Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Backports:SLE-15-SP1:Update
patchinfo.16612
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.16612
<patchinfo incident="16612"> <issue tracker="cve" id="2020-18671"/> <issue tracker="cve" id="2020-35730"/> <issue tracker="cve" id="2020-18670"/> <issue tracker="bnc" id="1187706">VUL-0: CVE-2020-18671: roundcubemail: Cross Site Scripting (XSS) vulnerability via smtp config in /installer/test.php</issue> <issue tracker="bnc" id="1187707">VUL-0: CVE-2020-18670: roundcubemail: Cross Site Scripting (XSS) vulneraibility via database host and user in /installer/test.php</issue> <issue tracker="bnc" id="1180399">VUL 0: CVE-2020-35730: roundcubemail: cross-site scripting (XSS) vulnerability via HTML or plain text messages with malicious content</issue> <packager>lrupp</packager> <rating>important</rating> <category>security</category> <summary>Security update for roundcubemail</summary> <description>This update for roundcubemail fixes the following issues: Upgrade to version 1.3.16 This is a security update to the LTS version 1.3. It fixes a recently reported stored cross-site scripting (XSS) vulnerability via HTML or plain text messages with malicious content. References: - CVE-2020-18670: Cross Site Scripting (XSS) vulneraibility via database host and user in /installer/test.php (boo#1187707) - CVE-2020-18671: Cross Site Scripting (XSS) vulnerability via smtp config in /installer/test.php (boo#1187706) - CVE-2020-35730: cross-site scripting (XSS) vulnerability via HTML or plain text messages with malicious content (boo#1180399) </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor