Raphael Geissert schrieb am Thursday, den 20. November 2008:
> retitle 504894 CVE-2008-5028: Nagios "cmd.cgi" cross-site request forgery
> thanks
>
> 2008/11/7 Raphael Geissert <[EMAIL PROTECTED]>:
> [...]
> >
> > A proposed patch is available at [2].
> >
> > If you fix the vulnerability please a
retitle 504894 CVE-2008-5028: Nagios "cmd.cgi" cross-site request forgery
thanks
2008/11/7 Raphael Geissert <[EMAIL PROTECTED]>:
[...]
>
> A proposed patch is available at [2].
>
> If you fix the vulnerability please also make sure to include the SA id (or
> the CVE id when one is assigned) in the
Hi,
what's the status?
Regards,
Daniel
--
Address:Daniel Baumann, Burgunderstrasse 3, CH-4562 Biberist
Email: [EMAIL PROTECTED]
Internet: http://people.panthera-systems.net/~daniel-baumann/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe".
Package: nagios3
Severity: grave
Tags: security patch
Hi,
The following SA (Secunia Advisory) id was published for Nagios.
SA32610[1]:
> Andreas Ericsson has discovered a vulnerability in Nagios, which can be
> exploited by malicious people to conduct cross-site request forgery
> attacks.
>
> Th
4 matches
Mail list logo