Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <200902041519.27870.rbu@gentoo.org>
Date: Wed, 4 Feb 2009 15:19:25 +0100
From: Robert Buchholz <rbu@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: Openfire <3.6.3 XSS vulnerabilities

Openfire before 3.6.3 contains several reflected and persistent 
Cross-Site Scripting vulnerabilties, also possibly leading to 
server-side code execution, and a directory traversal.

https://bugs.gentoo.org/show_bug.cgi?id=257585
http://www.coresecurity.com/content/openfire-multiple-vulnerabilities
http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html
http://www.igniterealtime.org/issues/browse/JM-1506

SVN revisions r10939 r10938 r10937 r10936 on 
http://svn.igniterealtime.org/svn/repos/openfire/trunk/ contain the 
fixes.

Download attachment "signature.asc " of type "application/pgp-signature" (836 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.