aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorNiels Heinen <niels@FreeBSD.org>2010-05-07 19:53:26 +0000
committerNiels Heinen <niels@FreeBSD.org>2010-05-07 19:53:26 +0000
commit49a549c833ddc746d110430357d3d97010b68c0c (patch)
treeb645bcc1d21c6eee6d35cf71797b42421d6cbe26 /security
parente8d8b59a91bdec19e50967aaa1755b09c529d2f0 (diff)
downloadports-49a549c833ddc746d110430357d3d97010b68c0c.tar.gz
ports-49a549c833ddc746d110430357d3d97010b68c0c.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml57
1 files changed, 57 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index bb5fc402ccb9..354d78cf4ed9 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,63 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="28022228-5a0e-11df-942d-0015587e2cc1">
+ <topic>wireshark -- DOCSIS dissector denial of service</topic>
+ <affects>
+ <package>
+ <name>wireshark</name>
+ <range><le>1.2.6_1</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A vulnerability found in the DOCSIS dissector can cause
+ Wireshark to crash when a malformed packet trace file is
+ opened. This means that an attacker will have to trick a
+ victim into opening such a trace file before being able
+ to crash the application</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2010-1455</cvename>
+ <url>http://www.wireshark.org/security/wnpa-sec-2010-03.html</url>
+ <url>http://www.wireshark.org/security/wnpa-sec-2010-04.html</url>
+ </references>
+ <dates>
+ <discovery>2010-05-05</discovery>
+ <entry>2010-05-07</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c0869649-5a0c-11df-942d-0015587e2cc1">
+ <topic>piwik -- cross site scripting vulnerability</topic>
+ <affects>
+ <package>
+ <name>piwik</name>
+ <range><le>0.5.5</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Piwik security advisory reports:</p>
+ <blockquote cite="http://piwik.org/blog/2010/04/piwik-0-6-security-advisory/">
+ <p>A non-persistent, cross-site scripting vulnerability
+ (XSS) was found in Piwik's Login form that reflected
+ the form_url parameter without being properly escaped
+ or filtered.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2010-1453</cvename>
+ <url>http://piwik.org/blog/2010/04/piwik-0-6-security-advisory/</url>
+ </references>
+ <dates>
+ <discovery>2010-04-15</discovery>
+ <entry>2010-05-07</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7132c842-58e2-11df-8d80-0015587e2cc1">
<topic>spamass-milter -- remote command execution vulnerability</topic>
<affects>