aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorswills <swills@FreeBSD.org>2013-10-19 11:40:48 +0800
committerswills <swills@FreeBSD.org>2013-10-19 11:40:48 +0800
commit4c1390542d608646db47341fca429defdc6a9b0a (patch)
tree21851fa4fa3e1101f7ab0f20c641f4466cd2d95a /security
parent1ee01a6d0c44163fac8940fa09cd32e90b8b74c5 (diff)
downloadfreebsd-ports-gnome-4c1390542d608646db47341fca429defdc6a9b0a.tar.gz
freebsd-ports-gnome-4c1390542d608646db47341fca429defdc6a9b0a.tar.zst
freebsd-ports-gnome-4c1390542d608646db47341fca429defdc6a9b0a.zip
- Note issues with WordPress before 3.6.1
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml41
1 files changed, 41 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index ae06f89b2d62..4a4e50211bde 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,47 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="043d3a78-f245-4938-9bc7-3d0d35dd94bf">
+ <topic>wordpress -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>zh-wordpress-zh_CN</name>
+ <name>zh-wordpress-zh_TW</name>
+ <name>de-wordpress</name>
+ <name>ja-wordpress</name>
+ <name>ru-wordpress</name>
+ <name>wordpress</name>
+ <range><lt>3.6.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The wordpress development team reports:</p>
+ <blockquote cite="http://wordpress.org/news/2013/09/wordpress-3-6-1/">
+ <ul>
+ <li>Block unsafe PHP unserialization that could occur in limited
+ situations and setups, which can lead to remote code
+ execution.</li>
+ <li>Prevent a user with an Author role, using a specially crafted
+ request, from being able to create a post "written by" another
+ user.</li>
+ <li>Fix insufficient input validation that could result in
+ redirecting or leading a user to another website.</li>
+ </ul>
+ <p>Additionally, we've adjusted security restrictions around file
+ uploads to mitigate the potential for cross-site scripting.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://wordpress.org/news/2013/09/wordpress-3-6-1/</url>
+ </references>
+ <dates>
+ <discovery>2013-09-11</discovery>
+ <entry>2013-10-19</entry>
+ </dates>
+ </vuln>
+
<vuln vid="206f9826-a06d-4927-9a85-771c37010b32">
<topic>node.js -- DoS Vulnerability</topic>
<affects>