Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 15 Dec 2015 17:54:22 +0200
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Subject: CVE-2015-8562: Joomla remote code execution vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Joomla fixed remote code execution vulnerability, which affects versions 1.5.0
through 3.4.5. Please see following URLs for details:

https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html
https://www.joomla.org/announcements/release-news/5641-joomla-3-4-6-released.html
https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html

- -- 
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=QCN1
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ