diff options
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index c819738d86f7..bb5b6f126c15 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,41 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="cc47fafe-f823-11dd-94d9-0030843d3802"> + <topic>typo3 -- cross-site scripting and information disclosure</topic> + <affects> + <package> + <name>typo3</name> + <range><lt>4.2.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="http://secunia.com/advisories/33829/"> + <p>Some vulnerabilities have been reported in Typo3, which can be + exploited by malicious people to conduct cross-site scripting attacks + and disclose sensitive information.</p> + <p>Input passed via unspecified fields to the backend user interface + is not properly sanitised before being returned to the user. This can + be exploited to execute arbitrary HTML and script code in a user's + browser session in context of an affected site.</p> + <p>An error in the "jumpUrl" mechanism can be exploited to read + arbitrary files from local resources by disclosing a hash secret used + to restrict file access.</p> + </blockquote> + </body> + </description> + <references> + <url>http://secunia.com/advisories/33829/</url> + <url>http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002/</url> + </references> + <dates> + <discovery>2009-02-10</discovery> + <entry>2009-02-11</entry> + </dates> + </vuln> + <vuln vid="a89b76a7-f6bd-11dd-94d9-0030843d3802"> <topic>amaya -- multiple buffer overflow vulnerabilities</topic> <affects> |