diff options
author | swills <swills@FreeBSD.org> | 2013-10-19 11:40:48 +0800 |
---|---|---|
committer | swills <swills@FreeBSD.org> | 2013-10-19 11:40:48 +0800 |
commit | 4c1390542d608646db47341fca429defdc6a9b0a (patch) | |
tree | 21851fa4fa3e1101f7ab0f20c641f4466cd2d95a /security | |
parent | 1ee01a6d0c44163fac8940fa09cd32e90b8b74c5 (diff) | |
download | freebsd-ports-gnome-4c1390542d608646db47341fca429defdc6a9b0a.tar.gz freebsd-ports-gnome-4c1390542d608646db47341fca429defdc6a9b0a.tar.zst freebsd-ports-gnome-4c1390542d608646db47341fca429defdc6a9b0a.zip |
- Note issues with WordPress before 3.6.1
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 41 |
1 files changed, 41 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index ae06f89b2d62..4a4e50211bde 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,47 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="043d3a78-f245-4938-9bc7-3d0d35dd94bf"> + <topic>wordpress -- multiple vulnerabilities</topic> + <affects> + <package> + <name>zh-wordpress-zh_CN</name> + <name>zh-wordpress-zh_TW</name> + <name>de-wordpress</name> + <name>ja-wordpress</name> + <name>ru-wordpress</name> + <name>wordpress</name> + <range><lt>3.6.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The wordpress development team reports:</p> + <blockquote cite="http://wordpress.org/news/2013/09/wordpress-3-6-1/"> + <ul> + <li>Block unsafe PHP unserialization that could occur in limited + situations and setups, which can lead to remote code + execution.</li> + <li>Prevent a user with an Author role, using a specially crafted + request, from being able to create a post "written by" another + user.</li> + <li>Fix insufficient input validation that could result in + redirecting or leading a user to another website.</li> + </ul> + <p>Additionally, we've adjusted security restrictions around file + uploads to mitigate the potential for cross-site scripting.</p> + </blockquote> + </body> + </description> + <references> + <url>http://wordpress.org/news/2013/09/wordpress-3-6-1/</url> + </references> + <dates> + <discovery>2013-09-11</discovery> + <entry>2013-10-19</entry> + </dates> + </vuln> + <vuln vid="206f9826-a06d-4927-9a85-771c37010b32"> <topic>node.js -- DoS Vulnerability</topic> <affects> |