diff options
author | miwi <miwi@FreeBSD.org> | 2013-03-10 12:03:12 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2013-03-10 12:03:12 +0800 |
commit | 1d256ef45a44a9ae12eec3116e3143dbfba48b38 (patch) | |
tree | 17ea520b2a153ca1a5c87c206a952e524c74e0d3 /security/vuxml | |
parent | a4ed759a2c33014a6d42ae393118cfcde2b648a2 (diff) | |
download | freebsd-ports-gnome-1d256ef45a44a9ae12eec3116e3143dbfba48b38.tar.gz freebsd-ports-gnome-1d256ef45a44a9ae12eec3116e3143dbfba48b38.tar.zst freebsd-ports-gnome-1d256ef45a44a9ae12eec3116e3143dbfba48b38.zip |
- Fix previous entry
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 16 |
1 files changed, 10 insertions, 6 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index a4bb353715e3..072b77dc8e72 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -64,12 +64,16 @@ Note: Please add new entries to the beginning of this file. <p>Pidgin reports:</p> <blockquote cite="https://developer.pidgin.im/wiki/ChangeLog"> <p>libpurple</p> - <p> -- Fix a crash when receiving UPnP responses with abnormally long values. (CVE-2013-0274)</p> + <p>Fix a crash when receiving UPnP responses with abnormally long values.</p> <p>MXit</p> - <p> -- Fix two bugs where a remote MXit user could possibly specify a local file path to be written to. (CVE-2013-0271)</p> - <p> -- Fix a bug where the MXit server or a man-in-the-middle could potentially send specially crafted data that could overflow a buffer and lead to a crash or remote code execution. (CVE-2013-0272)</p> + <p>Fix two bugs where a remote MXit user could possibly specify a local file + path to be written to.</p> + <p>Fix a bug where the MXit server or a man-in-the-middle could potentially + send specially crafted data that could overflow a buffer and lead to a crash + or remote code execution.</p> <p>Sametime</p> - <p> -- Fix a crash in Sametime when a malicious server sends us an abnormally long user ID. (CVE-2013-0273)</p> + <p>Fix a crash in Sametime when a malicious server sends us an abnormally long + user ID.</p> </blockquote> </body> </description> @@ -416,8 +420,8 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Mark Evans reports:</p> <blockquote cite="https://groups.google.com/forum/?fromgroups=#!topic/dragonfly-users/3c3WIU3VQTo"> - <p>Unfortunately there is a security vulnerability in Dragonfly when - used with Rails which would potentially allow an attacker to run + <p>Unfortnately there is a security vulnerability in Dragonfly when + used with Rails which would potentially allow an attacker to run arbitrary code on a host machine using carefully crafted requests. </p> |