Date: Mon, 13 Jul 2015 02:11:04 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 200750] [NEW PORT] www/sogo: Groupware server with a focus on scalability and open standards Message-ID: <bug-200750-13-0JTku3AIXy@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-200750-13@https.bugs.freebsd.org/bugzilla/> References: <bug-200750-13@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200750 Jason Unovitch <jason.unovitch@gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jason.unovitch@gmail.com --- Comment #3 from Jason Unovitch <jason.unovitch@gmail.com> --- FYI, CVE-2015-5395 -- No CSRF token - requests can be forged http://www.openwall.com/lists/oss-security/2015/07/07/10 http://www.sogo.nu/bugs/view.php?id=3246 This should be addressed before a known vulnerable version gets committed. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-200750-13-0JTku3AIXy>