diff options
author | miwi <miwi@FreeBSD.org> | 2009-05-16 20:51:24 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2009-05-16 20:51:24 +0800 |
commit | 4f5d0500c57f36fd5aa408788daef231024d5369 (patch) | |
tree | 10d68b690de4eacc1d5f3fd57aa333eda6edade2 /security/vuxml | |
parent | 0ed94f4bba05a8c1b4d3c949eb1fa5f74da2fa51 (diff) | |
download | freebsd-ports-gnome-4f5d0500c57f36fd5aa408788daef231024d5369.tar.gz freebsd-ports-gnome-4f5d0500c57f36fd5aa408788daef231024d5369.tar.zst freebsd-ports-gnome-4f5d0500c57f36fd5aa408788daef231024d5369.zip |
- Rework previus entry
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 16 |
1 files changed, 9 insertions, 7 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 02ae3ea62eb4..79acf1b710c5 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -35,7 +35,7 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> <vuln vid="4a638895-41b7-11de-b1cc-00219b0fc4d8"> - <topic>mod_perl -- cross site scripting in Apache::Status</topic> + <topic>mod_perl -- cross site scripting</topic> <affects> <package> <name>mod_perl</name> @@ -48,22 +48,24 @@ Note: Please add new entries to the beginning of this file. </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>US Cert reports:</p> + <p>secunia reports:</p> <blockquote - cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0796"> - <p>Cross-site scripting (XSS) vulnerability in Status.pm in - Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for - the Apache HTTP Server, when /perl-status is accessible, allows - remote attackers to inject arbitrary web script or HTML via the URI.</p> + cite="http://secunia.com/advisories/3459796"> + <p>Certain input passed to the "Apache::Status" and "Apache2::Status" + modules is not properly sanitised before being returned to the user. + This can be exploited to execute arbitrary HTML and script code in a + user's browser session in context of an affected website.</p> </blockquote> </body> </description> <references> + <cvename>CVE-2009-0796</cvename> <url>http://secunia.com/advisories/34597</url> </references> <dates> <discovery>2009-02-28</discovery> <entry>2009-05-16</entry> + <modified>2009-05-16</modified> </dates> </vuln> |