Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=e4b2260cd0bb61bf07b983e8b707107ecfc1d6de

commit e4b2260cd0bb61bf07b983e8b707107ecfc1d6de
Author: Miklos Vajna <[email protected]>
Date:   Sun Jul 26 13:34:45 2009 +0200

FSA612-wordpress

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 561a79b..712f956 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,18 @@

<fsas>
<fsa>
+               <id>612</id>
+               <date>2009-07-26</date>
+               <author>Miklos Vajna</author>
+               <package>wordpress</package>
+               <vulnerable>2.8.1-1anacreon1</vulnerable>
+               <unaffected>2.8.2-1anacreon1</unaffected>
+               <bts>http://bugs.frugalware.org/task/3873</bts>
+               <cve>No CVE references, see 
http://wordpress.org/development/2009/07/wordpress-2-8-2/</cve>
+               <desc>A vulnerability has been reported in WordPress, which can 
be exploited by malicious people to conduct script insertion attacks.
+                       Input passed via the comment author URL is not properly 
sanitised before being used. This can be exploited to insert arbitrary HTML and 
script code, which is executed in a user's browser session in context of an 
affected website when the malicious data is viewed.</desc>
+       </fsa>
+       <fsa>
<id>611</id>
<date>2009-07-26</date>
<author>Miklos Vajna</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to