diff options
author | simon <simon@FreeBSD.org> | 2006-11-11 23:56:04 +0800 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2006-11-11 23:56:04 +0800 |
commit | ce17867ad5e6b692681e871748ce98e8ceece3f6 (patch) | |
tree | 745d60e082a0d2c0597bc1488527df5d5d539789 /security/vuxml | |
parent | 4fa338e4fb39439bbca8def8fe5e823f64850972 (diff) | |
download | freebsd-ports-gnome-ce17867ad5e6b692681e871748ce98e8ceece3f6.tar.gz freebsd-ports-gnome-ce17867ad5e6b692681e871748ce98e8ceece3f6.tar.zst freebsd-ports-gnome-ce17867ad5e6b692681e871748ce98e8ceece3f6.zip |
Add bugzilla -- multiple vulnerabilities entry.
Update earleir bugzilla entry with better topic, add ja-bugzilla as
also potentially vulnerable (thought the version currently in
ja-bugzilla isn't), and add more references.
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 59 |
1 files changed, 57 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index cc46d9bc98df..3438b3a74569 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,54 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="6d68618a-7199-11db-a2ad-000c6ec775d9"> + <topic>bugzilla -- multiple vulnerabilities</topic> + <affects> + <package> + <name>bugzilla</name> + <name>ja-bugzilla</name> + <range><gt>2.*</gt><lt>2.22.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A Bugzilla Security Advisory reports:</p> + <blockquote cite="http://www.bugzilla.org/security/2.18.5/"> + <ul> + <li>Sometimes the information put into the <h1> and + <h2> tags in Bugzilla was not properly escaped, + leading to a possible XSS vulnerability.</li> + <li>Bugzilla administrators were allowed to put raw, + unfiltered HTML into many fields in Bugzilla, leading to + a possible XSS vulnerability. Now, the HTML allowed in + those fields is limited.</li> + <li>attachment.cgi could leak the names of private + attachments</li> + <li>The "deadline" field was visible in the XML format of + a bug, even to users who were not a member of the + "timetrackinggroup."</li> + <li>A malicious user could pass a URL to an admin, and + make the admin delete or change something that he had + not intended to delete or change.</li> + <li>It is possible to inject arbitrary HTML into the + showdependencygraph.cgi page, allowing for a cross-site + scripting attack.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2006-5453</cvename> + <cvename>CVE-2006-5454</cvename> + <cvename>CVE-2006-5455</cvename> + <url>http://www.bugzilla.org/security/2.18.5/</url> + </references> + <dates> + <discovery>2006-10-15</discovery> + <entry>2006-11-11</entry> + </dates> + </vuln> + <vuln vid="92442c4b-6f4a-11db-bd28-0012f06707f0"> <topic>Imlib2 -- multiple image file processing vulnerabilities</topic> <affects> @@ -6493,11 +6541,12 @@ Note: Please add new entries to the beginning of this file. </vuln> <vuln vid="46f7b598-a781-11da-906a-fde5cdde365e"> - <topic>bugzilla -- multiple vulnerability</topic> + <topic>bugzilla -- multiple vulnerabilities</topic> <affects> <package> <name>bugzilla</name> - <range><ge>2.*</ge><lt>2.20.1</lt></range> + <name>ja-bugzilla</name> + <range><ge>2.17.1</ge><lt>2.20.1</lt></range> </package> </affects> <description> @@ -6509,11 +6558,17 @@ Note: Please add new entries to the beginning of this file. </body> </description> <references> + <cvename>CVE-2006-2420</cvename> + <cvename>CVE-2006-0916</cvename> + <cvename>CVE-2006-0915</cvename> + <cvename>CVE-2006-0914</cvename> + <cvename>CVE-2006-0913</cvename> <url>http://www.bugzilla.org/security/2.18.4/</url> </references> <dates> <discovery>2006-02-20</discovery> <entry>2006-02-27</entry> + <modified>2006-11-11</modified> </dates> </vuln> |