aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorStanislav Sedov <stas@FreeBSD.org>2008-09-30 20:46:02 +0000
committerStanislav Sedov <stas@FreeBSD.org>2008-09-30 20:46:02 +0000
commit0eb7b70dde0028b48cd71d3e0b55151521932615 (patch)
tree3e2c26fc79a03faf9e48ec69fb72a1ea114e2de4 /security
parented2e206938de44221bebe018cd500b2bd87d011f (diff)
downloadports-0eb7b70dde0028b48cd71d3e0b55151521932615.tar.gz
ports-0eb7b70dde0028b48cd71d3e0b55151521932615.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml31
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 4e03a4689d52..de564a88a37d 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,37 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="4775c807-8f30-11dd-821f-001cc0377035">
+ <topic>mysql -- command line client input validation vulnerability</topic>
+ <affects>
+ <package>
+ <name>mysql-client</name>
+ <range><gt>0</gt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Thomas Henlich reports:</p>
+ <blockquote cite="http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability/">
+ <p>The mysql command-line client does not quote HTML special
+ characters like &lt; in its output. This allows an attacker who
+ is able to write data into a table to hide or modify records in
+ the output, and to inject potentially dangerous code, e. g.
+ Javascript to perform cross-site scripting or cross-site request
+ forgery attacks.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>31486</bid>
+ <url>http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability/</url>
+ </references>
+ <dates>
+ <discovery>2007-04-17</discovery>
+ <entry>2008-10-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="724e6f93-8f2a-11dd-821f-001cc0377035">
<topic>mplayer -- multiple integer overflows</topic>
<affects>