Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 14 Dec 2006 08:14:39 +0100
From:      Remko Lodder <remko@elvandar.org>
To:        Martin Wilke <miwi@FreeBSD.org>
Cc:        cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org, ports-committers@FreeBSD.org
Subject:   Re: cvs commit: ports/security/vuxml vuln.xml
Message-ID:  <20061214071439.GC27554@elvandar.org>
In-Reply-To: <200612132256.kBDMuVVf084024@repoman.freebsd.org>
References:  <200612132256.kBDMuVVf084024@repoman.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Dec 13, 2006 at 10:56:31PM +0000, Martin Wilke wrote:
> miwi        2006-12-13 22:56:31 UTC
> 
>   FreeBSD ports repository
> 
>   Modified files:
>     security/vuxml       vuln.xml 
>   Log:
>   tDiary - Injection Vulnerability
>   
> | +    <description>
> | +      <body xmlns="http://www.w3.org/1999/xhtml">;
> | +	  <p>A eRuby injection vulnerability has been discovered in tDiary.</p>
> | +      </body>
> | +    </description>

Hello Martin,

      Just being the bad secteam member ;-) Can you tell me what the injection
      vulnerability is? If people read this, they dont have any clue whatsoever
      whether thies applies to their situation or not and what the risk actually
      is.

      This is one of the biggest problems since adding VuXML entries will take
      up more time when people need to investigate the issue prior to adding
      them to the vuln.xml db, but I think (my personal opinion) that this is
      required since the above text tells us nothing.

      Apart from that: Thank you very much for working on the VuXML entries!
      We (secteam) really appriciate it!

      Cheers,
      remko

-- 
Kind regards,

     Remko Lodder               ** remko@elvandar.org
     FreeBSD                    ** remko@FreeBSD.org

     /* Quis custodiet ipsos custodes */



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20061214071439.GC27554>