Date: Wed, 1 Apr 2020 22:06:18 +0000 (UTC) From: Ben Woods <woodsb02@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r530246 - head/security/vuxml Message-ID: <202004012206.031M6IV1026147@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: woodsb02 Date: Wed Apr 1 22:06:18 2020 New Revision: 530246 URL: https://svnweb.freebsd.org/changeset/ports/530246 Log: Document multiple vulnerabilities in net-mgmt/cacti < 1.2.10 PR: 245205 Submitted by: Michael Muenz <m.muenz@gmail.com> Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Apr 1 22:02:53 2020 (r530245) +++ head/security/vuxml/vuln.xml Wed Apr 1 22:06:18 2020 (r530246) @@ -58,6 +58,43 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="e2b564fc-7462-11ea-af63-38d547003487"> + <topic>cacti -- multiple vulnerabilities</topic> + <affects> + <package> + <name>cacti</name> + <range><lt>1.2.10</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Cacti developers reports:</p> + <blockquote cite="https://github.com/Cacti/cacti/releases/tag/release%2F1.2.10"> + <p>When guest users have access to realtime graphs, remote code + could be executed (CVE-2020-8813).</p> + <p>Lack of escaping on some pages can lead to XSS exposure + (CVE-2020-7106).</p> + <p>Remote Code Execution due to input validation failure in + Performance Boost Debug Log (CVE-2020-7237).</p> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/Cacti/cacti/releases/tag/release%2F1.2.10</url> + <url>https://nvd.nist.gov/vuln/detail/CVE-2020-8813</url> + <url>https://nvd.nist.gov/vuln/detail/CVE-2020-7106</url> + <url>https://nvd.nist.gov/vuln/detail/CVE-2020-7237</url> + <cvename>CVE-2020-8813</cvename> + <cvename>CVE-2020-7106</cvename> + <cvename>CVE-2020-7237</cvename> + <freebsdpr>ports/245198</freebsdpr> + </references> + <dates> + <discovery>2020-02-04</discovery> + <entry>2020-04-02</entry> + </dates> + </vuln> + <vuln vid="d887b3d9-7366-11ea-b81a-001cc0382b2f"> <topic>GnuTLS -- flaw in DTLS protocol implementation</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202004012206.031M6IV1026147>