| Summary: | net-im/openfire <3.6.0 login.jsp XSS (CVE-2006-7233) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Markus Ullmann (RETIRED) <jokey> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | minor | CC: | humpback, net-im |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://www.igniterealtime.org/issues/browse/JM-629 | ||
| Whiteboard: | B4 [noglsa] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Markus Ullmann (RETIRED)
2008-06-26 09:03:01 UTC
Now that is an unhelpful bug report upstream. At least has a sample now upstream and SVN HEAD is even vulnerable atm Okay, 3.6.0 release fixed http://www.igniterealtime.org/builds/openfire/docs/latest/changelog.html ebuild InCVS Arches, please test and mark stable: =net-im/openfire-3.6.0 Target keywords : "amd64 x86" 3.6.0 works for me on my (live) server Stable on x86 here too amd64 stable Ready for vote, I vote NO. NO too, and closing without GLSA. |