diff options
author | Greg Larkin <glarkin@FreeBSD.org> | 2010-01-14 03:32:42 +0000 |
---|---|---|
committer | Greg Larkin <glarkin@FreeBSD.org> | 2010-01-14 03:32:42 +0000 |
commit | 086e1bda2000915b043fecff7b8688ae69c0d4e9 (patch) | |
tree | 244bac691d74fde4da623d8f5e6ddc678205e7f0 /security/vuxml/vuln.xml | |
parent | 65822b7d028325d31fa2d49310f5d2ca88337366 (diff) | |
download | ports-086e1bda2000915b043fecff7b8688ae69c0d4e9.tar.gz ports-086e1bda2000915b043fecff7b8688ae69c0d4e9.zip |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 63 |
1 files changed, 58 insertions, 5 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 1c004e2d3a92..40b34a0fb1ca 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -33,8 +33,62 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Note: Please add new entries to the beginning of this file. --> - <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="c9263916-006f-11df-94cb-0050568452ac"> + <topic>Zend Framework -- multiple vulnerabilities</topic> + <affects> + <package> + <name>ZendFramework</name> + <range><lt>1.9.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Zend Framework team reports:</p> + <blockquote cite="http://framework.zend.com/security/advisory/ZF2010-06"> + <p>Potential XSS or HTML Injection vector in Zend_Json.</p> + </blockquote> + <blockquote cite="http://framework.zend.com/security/advisory/ZF2010-05"> + <p>Potential XSS vector in Zend_Service_ReCaptcha_MailHide.</p> + </blockquote> + <blockquote cite="http://framework.zend.com/security/advisory/ZF2010-04"> + <p>Potential MIME-type Injection in Zend_File_Transfer + Executive Summary.</p> + </blockquote> + <blockquote cite="http://framework.zend.com/security/advisory/ZF2010-03"> + <p>Potential XSS vector in Zend_Filter_StripTags when + comments allowed.</p> + </blockquote> + <blockquote cite="http://framework.zend.com/security/advisory/ZF2010-02"> + <p>Potential XSS vector in Zend_Dojo_View_Helper_Editor.</p> + </blockquote> + <blockquote cite="http://framework.zend.com/security/advisory/ZF2010-01"> + <p>Potential XSS vectors due to inconsistent encodings.</p> + </blockquote> + <blockquote cite="http://framework.zend.com/security/advisory/ZF2009-02"> + <p>XSS vector in Zend_Filter_StripTags.</p> + </blockquote> + <blockquote cite="http://framework.zend.com/security/advisory/ZF2009-01"> + <p>LFI vector in Zend_View::setScriptPath() and render().</p> + </blockquote> + </body> + </description> + <references> + <url>http://framework.zend.com/security/advisory/ZF2010-06</url> + <url>http://framework.zend.com/security/advisory/ZF2010-05</url> + <url>http://framework.zend.com/security/advisory/ZF2010-04</url> + <url>http://framework.zend.com/security/advisory/ZF2010-03</url> + <url>http://framework.zend.com/security/advisory/ZF2010-02</url> + <url>http://framework.zend.com/security/advisory/ZF2010-01</url> + <url>http://framework.zend.com/security/advisory/ZF2009-02</url> + <url>http://framework.zend.com/security/advisory/ZF2009-01</url> + </references> + <dates> + <discovery>2009-12-31</discovery> + <entry>2010-01-11</entry> + </dates> + </vuln> + <vuln vid="dd8f2394-fd08-11de-b425-00215c6a37bb"> <topic>powerdns-recursor -- multiple vulnerabilities</topic> <affects> @@ -705,7 +759,7 @@ Note: Please add new entries to the beginning of this file. </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>>Opera Team reports:</p> + <p>Opera Team reports:</p> <blockquote cite="http://www.opera.com/docs/changelogs/unix/1010/"> <ul> <li>Fixed a heap buffer overflow in string to number conversion</li> @@ -2059,7 +2113,7 @@ Note: Please add new entries to the beginning of this file. </vuln> <vuln vid="59e7af2d-8db7-11de-883b-001e3300a30d"> - <topic>pidgin -- MSN overflow parsing SLP messages </topic> + <topic>pidgin -- MSN overflow parsing SLP messages</topic> <affects> <package> <name>pidgin</name> @@ -2294,8 +2348,7 @@ Note: Please add new entries to the beginning of this file. <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>Joomla! Security Center reports:</p> - <blockquote - cite="http://developer.joomla.org/security/news/303-20090723-core-com-mailto-timeout-issue.html"> + <blockquote cite="http://developer.joomla.org/security/news/303-20090723-core-com-mailto-timeout-issue.html"> <p>In com_mailto, it was possible to bypass timeout protection against sending automated emails.</p> </blockquote> |