Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 13 Jul 2015 02:11:04 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 200750] [NEW PORT] www/sogo: Groupware server with a focus on scalability and open standards
Message-ID:  <bug-200750-13-0JTku3AIXy@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-200750-13@https.bugs.freebsd.org/bugzilla/>
References:  <bug-200750-13@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=200750

Jason Unovitch <jason.unovitch@gmail.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |jason.unovitch@gmail.com

--- Comment #3 from Jason Unovitch <jason.unovitch@gmail.com> ---
FYI,
CVE-2015-5395 -- No CSRF token - requests can be forged
http://www.openwall.com/lists/oss-security/2015/07/07/10
http://www.sogo.nu/bugs/view.php?id=3246

This should be addressed before a known vulnerable version gets committed.

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-200750-13-0JTku3AIXy>