diff options
author | feld <feld@FreeBSD.org> | 2017-01-28 06:58:11 +0800 |
---|---|---|
committer | feld <feld@FreeBSD.org> | 2017-01-28 06:58:11 +0800 |
commit | 7d14ad32a9cdb74465a2ea1025b1f5d2a0af6ef6 (patch) | |
tree | 6c250fabfa6b2bb2141e9199459daaf583de845d | |
parent | 9616ccad75d4cb5b9224b7bd1f298244ca1051f5 (diff) | |
download | freebsd-ports-gnome-7d14ad32a9cdb74465a2ea1025b1f5d2a0af6ef6.tar.gz freebsd-ports-gnome-7d14ad32a9cdb74465a2ea1025b1f5d2a0af6ef6.tar.zst freebsd-ports-gnome-7d14ad32a9cdb74465a2ea1025b1f5d2a0af6ef6.zip |
Document vulnerability in net-mgmt/nfsen
-rw-r--r-- | security/vuxml/vuln.xml | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7b9263dcb9ae..4f0937f5b19c 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,32 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="6e83b2f3-e4e3-11e6-9ac1-a4badb2f4699"> + <topic>nfsen -- remote command execution</topic> + <affects> + <package> + <name>nfsen</name> + <range><lt>1.3.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Peter Haag reports:</p> + <blockquote cite="https://sourceforge.net/p/nfsen/mailman/message/35623845/"> + <p>A remote attacker with access to the web interface to + execute arbitrary commands on the host operating system.</p> + </blockquote> + </body> + </description> + <references> + <url>https://sourceforge.net/p/nfsen/mailman/message/35623845/</url> + </references> + <dates> + <discovery>2017-01-24</discovery> + <entry>2017-01-27</entry> + </dates> + </vuln> + <vuln vid="4b9ca994-e3d9-11e6-813d-e8e0b747a45a"> <topic>chromium -- multiple vulnerabilities</topic> <affects> |