Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=464cb5fc7e8bbcf24f0fe7e16a61b692b8ab3eb3

commit 464cb5fc7e8bbcf24f0fe7e16a61b692b8ab3eb3
Author: voroskoi <[EMAIL PROTECTED]>
Date:   Mon Jan 21 21:05:01 2008 +0100

FSA356-mantis

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index abd69c6..adcebd3 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -27,6 +27,19 @@

<fsas>
<fsa>
+               <id>356</id>
+               <date>2008-01-21</date>
+               <author>voroskoi</author>
+               <package>mantis</package>
+               <vulnerable>1.0.8-1</vulnerable>
+               <unaffected>1.0.8-2sayshell1</unaffected>
+               <bts>http://bugs.frugalware.org/task/2683</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6611</cve>
+               <desc>seiji has discovered a vulnerability in Mantis, which can 
be exploited by malicious users to conduct script insertion attacks.
+                       Input passed as the filename for the uploaded file in 
bug_report.php is not properly sanitised before being stored. This can be 
exploited to insert arbitrary HTML and script code, which is executed in a 
user's browser session in context of an affected site when the malicious 
filename is viewed in view.php.
+                       Successful exploitation requires valid user 
credentials.</desc>
+       </fsa>
+       <fsa>
<id>355</id>
<date>2008-01-21</date>
<author>voroskoi</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to