Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 15 Dec 2015 17:54:22 +0200
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Subject: CVE-2015-8562: Joomla remote code execution vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Joomla fixed remote code execution vulnerability, which affects versions 1.5.0
through 3.4.5. Please see following URLs for details:

https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html
https://www.joomla.org/announcements/release-news/5641-joomla-3-4-6-released.html
https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html

- -- 
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=QCN1
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.