aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2007-05-22 04:08:21 +0800
committermiwi <miwi@FreeBSD.org>2007-05-22 04:08:21 +0800
commit1e4508e0c5df77e3929b09d9293fbf4041fb45fb (patch)
treeb3a3c1453c7bf1e70a72e74583e27b7357f2c242
parent52aefdbc986a143ae0df8a222728280b49a1cb3a (diff)
downloadfreebsd-ports-gnome-1e4508e0c5df77e3929b09d9293fbf4041fb45fb.tar.gz
freebsd-ports-gnome-1e4508e0c5df77e3929b09d9293fbf4041fb45fb.tar.zst
freebsd-ports-gnome-1e4508e0c5df77e3929b09d9293fbf4041fb45fb.zip
- Document squirrelmail -- Cross site scripting in HTML filter
Approved by: portmgr (marcus)
-rw-r--r--security/vuxml/vuln.xml30
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index cae989503df0..286980a686ca 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,36 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="0e575ed3-0764-11dc-a80b-0016179b2dd5">
+ <topic>squirrelmail -- Cross site scripting in HTML filter</topic>
+ <affects>
+ <package>
+ <name>squirrelmail</name>
+ <range><ge>1.4.0</ge><lt>1.4.9a</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The SquirrelMail developers report:</p>
+ <blockquote cite="http://www.squirrelmail.org/security/issue/2007-05-09">
+ <p>Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in
+ SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary
+ web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2)
+ various non-ASCII character sets that are not properly filtered when viewed
+ with Microsoft Internet Explorer.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2007-1262</cvename>
+ <url>http://www.squirrelmail.org/security/issue/2007-05-09</url>
+ </references>
+ <dates>
+ <discovery>2007-05-09</discovery>
+ <entry>2007-05-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="4cb9c513-03ef-11dc-a51d-0019b95d4f14">
<topic>png -- DoS crash vulnerability</topic>
<affects>