diff options
author | nectar <nectar@FreeBSD.org> | 2005-01-24 23:29:18 +0800 |
---|---|---|
committer | nectar <nectar@FreeBSD.org> | 2005-01-24 23:29:18 +0800 |
commit | 5166870cc56f409674723b030a34a86245a271c2 (patch) | |
tree | 97ceed830f7310b8d67a41386044352d533ca7d4 | |
parent | 57789f33a9c638aeadf08945d768a2c4c1427c54 (diff) | |
download | freebsd-ports-gnome-5166870cc56f409674723b030a34a86245a271c2.tar.gz freebsd-ports-gnome-5166870cc56f409674723b030a34a86245a271c2.tar.zst freebsd-ports-gnome-5166870cc56f409674723b030a34a86245a271c2.zip |
Cancel duplicate phpbb entry e8c6ade2-6bcc-11d9-8e6f-000a95bc6fae. It
was already documented as e3cf89f0-53da-11d9-92b7-ceadd4ac2edd.
Useful references and descriptions were merged.
Noticed by: simon
-rw-r--r-- | security/vuxml/vuln.xml | 81 |
1 files changed, 32 insertions, 49 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index a97af23302aa..78484201502b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -192,44 +192,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. </vuln> <vuln vid="e8c6ade2-6bcc-11d9-8e6f-000a95bc6fae"> - <topic>phpbb -- multiple vulnerabilities include XSS and SQL injection</topic> - <affects> - <package> - <name>phpbb</name> - <range><lt>2.0.11</lt></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>The ChangeLog for phpBB 2.0.11 states:</p> - <blockquote cite="http://www.phpbb.com/support/documents.php?mode=changelog"> - <p>Changes since 2.0.10</p> - <ul> - <li>Fixed vulnerability in highlighting code (<strong>very - high severity, please update your installation as soon - as possible</strong>)</li> - <li>Fixed unsetting global vars - <strong>Matt - Kavanagh</strong></li> - <li>Fixed XSS vulnerability in username handling - - <strong>AnthraX101</strong></li> - <li>Fixed not confirmed sql injection in username handling - - <strong>warmth</strong></li> - <li>Added check for empty topic id in topic_review - function</li> - <li>Added visual confirmation mod to code base</li> - </ul> - </blockquote> - </body> - </description> - <references> - <url>http://www.phpbb.com/support/documents.php?mode=changelog</url> - <url>http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=240636</url> - <freebsdpr>ports/74106</freebsdpr> - </references> - <dates> - <discovery>2004-11-18</discovery> - <entry>2005-01-21</entry> - </dates> + <cancelled superseded="e3cf89f0-53da-11d9-92b7-ceadd4ac2edd" /> </vuln> <vuln vid="1489df94-6bcb-11d9-a21e-000a95bc6fae"> @@ -12026,31 +11989,51 @@ misc.c: <cancelled/> </vuln> - <vuln vid="e3cf89f0-53da-11d9-92b7-ceadd4ac2edd"> - <topic>phpbb -- arbitrary command execution vulnerability</topic> + <vuln vid="e3cf89f0-53da-11d9-92b7-ceadd4ac2edd"> + <topic>phpbb -- arbitrary command execution and other vulnerabilities</topic> <affects> <package> - <name>phpbb</name> + <name>phpbb</name> <range><lt>2.0.11</lt></range> </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>A US-CERT Technical Cyber Security Alert reports:</p> + <p>The ChangeLog for phpBB 2.0.11 states:</p> + <blockquote cite="http://www.phpbb.com/support/documents.php?mode=changelog"> + <p>Changes since 2.0.10</p> + <ul> + <li>Fixed vulnerability in highlighting code (<strong>very + high severity, please update your installation as soon + as possible</strong>)</li> + <li>Fixed unsetting global vars - <strong>Matt + Kavanagh</strong></li> + <li>Fixed XSS vulnerability in username handling + - <strong>AnthraX101</strong></li> + <li>Fixed not confirmed sql injection in username handling + - <strong>warmth</strong></li> + <li>Added check for empty topic id in topic_review + function</li> + <li>Added visual confirmation mod to code base</li> + </ul> + </blockquote> + <p>Additionally, a US-CERT Technical Cyber Security Alert reports:</p> <blockquote cite="http://www.us-cert.gov/cas/techalerts/TA04-356A.html"> - <p>phpBB contains an user input validation problem with regard to - the parsing of the URL. An intruder can deface a phpBB website, execute - arbitrary commands, or gain administrative privileges on a compromised - bulletin board.</p> + <p>phpBB contains an user input validation problem with + regard to the parsing of the URL. An intruder can deface a + phpBB website, execute arbitrary commands, or gain + administrative privileges on a compromised bulletin + board.</p> </blockquote> </body> </description> - <references> + <references> <cvename>CAN-2004-1315</cvename> - <freebsdpr>ports/74106</freebsdpr> + <freebsdpr>ports/74106</freebsdpr> <uscertta>TA04-356A</uscertta> <certvu>497400</certvu> + <url>http://www.phpbb.com/support/documents.php?mode=changelog</url> <mlist msgid="20041113030542.11396.qmail@www.securityfocus.com">http://marc.theaimsgroup.com/?l=bugtraq&m=110029415208724</mlist> <mlist msgid="20041118123055.28647.qmail@mail.securityfocus.com">http://marc.theaimsgroup.com/?l=bugtraq&m=110079436714518</mlist> <url>http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=240636</url> @@ -12058,7 +12041,7 @@ misc.c: <dates> <discovery>2004-11-18</discovery> <entry>2004-12-22</entry> - <modified>2005-01-19</modified> + <modified>2005-01-24</modified> </dates> </vuln> |