diff options
author | Xin LI <delphij@FreeBSD.org> | 2007-11-28 00:19:08 +0000 |
---|---|---|
committer | Xin LI <delphij@FreeBSD.org> | 2007-11-28 00:19:08 +0000 |
commit | afa8c55f49927356d2f80c24650c095a55b7ef14 (patch) | |
tree | f8d64b986dcb1f5c3fc31fac146363e18debdbc8 /security | |
parent | 0a943f81989a33581461a0127a8a4ddaead55cc2 (diff) | |
download | ports-afa8c55f49927356d2f80c24650c095a55b7ef14.tar.gz ports-afa8c55f49927356d2f80c24650c095a55b7ef14.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 56 |
1 files changed, 56 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 6d5873b40504..e84b69f1ffc6 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,62 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="30acb8ae-9d46-11dc-9114-001c2514716c"> + <topic>rubygem-rails -- session-fixation vulnerability</topic> + <affects> + <package> + <name>rubygem-rails</name> + <range><lt>1.2.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Rails core team reports:</p> + <blockquote cite="http://weblog.rubyonrails.com/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release"> + <p>The rails core team has released ruby on rails 1.2.6 to + address a bug in the fix for session fixation attacks + (CVE-2007-5380). The CVE Identifier for this new issue + is CVE-2007-6077.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2007-6077</cvename> + </references> + <dates> + <discovery>2007-11-24</discovery> + <entry>2007-11-27</entry> + </dates> + </vuln> + + <vuln vid="44fb0302-9d38-11dc-9114-001c2514716c"> + <topic>rubygem-rails -- JSON XSS vulnerability</topic> + <affects> + <package> + <name>rubygem-rails</name> + <range><lt>1.2.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Rails core team reports:</p> + <blockquote cite="http://weblog.rubyonrails.org/2007/10/12/rails-1-2-5-maintenance-release"> + <p>All users of Rails 1.2.4 or earlier are advised to upgrade + to 1.2.5, though it isn¡¯t strictly necessary if you + aren't working with JSON. For more information the JSON + vulnerability, see CVE-2007-3227.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2007-3227</cvename> + </references> + <dates> + <discovery>2007-10-12</discovery> + <entry>2007-11-28</entry> + </dates> + </vuln> + <vuln vid="31d9fbb4-9d09-11dc-a29d-0016d325a0ed"> <topic>ikiwiki -- improper symlink verification vulnerability</topic> <affects> |