aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorXin LI <delphij@FreeBSD.org>2007-11-28 00:19:08 +0000
committerXin LI <delphij@FreeBSD.org>2007-11-28 00:19:08 +0000
commitafa8c55f49927356d2f80c24650c095a55b7ef14 (patch)
treef8d64b986dcb1f5c3fc31fac146363e18debdbc8 /security
parent0a943f81989a33581461a0127a8a4ddaead55cc2 (diff)
downloadports-afa8c55f49927356d2f80c24650c095a55b7ef14.tar.gz
ports-afa8c55f49927356d2f80c24650c095a55b7ef14.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml56
1 files changed, 56 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 6d5873b40504..e84b69f1ffc6 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,62 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="30acb8ae-9d46-11dc-9114-001c2514716c">
+ <topic>rubygem-rails -- session-fixation vulnerability</topic>
+ <affects>
+ <package>
+ <name>rubygem-rails</name>
+ <range><lt>1.2.6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Rails core team reports:</p>
+ <blockquote cite="http://weblog.rubyonrails.com/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release">
+ <p>The rails core team has released ruby on rails 1.2.6 to
+ address a bug in the fix for session fixation attacks
+ (CVE-2007-5380). The CVE Identifier for this new issue
+ is CVE-2007-6077.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2007-6077</cvename>
+ </references>
+ <dates>
+ <discovery>2007-11-24</discovery>
+ <entry>2007-11-27</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="44fb0302-9d38-11dc-9114-001c2514716c">
+ <topic>rubygem-rails -- JSON XSS vulnerability</topic>
+ <affects>
+ <package>
+ <name>rubygem-rails</name>
+ <range><lt>1.2.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Rails core team reports:</p>
+ <blockquote cite="http://weblog.rubyonrails.org/2007/10/12/rails-1-2-5-maintenance-release">
+ <p>All users of Rails 1.2.4 or earlier are advised to upgrade
+ to 1.2.5, though it isn¡¯t strictly necessary if you
+ aren't working with JSON. For more information the JSON
+ vulnerability, see CVE-2007-3227.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2007-3227</cvename>
+ </references>
+ <dates>
+ <discovery>2007-10-12</discovery>
+ <entry>2007-11-28</entry>
+ </dates>
+ </vuln>
+
<vuln vid="31d9fbb4-9d09-11dc-a29d-0016d325a0ed">
<topic>ikiwiki -- improper symlink verification vulnerability</topic>
<affects>