Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120125141747.GA4413@foo.fgeek.fi>
Date: Wed, 25 Jan 2012 16:17:47 +0200
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Subject: Fwd Joomla! Security News 2012-01

Does someone know if these already have CVE-identifiers? Joomla just released this advisory.

- Henri Salo

----- Forwarded message from Joomla! Developer Network - Security News <no_reply@...mla.org> -----

Date: Wed, 25 Jan 2012 13:21:21 +0000
From: Joomla! Developer Network - Security News <no_reply@...mla.org>
To: henri@...v.fi
Subject: Joomla! Security News

Joomla! Developer Network - Security News

///////////////////////////////////////////
[20120101] - Core - Information Disclosure

Posted: 23 Jan 2012 01:45 AM PST
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/MYKnZ2QJKYE/382-20120101-core-information-disclosure.html?utm_source=feedburner&utm_medium=email

Project: Joomla!
SubProject: All
Severity: Low
Versions: 1.7.3 and all earlier 1.7 and 1.6 versions
Exploit type: Information Disclosure
Reported Date: 2012-January-07
Fixed Date: 2012-January-24

Description
Inadequate filtering leads to information disclosure.
Affected Installs
Joomla! version 1.7.3 and all earlier versions
Solution
Upgrade to version 1.7.4 or 2.5.0 or higher
Reported by Cyrille Barthelemy
Contact
The JSST at the Joomla! Security Center.



///////////////////////////////////////////
[20120102] - Core - XSS Vulnerability

Posted: 23 Jan 2012 01:45 AM PST
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/XAEsWEG3dgU/383-20120102-core-xss-vulnerability.html?utm_source=feedburner&utm_medium=email

Project: Joomla!
SubProject: All
Severity: Moderate
Versions: 1.7.3 and all earlier 1.7 and 1.6 versions
Exploit type: XSS Vulnerability
Reported Date: 2011-November-16
Fixed Date: 2012-January-24

Description
Inadequate filtering leads to XSS vulnerability.
Affected Installs
Joomla! version 1.7.3 and all earlier versions
Solution
Upgrade to version 1.7.4 or 2.5.0 or higher
Reported by Ankita Kapadia
Contact
The JSST at the Joomla! Security Center.



///////////////////////////////////////////
[20120103] - Core - Information Disclosure

Posted: 23 Jan 2012 01:45 AM PST
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/Ed0TMAvyQ4g/384-20120103-core-information-disclosure.html?utm_source=feedburner&utm_medium=email

Project: Joomla!
SubProject: All
Severity: Low
Versions: 1.7.3 and all earlier 1.7 and 1.6 versions
Exploit type: Information Disclosure
Reported Date: 2011-December-19
Fixed Date: 2012-January-24

Description
Inadequate filtering leads to information disclosure.
Affected Installs
Joomla! version 1.7.3 and all earlier versions
Solution
Upgrade to version 1.7.4 or 2.5.0 or higher
Reported by Jean-Marie Simonet
Contact
The JSST at the Joomla! Security Center.



///////////////////////////////////////////
[20120104] - Core - XSS Vulnerability

Posted: 23 Jan 2012 01:45 AM PST
http://feedproxy.google.com/~r/JoomlaSecurityNews/~3/K4UuOr8BroM/385-20120104-core-xss-vulnerability.html?utm_source=feedburner&utm_medium=email

Project: Joomla!
SubProject: All
Severity: Moderate
Versions: 1.7.3 and all earlier versions
Exploit type: XSS Vulnerability
Reported Date: 2012-January-22
Fixed Date: 2012-January-24

Description
Inadequate filtering leads to XSS vulnerability.
Affected Installs
Joomla! version 1.7.3 and all earlier 1.7 and 1.6 versions
Solution
Upgrade to version 1.7.4 or 2.5.0 or higher
Reported by David Jardin
Contact
The JSST at the Joomla! Security Center.



--
You are subscribed to email updates from "Joomla! Developer Network -
Security News."
To stop receiving these emails, you may unsubscribe now: http://feedburner.google.com/fb/a/mailunsubscribe?k=JWlBXz9w0F12fWtPu46jwc9_Jcc

Email delivery powered by Google.
Google Inc., 20 West Kinzie, Chicago IL USA 60610


----- End forwarded message -----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.