Fix: <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> <vuln vid="78d59d1f-a484-4649-a473-cd5a307592c8"> <topic>openfire -- Openfire multiple vulnerabilities</topic> <affects> <package> <name>openfire</name> <range><lt>3.6.3</lt></range> </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>Vendor reports:</p> <blockquote cite="http://www.coresecurity.com/content/openfire-multiple-vulnerabilities"> <p>Multiple cross-site scripting vulnerabilities have been found which may lead to arbitrary remote code execution on the server running the application due to unauthorized upload of Java plugin code. </p> </blockquote> </body> </description> <references> <url>http://www.coresecurity.com/content/openfire-multiple-vulnerabilities</url> <bid>32935</bid> <bid>32937</bid> <bid>32938</bid> <bid>32939</bid> <bid>32940</bid> <bid>32943</bid> <bid>32944</bid> <bid>32945</bid> </references> <dates> <discovery>2009-01-08</discovery> <entry>2009-01-15</entry> </dates> </vuln>
Responsible Changed From-To: freebsd-ports-bugs->gahr Over to maintainer (via the GNATS Auto Assign Tool)
Responsible Changed From-To: gahr->tabthorpe I'll take it.
tabthorpe 2009-01-25 00:56:18 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: - Document openfire -- multiple vulnerabilities PR: ports/130606 Submitted by: Mark Foster <mark foster.cc> Revision Changes Path 1.1831 +38 -1 ports/security/vuxml/vuln.xml _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
State Changed From-To: open->closed Committed. Thanks!