svn commit: r496987 - head/security/vuxml
Jose Alonso Cardenas Marquez
acm at FreeBSD.org
Wed Mar 27 21:51:41 UTC 2019
Author: acm
Date: Wed Mar 27 21:51:40 2019
New Revision: 496987
URL: https://svnweb.freebsd.org/changeset/ports/496987
Log:
- Update 94d63fd7-508b-11e9-9ba0-4c72b94353b5 entry
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Wed Mar 27 21:51:20 2019 (r496986)
+++ head/security/vuxml/vuln.xml Wed Mar 27 21:51:40 2019 (r496987)
@@ -59,23 +59,28 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="94d63fd7-508b-11e9-9ba0-4c72b94353b5">
- <topic>drupal -- Multiple Vulnerabilities</topic>
+ <topic>drupal -- Drupal core - Moderately critical - Cross Site Scripting</topic>
<affects>
<package>
<name>drupal7</name>
<range><lt>7.65</lt></range>
</package>
+ <package>
+ <name>drupal8</name>
+ <range><lt>8.6.13</lt></range>
+ </package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Drupal Security Team reports:</p>
- <blockquote cite="https://www.drupal.org/project/drupal/releases/7.65">
+ <blockquote cite="https://www.drupal.org/SA-CORE-2019-004">
<p>Under certain circumstances the File module/subsystem allows a malicious
user to upload a file that can trigger a cross-site scripting (XSS) vulnerability.</p>
</blockquote>
</body>
</description>
<references>
+ <url>https://www.drupal.org/project/drupal/releases/8.6.13</url>
<url>https://www.drupal.org/project/drupal/releases/7.65</url>
<url>https://www.drupal.org/SA-CORE-2019-004</url>
<cvename>CVE-2019-6341</cvename>
More information about the svn-ports-all
mailing list