Processing commands for cont...@bugs.debian.org:
> close 685323 1.0.8.4-1
Bug #685323 [php-geshi] Non-persistent XSS vulnerability in contrib script
Marked as fixed in versions geshi/1.0.8.4-1.
Bug #685323 [php-geshi] Non-persistent XSS vulnerability in contrib script
Marked Bug as done
> thanks
S
Processing commands for cont...@bugs.debian.org:
> tags 685323 = unreproducible upstream security
Bug #685323 [php-geshi] Non-persistent XSS vulnerability in contrib script
Removed tag(s) moreinfo.
> notfound 685323 geshi/1.0.8.4-1
Bug #685323 [php-geshi] Non-persistent XSS vulnerability in contri
tags 685323 = unreproducible upstream security
notfound 685323 geshi/1.0.8.4-1
close 685323 geshi/1.0.8.4-1
thanks
Bug supposedly affected langwiz.php where a leftover var_dump($_GET)
could pose an XSS risk if deployed on a public-facing webserver. [1]
That file does not exist in the source versi
Package: php-geshi
Version: 1.0.8.4-1
Severity: serious
Tags: security upstream
GeSHi 1.0.8.11 closes non-persistent XSS vulnerability in a contrib script
provided in
the GeSHi distribution. The vulnerability can be triggered by an attacker using
a
specially crafted URL when calling a vulnerable
4 matches
Mail list logo