[Secure-testing-commits] r30548 - data/CVE
Henri Salo
fgeek-guest at moszumanska.debian.org
Thu Dec 4 20:16:48 UTC 2014
Author: fgeek-guest
Date: 2014-12-04 20:16:48 +0000 (Thu, 04 Dec 2014)
New Revision: 30548
Modified:
data/CVE/list
Log:
mediawiki CVE-2014-9276, CVE-2014-9277
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2014-12-04 16:14:37 UTC (rev 30547)
+++ data/CVE/list 2014-12-04 20:16:48 UTC (rev 30548)
@@ -1,14 +1,6 @@
CVE-2014-XXXX [buffer overflow in mpfr_strtofr]
- mpfr4 <unfixed> (bug #772008)
NOTE: https://gforge.inria.fr/scm/viewvc.php?view=rev&root=mpfr&revision=9243
-CVE-2014-XXXX [XSS in Special:ExpandTemplates]
- - mediawiki <unfixed>
- [squeeze] - mediawiki <end-of-life>
- NOTE: https://bugzilla.wikimedia.org/show_bug.cgi?id=71111
-CVE-2014-XXXX [<cross-domain-policy> mangling allows injection in API format=php]
- - mediawiki <unfixed>
- [squeeze] - mediawiki <end-of-life>
- NOTE: https://bugzilla.wikimedia.org/show_bug.cgi?id=71478
CVE-2015-0360
RESERVED
CVE-2015-0359
@@ -133,6 +125,14 @@
- unrtf <unfixed>
NOTE: https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00000.html
TODO: check
+CVE-2014-9277 [<cross-domain-policy> mangling allows injection in API format=php]
+ - mediawiki <unfixed>
+ [squeeze] - mediawiki <end-of-life>
+ NOTE: https://bugzilla.wikimedia.org/show_bug.cgi?id=71478
+CVE-2014-9276 [XSS in Special:ExpandTemplates]
+ - mediawiki <unfixed>
+ [squeeze] - mediawiki <end-of-life>
+ NOTE: https://bugzilla.wikimedia.org/show_bug.cgi?id=71111
CVE-2014-9220
NOT-FOR-US: OpenVAS Manager
CVE-2014-9219 [XSS vulnerability in redirection mechanism]
@@ -2329,8 +2329,8 @@
RESERVED
- kde-workspace 4:4.11.13-2 (unimportant)
NOTE: https://projects.kde.org/projects/kde/kde-workspace/repository/diff?rev=54d0bfb5effff9c8cf60da890b7728cbe36a454e&rev_to=fd2aa9deed44fad6107625ad7360157fea7296f6
- NOTE: On Debian changing the clock requires authentication, so it's not exploitable
- NOTE: in the standard setup
+ NOTE: On Debian changing the clock requires authentication, so it's not exploitable
+ NOTE: in the standard setup
CVE-2014-8583
RESERVED
- mod-wsgi 4.2.7-1
More information about the Secure-testing-commits
mailing list