diff options
author | Tom Rhodes <trhodes@FreeBSD.org> | 2004-06-25 01:35:17 +0000 |
---|---|---|
committer | Tom Rhodes <trhodes@FreeBSD.org> | 2004-06-25 01:35:17 +0000 |
commit | 974bc49c9d8cb842222b7390dad63ce6902b3d2f (patch) | |
tree | e08568cd0b857d88351cb018f87ffca67e7dfe6c | |
parent | update to version 0.4.1 (diff) |
Move the Gallery entry to VuXML.
Notes
Notes:
svn path=/head/; revision=112186
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.txt | 1 | ||||
-rw-r--r-- | security/portaudit-db/database/portaudit.txt | 1 | ||||
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
3 files changed, 29 insertions, 2 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt index 8ec9317eb162..aaebb2352286 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.txt +++ b/ports-mgmt/portaudit-db/database/portaudit.txt @@ -3,7 +3,6 @@ apache>=2.*<2.0.49_1|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f apache+mod_ssl*<1.3.31+2.8.18|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f ru-apache+mod_ssl<1.3.31+30.20+2.8.18|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f -gallery<1.4.3.2|http://secunia.com/advisories/11752 http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=123|Gallery user authentication bypass vulnerability|253ea131-bd12-11d8-b071-00e08110b673 apache<1.3.31_1|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f apache+mod_ssl*<1.3.31+2.8.18_4|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f ru-apache+mod_ssl<=1.3.31+30.20+2.8.18|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt index 8ec9317eb162..aaebb2352286 100644 --- a/security/portaudit-db/database/portaudit.txt +++ b/security/portaudit-db/database/portaudit.txt @@ -3,7 +3,6 @@ apache>=2.*<2.0.49_1|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f apache+mod_ssl*<1.3.31+2.8.18|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f ru-apache+mod_ssl<1.3.31+30.20+2.8.18|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f -gallery<1.4.3.2|http://secunia.com/advisories/11752 http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=123|Gallery user authentication bypass vulnerability|253ea131-bd12-11d8-b071-00e08110b673 apache<1.3.31_1|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f apache+mod_ssl*<1.3.31+2.8.18_4|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f ru-apache+mod_ssl<=1.3.31+30.20+2.8.18|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 48a99cb92b9b..882efe8feb78 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,35 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="253ea131-bd12-11d8-b071-00e08110b673"> + <topic>Gallery 1.4.3 and ealier user authentication bypass</topic> + <affects> + <package> + <name>gallery</name> + <range><lt>1.4.3.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A flaw exists in Gallery versions previous to + 1.4.3-pl1 and post 1.2 which may give an attacker + the potential to log in under the "admin" account. + Data outside of the gallery is unaffected and the + attacker cannot modify any data other than the + photos or photo albums.</p> + </body> + </description> + <references> + <cvename>CAN-2004-0522</cvename> + <url>http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=123</url> + <url>http://secunia.com/advisories/11752</url> + </references> + <dates> + <discovery>2004-06-01</discovery> + <entry>TO BE FILLED BEFORE COMMIT</entry> + </dates> + </vuln> + <vuln vid="6f955451-ba54-11d8-b88c-000d610a3b12"> <topic>Buffer overflow in Squid NTLM authentication helper</topic> <affects> |