diff options
author | Stanislav Sedov <stas@FreeBSD.org> | 2008-09-30 20:46:02 +0000 |
---|---|---|
committer | Stanislav Sedov <stas@FreeBSD.org> | 2008-09-30 20:46:02 +0000 |
commit | 0eb7b70dde0028b48cd71d3e0b55151521932615 (patch) | |
tree | 3e2c26fc79a03faf9e48ec69fb72a1ea114e2de4 /security | |
parent | ed2e206938de44221bebe018cd500b2bd87d011f (diff) | |
download | ports-0eb7b70dde0028b48cd71d3e0b55151521932615.tar.gz ports-0eb7b70dde0028b48cd71d3e0b55151521932615.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 4e03a4689d52..de564a88a37d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,37 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="4775c807-8f30-11dd-821f-001cc0377035"> + <topic>mysql -- command line client input validation vulnerability</topic> + <affects> + <package> + <name>mysql-client</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Thomas Henlich reports:</p> + <blockquote cite="http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability/"> + <p>The mysql command-line client does not quote HTML special + characters like < in its output. This allows an attacker who + is able to write data into a table to hide or modify records in + the output, and to inject potentially dangerous code, e. g. + Javascript to perform cross-site scripting or cross-site request + forgery attacks.</p> + </blockquote> + </body> + </description> + <references> + <bid>31486</bid> + <url>http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability/</url> + </references> + <dates> + <discovery>2007-04-17</discovery> + <entry>2008-10-01</entry> + </dates> + </vuln> + <vuln vid="724e6f93-8f2a-11dd-821f-001cc0377035"> <topic>mplayer -- multiple integer overflows</topic> <affects> |