aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorJochen Neumeister <joneum@FreeBSD.org>2017-05-22 07:16:13 +0000
committerJochen Neumeister <joneum@FreeBSD.org>2017-05-22 07:16:13 +0000
commit3753ed400fb316ad701310a607f530aac044ba13 (patch)
tree11ad71cb79aa95b3ba9980b1b54e4539cb2fdeff /security/vuxml
parent9ae15442dafda39bd2ed97c56baa0e23da4466dc (diff)
downloadports-3753ed400fb316ad701310a607f530aac044ba13.tar.gz
ports-3753ed400fb316ad701310a607f530aac044ba13.zip
- Document Wordpress multible vulnerabilities
Approved by: miwi (mentor) Differential Revision: https://reviews.freebsd.org/D10789
Notes
Notes: svn path=/head/; revision=441435
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml40
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index f993c54d84cf..24ff5da0fa81 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,46 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="a5bb7ea0-3e58-11e7-94a2-00e04c1ea73d">
+ <topic>Wordpress -- multible vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>wordpress</name>
+ <range><lt>4.7.5,1</lt></range>
+ </package>
+ <package>
+ <name>de-wordpress</name>
+ <name>fr-wordpress</name>
+ <name>ja-wordpress</name>
+ <name>ru-wordpress</name>
+ <name>zh-wordpress-zh_CN</name>
+ <name>zh-wordpress-zh_TW</name>
+ <range><lt>4.7.5,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <blockquote cite="https://wordpress.org/news/2017/05/wordpress-4-7-5/">
+ <p>WordPress versions 4.7.4 and earlier are affected by six security issues</p>
+ <ul>
+ <li>Insufficient redirect validation in the HTTP class.</li>
+ <li>Improper handling of post meta data values in the XML-RPC API.</li>
+ <li>Lack of capability checks for post meta data in the XML-RPC API.</li>
+ <li>A Cross Site Request Forgery (CRSF) vulnerability was discovered in the filesystem credentials dialog.</li>
+ <li>A cross-site scripting (XSS) vulnerability was discovered related to the Customizer.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://wordpress.org/news/2017/05/wordpress-4-7-5/</url>
+ </references>
+ <dates>
+ <discovery>2017-05-16</discovery>
+ <entry>2017-05-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="fab87bff-3ce5-11e7-bf9d-001999f8d30b">
<topic>asterisk -- Memory exhaustion on short SCCP packets</topic>
<affects>