Index: vuln.xml =================================================================== --- vuln.xml (revision 325081) +++ vuln.xml (working copy) @@ -51,6 +51,50 @@ --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="e1f99d59-81aa-4662-bf62-c1076f5016c8"> + <topic>py-graphite-web -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>py26-graphite-web</name> + <range><lt>0.9.11</lt></range> + </package> + <package> + <name>py27-graphite-web</name> + <range><lt>0.9.11</lt></range> + </package> + <package> + <name>py31-graphite-web</name> + <range><lt>0.9.11</lt></range> + </package> + <package> + <name>py32-graphite-web</name> + <range><lt>0.9.11</lt></range> + </package> + <package> + <name>py33-graphite-web</name> + <range><lt>0.9.11</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Graphite developers report:</p> + <blockquote cite="http://graphite.readthedocs.org/en/0.9.11/releases/0_9_11.html"> + <p>This release contains several security fixes for cross-site + scripting (XSS) as well as a fix for a remote-execution exploit in + graphite-web (CVE-2013-5903).</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-5093</cvename> + <url>https://github.com/rapid7/metasploit-framework/pull/2260</url> + </references> + <dates> + <discovery>2013-08-21</discovery> + <entry>2013-08-21</entry> + </dates> + </vuln> + <vuln vid="4d087b35-0990-11e3-a9f4-bcaec565249c"> <topic>gstreamer-ffmpeg -- Multiple vulnerabilities in bundled libav</topic> <affects> --- vuln.xml.patch ends here ---