aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorMartin Wilke <miwi@FreeBSD.org>2007-06-04 12:42:17 +0000
committerMartin Wilke <miwi@FreeBSD.org>2007-06-04 12:42:17 +0000
commit781637120cbe03ea985902818a4df1dc81494a8d (patch)
tree921b6619eabfc5a1762f2b60d22b592532cadc67 /security
parent9a5f882d366053adfd794785162241108df2b5c0 (diff)
downloadports-781637120cbe03ea985902818a4df1dc81494a8d.tar.gz
ports-781637120cbe03ea985902818a4df1dc81494a8d.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml31
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index caa1077231fb..e54057eee525 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,37 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3d0e724e-129b-11dc-9f79-0016179b2dd5">
+ <topic>phppgadmin -- cross site scripting vulnerability</topic>
+ <affects>
+ <package>
+ <name>phppgadmin</name>
+ <range><lt>4.1.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SecurityFocus reports about phppgadmin:</p>
+ <blockquote cite="http://www.securityfocus.com/bid/24115/info">
+ <p>Exploiting this vulnerability may allow an attacker to perform
+ cross-site scripting attacks on unsuspecting users in the context
+ of the affected website. As a result, the attacker may be able to
+ steal cookie-based authentication credentials and to launch other
+ attacks.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <bid>24115</bid>
+ <url>http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063617.html</url>
+ <url>http://secunia.com/advisories/25446/</url>
+ </references>
+ <dates>
+ <discovery>2007-05-27</discovery>
+ <entry>2007-06-04</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7ca2a709-103b-11dc-8e82-00001cd613f9">
<topic>findutils -- GNU locate heap buffer overrun</topic>
<affects>