diff options
author | Sergey Matveychuk <sem@FreeBSD.org> | 2007-01-12 15:11:22 +0000 |
---|---|---|
committer | Sergey Matveychuk <sem@FreeBSD.org> | 2007-01-12 15:11:22 +0000 |
commit | fb00cc561df10c5198d44daa52f097c202426917 (patch) | |
tree | 378d91eaaaa8e972fd1f0cda581420c33cc273dc /security | |
parent | 2f265cfe6af606fc6a2794a41dca2b6b24a4522a (diff) | |
download | ports-fb00cc561df10c5198d44daa52f097c202426917.tar.gz ports-fb00cc561df10c5198d44daa52f097c202426917.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 10ed9b75be4b..f60894dd15d1 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="41da2ba4-a24e-11db-bd24-000f3dcc6a5d"> + <topic>cacti -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>cacti</name> + <range><lt>0.8.6i.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Secunia reports:</p> + <blockquote cite="http://secunia.com/advisories/23528/"> + <p>rgod has discovered four vulnerabilities in Cacti, + which can be exploited by malicious people to bypass + certain security restrictions, manipulate data + and compromise vulnerable systems.</p> + </blockquote> + </body> + </description> + <references> + <url>http://secunia.com/advisories/23528/</url> + <url>http://forums.cacti.net/about18846-0-asc-0.html</url> + </references> + <dates> + <discovery>2006-12-28</discovery> + <entry>2007-01-12</entry> + </dates> + </vuln> + <vuln vid="b2ff68b2-9f29-11db-a4e4-0211d87675b7"> <topic>mplayer -- buffer overflow in the code for RealMedia RTSP streams.</topic> <affects> |