aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorflo <flo@FreeBSD.org>2013-12-17 07:37:23 +0800
committerflo <flo@FreeBSD.org>2013-12-17 07:37:23 +0800
commit503304365915235f12d74c09cedf2a80c59648fa (patch)
tree16d426b58b7a2f33c70e1593c5d245cb8183d8e4 /security
parentcd1fc1a7397862ae533b539dedf1dce988536bdf (diff)
downloadfreebsd-ports-gnome-503304365915235f12d74c09cedf2a80c59648fa.tar.gz
freebsd-ports-gnome-503304365915235f12d74c09cedf2a80c59648fa.tar.zst
freebsd-ports-gnome-503304365915235f12d74c09cedf2a80c59648fa.zip
- update to 2.8.4
- add stage support Security: 3b86583a-66a7-11e3-868f-0025905a4771
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml30
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index a06d1c1e0426..00e29bf9e8ae 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,36 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3b86583a-66a7-11e3-868f-0025905a4771">
+ <topic>phpmyfaq -- arbitrary PHP code execution vulnerability</topic>
+ <affects>
+ <package>
+ <name>phpmyfaq</name>
+ <range><lt>2.8.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The phpMyFAQ team reports:</p>
+ <blockquote cite="http://www.phpmyfaq.de/advisory_2013-11-26.php">
+ <p>Secunia noticed while analysing the advisory that authenticated
+ users with "Right to add attachments" are able to exploit an already
+ publicly known issue in the bundled Ajax File Manager of phpMyFAQ version
+ 2.8.3, which leads to arbitrary PHP code execution for authenticated
+ users with the permission "Right to add attachments".</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.phpmyfaq.de/advisory_2013-11-26.php</url>
+ <url>http://en.securitylab.ru/lab/PT-2013-41</url>
+ </references>
+ <dates>
+ <discovery>2013-11-26</discovery>
+ <entry>2013-12-16</entry>
+ </dates>
+ </vuln>
+
<vuln vid="44d0f8dc-6607-11e3-bb11-0025900931f8">
<topic>zabbix -- shell command injection vulnerability</topic>
<affects>