aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorSergey Matveychuk <sem@FreeBSD.org>2007-01-12 15:11:22 +0000
committerSergey Matveychuk <sem@FreeBSD.org>2007-01-12 15:11:22 +0000
commitfb00cc561df10c5198d44daa52f097c202426917 (patch)
tree378d91eaaaa8e972fd1f0cda581420c33cc273dc /security
parent2f265cfe6af606fc6a2794a41dca2b6b24a4522a (diff)
downloadports-fb00cc561df10c5198d44daa52f097c202426917.tar.gz
ports-fb00cc561df10c5198d44daa52f097c202426917.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml29
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 10ed9b75be4b..f60894dd15d1 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,35 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="41da2ba4-a24e-11db-bd24-000f3dcc6a5d">
+ <topic>cacti -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>cacti</name>
+ <range><lt>0.8.6i.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Secunia reports:</p>
+ <blockquote cite="http://secunia.com/advisories/23528/">
+ <p>rgod has discovered four vulnerabilities in Cacti,
+ which can be exploited by malicious people to bypass
+ certain security restrictions, manipulate data
+ and compromise vulnerable systems.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://secunia.com/advisories/23528/</url>
+ <url>http://forums.cacti.net/about18846-0-asc-0.html</url>
+ </references>
+ <dates>
+ <discovery>2006-12-28</discovery>
+ <entry>2007-01-12</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b2ff68b2-9f29-11db-a4e4-0211d87675b7">
<topic>mplayer -- buffer overflow in the code for RealMedia RTSP streams.</topic>
<affects>