aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorsat <sat@FreeBSD.org>2006-10-02 19:50:48 +0800
committersat <sat@FreeBSD.org>2006-10-02 19:50:48 +0800
commit03d3f73308d259f0601737a194bdcce536436851 (patch)
tree441d53db190df718ae915787ef82a39460e6d4ed /security/vuxml
parent7a829cf5886787aeae5bbf5eaf148ba44d228d67 (diff)
downloadfreebsd-ports-gnome-03d3f73308d259f0601737a194bdcce536436851.tar.gz
freebsd-ports-gnome-03d3f73308d259f0601737a194bdcce536436851.tar.zst
freebsd-ports-gnome-03d3f73308d259f0601737a194bdcce536436851.zip
- Document Search Unspecified XSS in MT
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 065ba2dc7c1e..4a49e46fad9d 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,40 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="350a5bd9-520b-11db-8f1a-000a48049292">
+ <topic>MT -- Search Unspecified XSS</topic>
+ <affects>
+ <package>
+ <name>MT</name>
+ <range><ge>3.3</ge><lt>3.33</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Secunia reports:</p>
+ <blockquote cite="http://secunia.com/advisories/22109">
+ <p>Arai has reported a vulnerability in Movable Type and
+ Movable Type Enterprise, which can be exploited by
+ malicious people to conduct cross-site scripting attacks.</p>
+ <p>Some unspecified input passed via the search functionality
+ isn't properly sanitised before being returned to the user.
+ This can be exploited to execute arbitrary HTML and script
+ code in a user's browser session in context of an affected
+ site.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2006-5080</cvename>
+ <url>http://secunia.com/advisories/22109</url>
+ <url>http://www.sixapart.com/movabletype/news/2006/09/mt_333-mte_103_updates.html</url>
+ </references>
+ <dates>
+ <discovery>2006-09-26</discovery>
+ <entry>2006-10-02</entry>
+ </dates>
+ </vuln>
+
<vuln vid="19b17ab4-51e0-11db-a5ae-00508d6a62df">
<topic>phpmyadmin -- XSRF vulnerabilities</topic>
<affects>