diff options
author | Wesley Shields <wxs@FreeBSD.org> | 2011-03-10 14:31:36 +0000 |
---|---|---|
committer | Wesley Shields <wxs@FreeBSD.org> | 2011-03-10 14:31:36 +0000 |
commit | 492f10713d00b1f02b86a280fd78bad77a703775 (patch) | |
tree | 4624426677635a358bc892a038b583c368a45067 /security | |
parent | de9968987d97709e6b0b97f6b00fdc3e09df6eb8 (diff) | |
download | ports-492f10713d00b1f02b86a280fd78bad77a703775.tar.gz ports-492f10713d00b1f02b86a280fd78bad77a703775.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b0daf18df121..2f3a248ea0b2 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="64691c49-4b22-11e0-a226-00e0815b8da8"> + <topic>mailman -- XSS vulnerability</topic> + <affects> + <package> + <name>mailman</name> + <range><lt>2.1.14_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>CVE reports:</p> + <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0707"> + <p>Multiple cross-site scripting (XSS) vulnerabilities in + Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote + attackers to inject arbitrary web script or HTML via the (1) + full name or (2) username field in a confirmation message.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2011-0707</cvename> + <url>http://mail.python.org/pipermail/mailman-announce/2011-February/000157.html</url> + </references> + <dates> + <discovery>2011-03-FIXME</discovery> + <entry>2011-03-10</entry> + </dates> + </vuln> + <vuln vid="cf96cd8d-48fb-11e0-98a6-0050569b2d21"> <topic>redmine -- XSS vulnerability</topic> <affects> |