View | Details | Raw Unified | Return to bug 223557
Collapse All | Expand All

(-)security/vuxml/vuln.xml (+30 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="f622608c-c53c-11e7-a633-009c02a2ab30">
62
    <topic>roundcube -- file disclosure vulnerability</topic>
63
    <affects>
64
      <package>
65
	<name>roundcube</name>
66
	<range><lt>1.3.3</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>Roundcube reports:</p>
72
	<blockquote cite="https://github.com/roundcube/roundcubemail/releases/tag/1.3.3">
73
	  <p>Roundcube before 1.3.3. contains a file disclosure vulnerability
74
	     caused by insufficient input validation in conjunction with
75
	     file-based attachment plugins, which are used by default. The
76
	     exploit only works with a valid session (for authenticated users).</p>
77
	</blockquote>
78
      </body>
79
    </description>
80
    <references>
81
      <url>https://github.com/roundcube/roundcubemail/issues/6026</url>
82
      <url>https://roundcube.net/news/2017/11/08/security-updates-1.3.3-1.2.7-and-1.1.10</url>
83
      <cvename>CVE-2017-16651</cvename>
84
    </references>
85
    <dates>
86
      <discovery>2017-11-06</discovery>
87
      <entry>2017-11-09</entry>
88
    </dates>
89
  </vuln>
90
61
  <vuln vid="be261737-c535-11e7-8da5-001999f8d30b">
91
  <vuln vid="be261737-c535-11e7-8da5-001999f8d30b">
62
    <topic>asterisk -- Memory/File Descriptor/RTP leak in pjsip session resource</topic>
92
    <topic>asterisk -- Memory/File Descriptor/RTP leak in pjsip session resource</topic>
63
    <affects>
93
    <affects>

Return to bug 223557