aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorEygene Ryabinkin <rea@FreeBSD.org>2012-08-26 21:26:57 +0000
committerEygene Ryabinkin <rea@FreeBSD.org>2012-08-26 21:26:57 +0000
commit7b229e281e9eaad2b2d3feef61b50c0b94795b6a (patch)
tree1f3d1aed772cd75f8c1355f4e0650fd810bb7a9b /security/vuxml/vuln.xml
parentc4329e07da96a1dc5991897f318c04979627bc4d (diff)
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml29
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 4e7bd80c5445..91baa6524a19 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,35 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="c906e0a4-efa6-11e1-8fbf-001b77d09812">
+ <topic>roundcube -- cross-site scripting in HTML email messages</topic>
+ <affects>
+ <package>
+ <name>roundcube</name>
+ <range><ge>0.8.0</ge><lt>0.8.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>RoundCube branch 0.8.x prior to the version 0.8.1 is prone
+ to the cross-scripting attack (XSS) originating from incoming
+ HTML e-mails: due to the lack of proper sanitization
+ of JavaScript code inside the "href" attribute, sender
+ could launch XSS attack when recipient opens the message
+ in RoundCube interface.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2012-3508</cvename>
+ <url>http://trac.roundcube.net/wiki/Changelog</url>
+ <url>http://trac.roundcube.net/ticket/1488613</url>
+ </references>
+ <dates>
+ <discovery>2012-08-14</discovery>
+ <entry>2012-08-27</entry>
+ </dates>
+ </vuln>
+
<vuln vid="aa4d3d73-ef17-11e1-b593-00269ef07d24">
<topic>Calligra, KOffice -- input validation failure</topic>
<affects>