diff options
author | Simon L. B. Nielsen <simon@FreeBSD.org> | 2005-02-12 20:40:50 +0000 |
---|---|---|
committer | Simon L. B. Nielsen <simon@FreeBSD.org> | 2005-02-12 20:40:50 +0000 |
commit | 9314417b3407ad7e0686b59ddf18754afee85659 (patch) | |
tree | 3ac3428ab18544a477b32193b1818584892b37be /security | |
parent | 33e15d970fa4c53d70034356f9ac2b2e832564e0 (diff) |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d55680dcd255..11c3d5e9ac8c 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,35 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="c7ccc33f-7d31-11d9-a9e7-0001020eed82"> + <topic>mailman -- directory traversal vulnerability</topic> + <affects> + <package> + <name>mailman</name> + <name>ja-mailman</name> + <range><lt>2.1.5_2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A directory traversal vulnerability in mailman allow remote + attackers to read arbitrary files due to inadequate input + sanitizing. This could, among other things, lead remote + attackers to gaining access to the mailman configuration + database (which contains subscriber email addresses and + passwords) or to the mail archives for private lists.</p> + </body> + </description> + <references> + <cvename>CAN-2005-0202</cvename> + <mlist msgid="20050209181502.GA26136@grok.org.uk">http://marc.theaimsgroup.com/?l=full-disclosure&m=110797575304304</mlist> + </references> + <dates> + <discovery>2005-01-02</discovery> + <entry>2005-02-12</entry> + </dates> + </vuln> + <vuln vid="72da8af6-7c75-11d9-8cc5-000854d03344"> <topic>enscript -- multiple vulnerabilities</topic> <affects> |