
34
zesty_serendipity: DNE
35
devel_serendipity: DNE