Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=e4b2260cd0bb61bf07b983e8b707107ecfc1d6de
commit e4b2260cd0bb61bf07b983e8b707107ecfc1d6de Author: Miklos Vajna <[email protected]> Date: Sun Jul 26 13:34:45 2009 +0200 FSA612-wordpress diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 561a79b..712f956 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,18 @@ <fsas> <fsa> + <id>612</id> + <date>2009-07-26</date> + <author>Miklos Vajna</author> + <package>wordpress</package> + <vulnerable>2.8.1-1anacreon1</vulnerable> + <unaffected>2.8.2-1anacreon1</unaffected> + <bts>http://bugs.frugalware.org/task/3873</bts> + <cve>No CVE references, see http://wordpress.org/development/2009/07/wordpress-2-8-2/</cve> + <desc>A vulnerability has been reported in WordPress, which can be exploited by malicious people to conduct script insertion attacks. + Input passed via the comment author URL is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which is executed in a user's browser session in context of an affected website when the malicious data is viewed.</desc> + </fsa> + <fsa> <id>611</id> <date>2009-07-26</date> <author>Miklos Vajna</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
