FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  360546
Date:      2014-07-04
Time:      06:38:23Z
Committer: swills

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
4775c807-8f30-11dd-821f-001cc0377035mysql -- command line client input validation vulnerability

Thomas Henlich reports:

The mysql command-line client does not quote HTML special characters like < in its output. This allows an attacker who is able to write data into a table to hide or modify records in the output, and to inject potentially dangerous code, e. g. Javascript to perform cross-site scripting or cross-site request forgery attacks.


Discovery 2007-04-17
Entry 2008-10-01
Modified 2008-10-10
mysql-client
gt 5.1 lt 5.1.28_1

gt 5.0 lt 5.0.67_1

31486
http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability/
4775c807-8f30-11dd-821f-001cc0377035mysql -- command line client input validation vulnerability

Thomas Henlich reports:

The mysql command-line client does not quote HTML special characters like < in its output. This allows an attacker who is able to write data into a table to hide or modify records in the output, and to inject potentially dangerous code, e. g. Javascript to perform cross-site scripting or cross-site request forgery attacks.


Discovery 2007-04-17
Entry 2008-10-01
Modified 2008-10-10
mysql-client
gt 5.1 lt 5.1.28_1

gt 5.0 lt 5.0.67_1

31486
http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability/