1
Candidate: CVE-2015-5381
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5381
5
http://www.openwall.com/lists/oss-security/2015/07/06/10
6
http://trac.roundcube.net/ticket/1490417
8
Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in
9
Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to inject
10
arbitrary web script or HTML via the _mbox parameter to the default URI.
14
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791643
20
upstream_roundcube: needs-triage
21
precise_roundcube: ignored (reached end-of-life)
22
precise/esm_roundcube: DNE (precise was needed)
23
trusty_roundcube: needed
24
utopic_roundcube: ignored (reached end-of-life)
25
vivid_roundcube: ignored (reached end-of-life)
26
vivid/stable-phone-overlay_roundcube: DNE
27
vivid/ubuntu-core_roundcube: DNE
28
wily_roundcube: ignored (reached end-of-life)
29
xenial_roundcube: needed
30
yakkety_roundcube: ignored (reached end-of-life)
31
zesty_roundcube: ignored (reached end-of-life)
32
artful_roundcube: needed
33
bionic_roundcube: needs-triage
34
devel_roundcube: needs-triage