diff options
author | Li-Wen Hsu <lwhsu@FreeBSD.org> | 2021-03-10 14:03:45 +0000 |
---|---|---|
committer | Li-Wen Hsu <lwhsu@FreeBSD.org> | 2021-03-10 14:03:45 +0000 |
commit | 3eb0a95332d879c4fbbd724c130b9ace61f6b4d0 (patch) | |
tree | a8c0e0d68350840fa242e9581e761c73e6047628 /security | |
parent | 7286ae23e4b0f39516d1489541c62c8c9d691638 (diff) | |
download | ports-3eb0a95332d879c4fbbd724c130b9ace61f6b4d0.tar.gz ports-3eb0a95332d879c4fbbd724c130b9ace61f6b4d0.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 44 |
1 files changed, 44 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d6f6abcd4f96..e32e251f8450 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -78,6 +78,50 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="2dc8927b-54e0-11eb-9342-1c697a013f4b"> + <topic>mantis -- multiple vulnerabilities</topic> + <affects> + <package> + <name>mantis-php72</name> + <name>mantis-php73</name> + <name>mantis-php74</name> + <name>mantis-php80</name> + <range><lt>2.24.4,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Mantis 2.24.4 release reports:</p> + <blockquote cite="https://mantisbt.org/bugs/changelog_page.php?project=mantisbt&version=2.24.4"> + <p>Security and maintenance release, addressing 6 CVEs:</p> + <ul> + <li>0027726: CVE-2020-29603: disclosure of private project name</li> + <li>0027727: CVE-2020-29605: disclosure of private issue summary</li> + <li>0027728: CVE-2020-29604: full disclosure of private issue contents, including bugnotes and attachments</li> + <li>0027361: Private category can be access/used by a non member of a private project (IDOR)</li> + <li>0027779: CVE-2020-35571: XSS in helper_ensure_confirmed() calls</li> + <li>0026794: User Account - Takeover</li> + <li>0027363: Fixed in version can be changed to a version that doesn't exist</li> + <li>0027350: When updating an issue, a Viewer user can be set as Reporter</li> + <li>0027370: CVE-2020-35849: Revisions allow viewing private bugnotes id and summary</li> + <li>0027495: CVE-2020-28413: SQL injection in the parameter "access" on the mc_project_get_users function throught the API SOAP.</li> + <li>0027444: Printing unsanitized user input in install.php</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2020-28413</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28413</url> + <cvename>CVE-2020-35849</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35849</url> + </references> + <dates> + <discovery>2020-11-10</discovery> + <entry>2021-03-10</entry> + </dates> + </vuln> + <vuln vid="2f3cd69e-7dee-11eb-b92e-0022489ad614"> <topic>Node.js -- February 2021 Security Releases</topic> <affects> |