diff options
author | Matthew Seaman <matthew@FreeBSD.org> | 2012-02-18 15:00:46 +0000 |
---|---|---|
committer | Matthew Seaman <matthew@FreeBSD.org> | 2012-02-18 15:00:46 +0000 |
commit | 37035a72be8e9da734c6d56832c58031c182d0e1 (patch) | |
tree | b449a23ef03ff1dd08bc0fe55cff92a5d454e2e0 /security/vuxml/vuln.xml | |
parent | 7dd10aacc87963dfc084dd6984e9b41c95e55ccc (diff) |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index af42cb30c111..c2afe920dd95 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -47,6 +47,32 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="fdd1c316-5a3d-11e1-8d3e-e0cb4e266481"> + <topic>phpMyAdmin -- XSS in replication setup</topic> + <affects> + <package> + <name>phpMyAdmin</name> + <range><gt>3.4</gt><lt>3.4.10.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The phpMyAdmin development team reports:</p> + <blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2012-1.php"> + <p>It was possible to conduct XSS using a crafted database name.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-1190</cvename> + <url>http://www.phpmyadmin.net/home_page/security/PMASA-2012-1.php</url> + </references> + <dates> + <discovery>2012-02-18</discovery> + <entry>2012-02-18</entry> + </dates> + </vuln> + <vuln vid="da317bc9-59a6-11e1-bc16-0023ae8e59f0"> <topic> piwik -- xss and click-jacking issues </topic> <affects> |