aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorRyan Steinmetz <zi@FreeBSD.org>2011-12-18 13:07:02 +0000
committerRyan Steinmetz <zi@FreeBSD.org>2011-12-18 13:07:02 +0000
commit8acc3ea9121fc38c4df98c92d0845673b685c876 (patch)
treeba086a737b054e1bab058e27d9d585b884c60656 /security
parent186c665b6a42f03fa94333adc48d2310ec0965a3 (diff)
downloadports-8acc3ea9121fc38c4df98c92d0845673b685c876.tar.gz
ports-8acc3ea9121fc38c4df98c92d0845673b685c876.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml33
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c3e647626d6c..ea68f440c39a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -47,6 +47,39 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3c957a3e-2978-11e1-89b4-001ec9578670">
+ <topic>typo3 -- Remote Code Execution</topic>
+ <affects>
+ <package>
+ <name>typo3</name>
+ <range><lt>4.6.2</lt></range>
+ </package>
+ <package>
+ <name>typo345</name>
+ <range><lt>4.5.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The typo3 security team reports:</p>
+ <blockquote cite="http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2011-004/">
+ <p>A crafted request to a vulnerable TYPO3 installation will allow an attacker to load PHP code
+ from an external source and to execute it on the TYPO3 installation.</p>
+ <p>This is caused by a PHP file, which is part of the workspaces system extension, that does not
+ validate passed arguments.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2011-004/</url>
+ <cvename>CVE-2011-4614</cvename>
+ </references>
+ <dates>
+ <discovery>2011-12-16</discovery>
+ <entry>2011-12-18</entry>
+ </dates>
+ </vuln>
+
<vuln vid="6c7d9a35-2608-11e1-89b4-001ec9578670">
<topic>krb5 -- KDC null pointer dereference in TGS handling</topic>
<affects>