FreeBSD Ports: serendipity

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://int21.de/cve/CVE-2008-1385-s9y.html http://int21.de/cve/CVE-2008-1386-s9y.html http://blog.s9y.org/archives/193-Serendipity-1.3.1-released.html http://www.vuxml.org/freebsd/9c133aa0-12bd-11dd-bab7-0016179b2dd5.html
Insight
The following packages are affected: serendipity serendipity-devel CVE-2008-1385 Cross-site scripting (XSS) vulnerability in the Top Referrers (aka referrer) plugin in Serendipity (S9Y) before 1.3.1 allows remote attackers to inject arbitrary web script or HTML via the Referer HTTP header. CVE-2008-1386 Multiple cross-site scripting (XSS) vulnerabilities in the installer in Serendipity (S9Y) 1.3 allow remote attackers to inject arbitrary web script or HTML via (1) unspecified path fields or (2) the database host field. NOTE: the timing window for exploitation of this issue might be limited.