diff options
author | flo <flo@FreeBSD.org> | 2013-12-17 07:37:23 +0800 |
---|---|---|
committer | flo <flo@FreeBSD.org> | 2013-12-17 07:37:23 +0800 |
commit | 503304365915235f12d74c09cedf2a80c59648fa (patch) | |
tree | 16d426b58b7a2f33c70e1593c5d245cb8183d8e4 /security | |
parent | cd1fc1a7397862ae533b539dedf1dce988536bdf (diff) | |
download | freebsd-ports-gnome-503304365915235f12d74c09cedf2a80c59648fa.tar.gz freebsd-ports-gnome-503304365915235f12d74c09cedf2a80c59648fa.tar.zst freebsd-ports-gnome-503304365915235f12d74c09cedf2a80c59648fa.zip |
- update to 2.8.4
- add stage support
Security: 3b86583a-66a7-11e3-868f-0025905a4771
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index a06d1c1e0426..00e29bf9e8ae 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,36 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3b86583a-66a7-11e3-868f-0025905a4771"> + <topic>phpmyfaq -- arbitrary PHP code execution vulnerability</topic> + <affects> + <package> + <name>phpmyfaq</name> + <range><lt>2.8.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The phpMyFAQ team reports:</p> + <blockquote cite="http://www.phpmyfaq.de/advisory_2013-11-26.php"> + <p>Secunia noticed while analysing the advisory that authenticated + users with "Right to add attachments" are able to exploit an already + publicly known issue in the bundled Ajax File Manager of phpMyFAQ version + 2.8.3, which leads to arbitrary PHP code execution for authenticated + users with the permission "Right to add attachments".</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.phpmyfaq.de/advisory_2013-11-26.php</url> + <url>http://en.securitylab.ru/lab/PT-2013-41</url> + </references> + <dates> + <discovery>2013-11-26</discovery> + <entry>2013-12-16</entry> + </dates> + </vuln> + <vuln vid="44d0f8dc-6607-11e3-bb11-0025900931f8"> <topic>zabbix -- shell command injection vulnerability</topic> <affects> |