aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorMatthew Seaman <matthew@FreeBSD.org>2012-02-18 15:00:46 +0000
committerMatthew Seaman <matthew@FreeBSD.org>2012-02-18 15:00:46 +0000
commit37035a72be8e9da734c6d56832c58031c182d0e1 (patch)
treeb449a23ef03ff1dd08bc0fe55cff92a5d454e2e0 /security/vuxml/vuln.xml
parent7dd10aacc87963dfc084dd6984e9b41c95e55ccc (diff)
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml26
1 files changed, 26 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index af42cb30c111..c2afe920dd95 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -47,6 +47,32 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="fdd1c316-5a3d-11e1-8d3e-e0cb4e266481">
+ <topic>phpMyAdmin -- XSS in replication setup</topic>
+ <affects>
+ <package>
+ <name>phpMyAdmin</name>
+ <range><gt>3.4</gt><lt>3.4.10.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The phpMyAdmin development team reports:</p>
+ <blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2012-1.php">
+ <p>It was possible to conduct XSS using a crafted database name.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2012-1190</cvename>
+ <url>http://www.phpmyadmin.net/home_page/security/PMASA-2012-1.php</url>
+ </references>
+ <dates>
+ <discovery>2012-02-18</discovery>
+ <entry>2012-02-18</entry>
+ </dates>
+ </vuln>
+
<vuln vid="da317bc9-59a6-11e1-bc16-0023ae8e59f0">
<topic> piwik -- xss and click-jacking issues </topic>
<affects>