diff options
author | Remko Lodder <remko@FreeBSD.org> | 2006-02-15 12:33:36 +0000 |
---|---|---|
committer | Remko Lodder <remko@FreeBSD.org> | 2006-02-15 12:33:36 +0000 |
commit | 7021a772efd695cf4585a76614a54d0dacc250a4 (patch) | |
tree | 0316e2e9e96e22e47ec81941df62657964536003 | |
parent | 11103e872edd5115c4aefae27721a937b20d6b4a (diff) |
Notes
-rw-r--r-- | security/vuxml/vuln.xml | 54 |
1 files changed, 54 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index f094118b185a..44e5b62f4d26 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,60 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="12f9d9e9-9e1e-11da-b410-000e0c2e438a"> + <topic>phpicalendar -- cross site scripting vulnerability</topic> + <affects> + <package> + <name>phpicalendar</name> + <range><lt>2.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Francesco Ongaro reports that phpicalendar is vulnerable for + a cross site scripting attack. The vulnerability is caused by + improper validation of the index.php file allowing attackers + to include an arbitrary file with the .php extension</p> + </body> + </description> + <references> + <bid>15193</bid> + <cvename>CVE-2005-3366</cvename> + <url>http://www.ush.it/2005/10/25/php-icalendar-css/</url> + </references> + <dates> + <discovery>2005-10-25</discovery> + <entry>2006-02-15</entry> + </dates> + </vuln> + + <vuln vid="f1f163ce-9e09-11da-b410-000e0c2e438a"> + <topic>phpicalendar -- file disclosure vulnerability</topic> + <affects> + <package> + <name>phpicalendar</name> + <range><lt>2.21</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The phpicalendar team reports that there is an + unspecified vulnerability within phpicalendar. This + seems to be a file disclosure vulnerability caused by + improper checking of the template parsing function. + This would allow an attacker to disclose any file + readable by the user under which the webserver runs.</p> + </body> + </description> + <references> + <url>http://phpicalendar.net/forums/viewtopic.php?t=396</url> + </references> + <dates> + <discovery>2006-02-08</discovery> + <entry>2006-02-15</entry> + </dates> + </vuln> + <vuln vid="dfb71c00-9d44-11da-8c1d-000e0c2e438a"> <topic>FreeBSD -- Infinite loop in SACK handling</topic> <affects> |