Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 30 Mar 2009 21:23:22 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com, tony@...post24.com
Subject: Re: [Fwd: Cross-Site Scripting in Banshee DAAP
 Extension]


======================================================
Name: CVE-2009-1175
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1175
Reference: CONFIRM:http://bugzilla.gnome.org/show_bug.cgi?id=577270

Cross-site scripting (XSS) vulnerability in apps/web/vs_diag.cgi in
the DAAP extension in Banshee 1.4.2 allows remote attackers to inject
arbitrary web script or HTML via the server parameter, which is not
properly handled in an error message.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.