diff options
author | niels <niels@FreeBSD.org> | 2010-05-06 03:12:36 +0800 |
---|---|---|
committer | niels <niels@FreeBSD.org> | 2010-05-06 03:12:36 +0800 |
commit | f84028328bca3e9b445fa7dddcbcefd7a737ec1b (patch) | |
tree | 8ed780550b01207a2cfc2d1cb6955b5bb6f0913b /security | |
parent | eb4b99fc5c327f384f947b0febda8b05ee5f750b (diff) | |
download | freebsd-ports-gnome-f84028328bca3e9b445fa7dddcbcefd7a737ec1b.tar.gz freebsd-ports-gnome-f84028328bca3e9b445fa7dddcbcefd7a737ec1b.tar.zst freebsd-ports-gnome-f84028328bca3e9b445fa7dddcbcefd7a737ec1b.zip |
- Added mediawiki and lxr vulnerabilities
- Fixed vlc topic format (lower case, portname first)
PR: ports/146337
Approved by: itetcu (mentor, implicit)
Security: http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-April/000090.html
Security: http://sourceforge.net/mailarchive/message.php?msg_name=E1NS2s4-0001PE-F2%403bkjzd1.ch3.sourceforge.com
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 69 |
1 files changed, 68 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b2cc72de74c0..9f8fcb35dc2d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,8 +34,74 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="694da5b4-5877-11df-8d80-0015587e2cc1"> + <topic>mediawiki -- authenticated CSRF vulnerability</topic> + <affects> + <package> + <name>mediawiki</name> + <range><lt>1.15.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A MediaWiki security announcement reports:</p> + <blockquote cite="http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-April/000090.html"> + <p>MediaWiki was found to be vulnerable to login CSRF. + An attacker who controls a user account on the target + wiki can force the victim to log in as the attacker, + via a script on an external website.</p> + <p>If the wiki is configured to allow user scripts, say + with "$wgAllowUserJs = true" in LocalSettings.php, then + the attacker can proceed to mount a phishing-style + attack against the victim to obtain their password. </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2010-1150</cvename> + <url>http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-April/000090.html</url> + <url>https://bugzilla.wikimedia.org/show_bug.cgi?id=23076</url> + </references> + <dates> + <discovery>2010-04-07</discovery> + <entry>2010-05-05</entry> + </dates> + </vuln> + + <vuln vid="0491d15a-5875-11df-8d80-0015587e2cc1"> + <topic>lxr -- multiple XSS vulnerabilities</topic> + <affects> + <package> + <name>lxr</name> + <range><le>0.9.6</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Dan Rosenberg reports:</p> + <blockquote cite="http://sourceforge.net/mailarchive/message.php?msg_name=E1NS2s4-0001PE-F2%403bkjzd1.ch3.sourceforge.com"> + <p>There are several cross-site scripting vulnerabilities + in LXR. These vulnerabilities could allow an attacker + to execute scripts in a user's browser, steal cookies + associated with vulnerable domains, redirect the user + to malicious websites, etc.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2009-4497</cvename> + <freebsdpr>ports/146337</freebsdpr> + <url>http://secunia.com/advisories/38117</url> + <url>http://sourceforge.net/mailarchive/message.php?msg_name=E1NS2s4-0001PE-F2%403bkjzd1.ch3.sourceforge.com</url> + </references> + <dates> + <discovery>2010-01-05</discovery> + <entry>2010-05-05</entry> + </dates> + </vuln> + <vuln vid="752ce039-5242-11df-9139-00242b513d7c"> - <topic>Unintended code execution with specially crafted data in VLC</topic> + <topic>vlc -- unintended code execution with specially crafted data</topic> <affects> <package> <name>vlc</name> @@ -58,6 +124,7 @@ Note: Please add new entries to the beginning of this file. <dates> <discovery>2010-04-19</discovery> <entry>2010-05-01</entry> + <modified>2010-05-05</modified> </dates> </vuln> |