mirror of
https://git.FreeBSD.org/ports.git
synced 2025-01-15 07:56:36 +00:00
- Document epiphany -- untrusted search path vulnerability
This commit is contained in:
parent
3c7ebcd4a8
commit
673ff0c2eb
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=229917
@ -34,6 +34,37 @@ Note: Please add new entries to the beginning of this file.
|
||||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="e848a92f-0e7d-11de-92de-000bcdc1757a">
|
||||
<topic>epiphany -- untrusted search path vulnerability</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>epiphany</name>
|
||||
<range><lt>2.24.2.1</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>CVE Mitre reports:</p>
|
||||
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5985">
|
||||
<p>Untrusted search path vulnerability in the Python interface in
|
||||
Epiphany 2.22.3, and possibly other versions, allows local users to
|
||||
execute arbitrary code via a Trojan horse Python file in the current
|
||||
working directory, related to a vulnerability in the PySys_SetArgv
|
||||
function (CVE-2008-5983).
|
||||
</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2008-5985</cvename>
|
||||
<cvename>CVE-2008-5983</cvename>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2009-01-26</discovery>
|
||||
<entry>2009-03-11</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="f1892066-0e74-11de-92de-000bcdc1757a">
|
||||
<topic>apache -- Cross-site scripting vulnerability</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user