Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=e2761614a2b9597f9ee9b80f9b9b1a0c0a13c670

commit e2761614a2b9597f9ee9b80f9b9b1a0c0a13c670
Author: Miklos Vajna <vmik...@frugalware.org>
Date:   Tue Aug 23 09:28:34 2011 +0200

FSA736-roundcube

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 1390a5d..b381355 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,18 @@

<fsas>
<fsa>
+               <id>736</id>
+               <date>2011-08-23</date>
+               <author>Miklos Vajna</author>
+               <package>roundcube</package>
+               <vulnerable>0.3-2</vulnerable>
+               <unaffected>0.5.4-1mores1</unaffected>
+               <bts>http://bugs.frugalware.org/task/4554</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2937</cve>
+               <desc>A vulnerability has been reported in RoundCube Webmail, 
which can be exploited by malicious people to conduct cross-site scripting 
attacks.
+Input passed via the "_mbox" parameter to various scripts is not properly 
sanitised before being returned to the user. This can be exploited to execute 
arbitrary HTML and script code in a user's browser session in context of an 
affected site.</desc>
+       </fsa>
+       <fsa>
<id>735</id>
<date>2011-08-22</date>
<author>Miklos Vajna</author>
_______________________________________________
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to