summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--security/vuxml/vuln.xml32
1 files changed, 31 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 58136d06a6d6..95cef71dbf5c 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,7 +34,37 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
- <vuln vid="b07f3254-f83a-11dd-85a4-ea653f0746ab">
+ <vuln vid="83574d5a-f828-11dd-9fdf-0050568452ac">
+ <topic>codeigniter -- arbitrary script execution in the new Form Validation class</topic>
+ <affects>
+ <package>
+ <name>codeigniter</name>
+ <range><ge>1.7.0</ge><lt>1.7.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>znirkel reports:</p>
+ <blockquote cite="http://secunia.com/advisories/33829/">
+ <p>The eval() function in _reset_post_array crashes when posting
+ certain data. By passing in carefully-crafted input data, the eval()
+ function could also execute malicious PHP code.</p>
+ <p>Note that CodeIgniter applications that either do not use the
+ new Form Validation class or use the old Validation class are not
+ affected by this vulnerability.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://codeigniter.com/bug_tracker/bug/6068/</url>
+ </references>
+ <dates>
+ <discovery>2008-11-28</discovery>
+ <entry>2009-02-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b07f3254-f83a-11dd-85a4-ea653f0746ab">
<topic>pyblosxom -- atom flavor multiple XML injection vulnerabilities</topic>
<affects>
<package>