aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorRemko Lodder <remko@FreeBSD.org>2007-09-19 17:06:27 +0000
committerRemko Lodder <remko@FreeBSD.org>2007-09-19 17:06:27 +0000
commit995f5c074d05537e8d2911e1e13d15b6d9ad031c (patch)
tree20272778173f51e8a96d4fc6ccabe53f0697e191 /security/vuxml/vuln.xml
parentce6cba427784f26a05811624e7bac0658bc770cb (diff)
downloadports-995f5c074d05537e8d2911e1e13d15b6d9ad031c.tar.gz
ports-995f5c074d05537e8d2911e1e13d15b6d9ad031c.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml65
1 files changed, 65 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 79d342c332b5..76606b77abf2 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,71 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="14ad2a28-66d2-11dc-b25f-02e0185f8d72">
+ <topic>konquerer -- address bar spoofing</topic>
+ <affects>
+ <package>
+ <name>kdebase3</name>
+ <range><lt>3.5.7_3</lt></range>
+ </package>
+ <package>
+ <name>kdelibs3</name>
+ <range><lt>3.5.7_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The KDE development team reports:</p>
+ <blockquote cite="http://www.kde.org/info/security/advisory-20070914-1.txt">
+ <p>The Konqueror address bar is vulnerable to spoofing attacks
+ that are based on embedding white spaces in the url. In addition
+ the address bar could be tricked to show an URL which it is
+ intending to visit for a short amount of time instead of the
+ current URL.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2007-3820</cvename>
+ <cvename>CVE-2007-4224</cvename>
+ <cvename>CVE-2007-4225</cvename>
+ <url>http://www.kde.org/info/security/advisory-20070914-1.txt</url>
+ </references>
+ <dates>
+ <discovery>2007-09-14</discovery>
+ <entry>2007-09-19</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="79b616d0-66d1-11dc-b25f-02e0185f8d72">
+ <topic>kdm -- passwordless login vulnerability</topic>
+ <affects>
+ <package>
+ <name>kdebase3</name>
+ <range><lt>3.5.7_3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The KDE development team reports:</p>
+ <blockquote cite="http://www.kde.org/info/security/advisory-20070919-1.txt">
+ <p>KDM can be tricked into performing a password-less login
+ even for accounts with a password set under certain
+ circumstances, namely autologin to be configured and
+ "shutdown with password" enabled.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2007-4569</cvename>
+ <url>http://www.kde.org/info/security/advisory-20070919-1.txt</url>
+ </references>
+ <dates>
+ <discovery>2007-09-19</discovery>
+ <entry>2007-09-19</entry>
+ </dates>
+ </vuln>
+
<vuln vid="209f0d75-4b5c-11dc-a6cd-000fb5066b20">
<topic>flyspray -- authentication bypass</topic>
<affects>