diff options
author | Ryan Steinmetz <zi@FreeBSD.org> | 2011-12-18 13:07:02 +0000 |
---|---|---|
committer | Ryan Steinmetz <zi@FreeBSD.org> | 2011-12-18 13:07:02 +0000 |
commit | 8acc3ea9121fc38c4df98c92d0845673b685c876 (patch) | |
tree | ba086a737b054e1bab058e27d9d585b884c60656 /security | |
parent | 186c665b6a42f03fa94333adc48d2310ec0965a3 (diff) | |
download | ports-8acc3ea9121fc38c4df98c92d0845673b685c876.tar.gz ports-8acc3ea9121fc38c4df98c92d0845673b685c876.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index c3e647626d6c..ea68f440c39a 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -47,6 +47,39 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3c957a3e-2978-11e1-89b4-001ec9578670"> + <topic>typo3 -- Remote Code Execution</topic> + <affects> + <package> + <name>typo3</name> + <range><lt>4.6.2</lt></range> + </package> + <package> + <name>typo345</name> + <range><lt>4.5.9</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The typo3 security team reports:</p> + <blockquote cite="http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2011-004/"> + <p>A crafted request to a vulnerable TYPO3 installation will allow an attacker to load PHP code + from an external source and to execute it on the TYPO3 installation.</p> + <p>This is caused by a PHP file, which is part of the workspaces system extension, that does not + validate passed arguments.</p> + </blockquote> + </body> + </description> + <references> + <url>http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2011-004/</url> + <cvename>CVE-2011-4614</cvename> + </references> + <dates> + <discovery>2011-12-16</discovery> + <entry>2011-12-18</entry> + </dates> + </vuln> + <vuln vid="6c7d9a35-2608-11e1-89b4-001ec9578670"> <topic>krb5 -- KDC null pointer dereference in TGS handling</topic> <affects> |