|
Message-ID: <20151215155422.GC16820@lakka.kapsi.fi> Date: Tue, 15 Dec 2015 17:54:22 +0200 From: Henri Salo <henri@...v.fi> To: oss-security@...ts.openwall.com Subject: CVE-2015-8562: Joomla remote code execution vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Joomla fixed remote code execution vulnerability, which affects versions 1.5.0 through 3.4.5. Please see following URLs for details: https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html https://www.joomla.org/announcements/release-news/5641-joomla-3-4-6-released.html https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html - -- Henri Salo -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJWcDeuAAoJECet96ROqnV0XtEP/1eXWnC00ky1ngcr6kRWLC86 sYWsFKwcVZQOFtxPc2QGHpU0IjlOgE8ug9cWaayCqyaEE/JMR1IJfKCMnaRBS4Rm c0abkZ5/alo/BrxMLNuHZDQgS/aXDjKoG4ypyfr5HuH3OBQqt8UFWVSMbKDnU+2F sN4IDfmsolhCZS8+6LNefXgnnzVokeTYmEOfTjANAmFnSPol+U1c9GJStAXTttlz 7LJAeM7E7rGJLHFjOWWS2hbD/v1EcfFgHgwGiQqk0YGol5iYsq/vWBCPMkmG7uPo KZESkb9oDfDWSLryHceoiN6NUIGzvNQQEGFl1ZMX2ijUDwkcWS103FVs0CgwIvpj zWzeUqApn+mrU4FeDgnFNZPi9dO3RXD2ocKbM77gjDWAHTa7E2vYZW6S5CjOd8e3 pFveV/SIZAMMzxUHoiP3BAQIfHGQudunJUFVEaiDtS+PnCUHr0ropp5DkZAfVZRQ Vt+4hZ96g+vWkMfHslhtAOC9ilxAa+BpVboxy8tpJ9GbCudIAWMJ261T1sXJQ5O7 FVFiIZM6KtJHRcfVqIZGyVjW20RaJ5Dm4QCZmmqgYgFwj8l4HIxdjqUN54asRD49 7JUBk6zS3qkdqlfwixkfsIiFljmgJpSCyQOCSbNP2gs8vO05BAKh3vM0uXhER+hE w4YZ/bbkvJFedeb9iY4s =QCN1 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.