|
Message-Id: <200902041519.27870.rbu@gentoo.org>
Date: Wed, 4 Feb 2009 15:19:25 +0100
From: Robert Buchholz <rbu@...too.org>
To: oss-security@...ts.openwall.com
Subject: CVE request: Openfire <3.6.3 XSS vulnerabilities
Openfire before 3.6.3 contains several reflected and persistent
Cross-Site Scripting vulnerabilties, also possibly leading to
server-side code execution, and a directory traversal.
https://bugs.gentoo.org/show_bug.cgi?id=257585
http://www.coresecurity.com/content/openfire-multiple-vulnerabilities
http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html
http://www.igniterealtime.org/issues/browse/JM-1506
SVN revisions r10939 r10938 r10937 r10936 on
http://svn.igniterealtime.org/svn/repos/openfire/trunk/ contain the
fixes.
Download attachment "signature.asc " of type "application/pgp-signature" (836 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.