cumin is vulnerable to cross-site scripting. An authorized user on the local network could use these flaws to perform cross-site scripting attacks against MRG Management Console users. Note: Refer to the MRG Messaging User Guide for information on configuring authentication and authorization in the MRG Messaging broker.
rhn.redhat.com/errata/RHSA-2012-0476.html
rhn.redhat.com/errata/RHSA-2012-0477.html
secunia.com/advisories/48810
secunia.com/advisories/48829
www.securityfocus.com/bid/53000
www.securitytracker.com/id?1026921
access.redhat.com/errata/RHSA-2012:0476
access.redhat.com/errata/RHSA-2012:0477
access.redhat.com/security/cve/CVE-2012-1575
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/attachment.cgi?id=571986
bugzilla.redhat.com/show_bug.cgi?id=805712
docs.redhat.com/docs/en-US/index.html
exchange.xforce.ibmcloud.com/vulnerabilities/74844
fedorahosted.org/pipermail/cumin-developers/2012-March/000796.html