diff options
author | miwi <miwi@FreeBSD.org> | 2007-05-22 04:08:21 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2007-05-22 04:08:21 +0800 |
commit | 1e4508e0c5df77e3929b09d9293fbf4041fb45fb (patch) | |
tree | b3a3c1453c7bf1e70a72e74583e27b7357f2c242 | |
parent | 52aefdbc986a143ae0df8a222728280b49a1cb3a (diff) | |
download | freebsd-ports-gnome-1e4508e0c5df77e3929b09d9293fbf4041fb45fb.tar.gz freebsd-ports-gnome-1e4508e0c5df77e3929b09d9293fbf4041fb45fb.tar.zst freebsd-ports-gnome-1e4508e0c5df77e3929b09d9293fbf4041fb45fb.zip |
- Document squirrelmail -- Cross site scripting in HTML filter
Approved by: portmgr (marcus)
-rw-r--r-- | security/vuxml/vuln.xml | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index cae989503df0..286980a686ca 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,36 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="0e575ed3-0764-11dc-a80b-0016179b2dd5"> + <topic>squirrelmail -- Cross site scripting in HTML filter</topic> + <affects> + <package> + <name>squirrelmail</name> + <range><ge>1.4.0</ge><lt>1.4.9a</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The SquirrelMail developers report:</p> + <blockquote cite="http://www.squirrelmail.org/security/issue/2007-05-09"> + <p>Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in + SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary + web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) + various non-ASCII character sets that are not properly filtered when viewed + with Microsoft Internet Explorer.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2007-1262</cvename> + <url>http://www.squirrelmail.org/security/issue/2007-05-09</url> + </references> + <dates> + <discovery>2007-05-09</discovery> + <entry>2007-05-21</entry> + </dates> + </vuln> + <vuln vid="4cb9c513-03ef-11dc-a51d-0019b95d4f14"> <topic>png -- DoS crash vulnerability</topic> <affects> |