Best Plesk Takeaways from my first WCEU – Plesk Stories
The post Best Plesk Takeaways from my first WCEU – Plesk Stories appeared first on Plesk.
The post Best Plesk Takeaways from my first WCEU – Plesk Stories appeared first on Plesk.
Inadequate escaping leads to XSS vulnerability in com_media.
Joomla! CMS versions 3.2.0 through 3.2.4 and 3.3.0 through 3.3.3
Upgrade to version 3.2.5 or 3.3.4
The JSST at the Joomla! Security Center.
(May 21) lxml could allow cross-site scripting (XSS) attacks.
Inadequate escaping leads to XSS vulnerability in com_contact.
Joomla! CMS versions 3.1.2 through 3.2.2
Upgrade to version 3.2.3
The JSST at the Joomla! Security Center.
Inadequate escaping leads to XSS vulnerability.
Joomla! CMS versions 2.5.18 and earlier 2.5.x versions, 3.2.2 and earlier 3.x versions
Upgrade to version 2.5.19 or 3.2.3
The JSST at the Joomla! Security Center.
Inadequate filtering leads to XSS vulnerability in com_contact.
Joomla! version 2.5.14 and earlier 2.5.x versions; and version 3.1.5 and earlier 3.0.x versions.
Upgrade to version 2.5.16, 3.1.6 or 3.2.
The JSST at the Joomla! Security Center.
Inadequate filtering leads to XSS vulnerability in com_contact.
Joomla! version 2.5.14 and earlier 2.5.x versions; and version 3.1.5 and earlier 3.0.x versions.
Upgrade to version 2.5.15, 3.1.6 or 3.2.
The JSST at the Joomla! Security Center.
Inadequate filtering leads to XSS vulnerability in com_contact, com_weblinks, com_newsfeeds.
Joomla! version 2.5.14 and earlier 2.5.x versions; and version 3.1.5 and earlier 3.0.x versions.
Upgrade to version 2.5.15, 3.1.6 or 3.2.
The JSST at the Joomla! Security Center.
Inadequate filtering leads to XSS vulnerability in highlighter plugin.
Joomla! version 2.5.9 and earlier 2.5.x versions; and version 3.0.2 and earlier 3.0.x versions.
Upgrade to version 2.5.10, 3.1.0 or 3.0.4.
The JSST at the Joomla! Security Center.
[+] MySQL ODBC 5.1.11 driver support has been added
The following bug have been fixed:
[-] XSS vulnerability in Horde IMP has been fixed (CVE-2012-0791)
[-] When admin’s password changing via ch_admin_passwd utility mysqld is running with –skip-grant-tables option
[-] Migration via rsync may fails with “pipe: Too many open files” error
[-] 10.4.4 MU#28 does not set SELinux contexts on /usr/local/psa/handlers/hooks/check-quota handler which causes mail system to go down
[-] XSS injection vulnerability has been fixed in Horda
[-] XSS injection vulnerability has been fixed in Horda
The following bugs have been fixed:
[-] XSS vulnerability in Horde.
The following bugs have been fixed:
[-] XSS vulnerability in Horde.
Security fixes:
[-] XSS injection on backup creation page
[-] XSS injection in “Location” HTTP header
[-] HTTPOnly flag added for the session cookie
Security fixes:
[-] XSS injection on backup creation page
[-] XSS injection in “Location” HTTP header
[-] HTTPOnly flag added for the session cookie
Security fixes:
[-] XSS injection on backup creation page
[-] HTTPOnly flag added for the session cookie
Functional fixes:
[-] ch_admin_passwd can’t stop unlimited mysqld
Security fixes:
[-] XSS injection on backup creation page
[-] XSS injection in “Location” HTTP header
[-] HTTPOnly flag added for the session cookie
Security fixes:
[-] XSS injection on backup creation page
[-] HTTPOnly flag added for the session cookie
Security fixes:
[-] XSS injection on backup creation page
[-] HTTPOnly flag added for the session cookie
Security fixes:
[-] XSS injection on backup creation page
[-] HTTPOnly flag added for the session cookie
Security fixes:
[-] XSS injection on backup creation page
[-] HTTPOnly flag added for the session cookie
Security fixes:
[-] XSS injection on backup creation page
[-] HTTPOnly flag added for the session cookie
Functional fixes:
[-] ch_admin_passwd can’t stop unlimited mysqld
Security fixes:
[-] XSS injection on backup creation page
[-] XSS injection in “Location” HTTP header
[-] HTTPOnly flag added for the session cookie
Security fixes:
[-] XSS injection on backup creation page
[-] HTTPOnly flag added for the session cookie
Security fixes:
[-] XSS injection on backup creation page
[-] HTTPOnly flag added for the session cookie
60 queries. 8.75 mb Memory usage. 0.668 seconds.