diff options
author | trhodes <trhodes@FreeBSD.org> | 2004-06-25 09:35:17 +0800 |
---|---|---|
committer | trhodes <trhodes@FreeBSD.org> | 2004-06-25 09:35:17 +0800 |
commit | fe2521f313435792c33e4a93ac2a0f5eb9ecaf58 (patch) | |
tree | ee48195475bea8855387a35a2f5e7d105d889d9d /security | |
parent | 81fa18aba03b5c6c5103bfa4e5fa35e33ce205d6 (diff) | |
download | freebsd-ports-gnome-fe2521f313435792c33e4a93ac2a0f5eb9ecaf58.tar.gz freebsd-ports-gnome-fe2521f313435792c33e4a93ac2a0f5eb9ecaf58.tar.zst freebsd-ports-gnome-fe2521f313435792c33e4a93ac2a0f5eb9ecaf58.zip |
Move the Gallery entry to VuXML.
Diffstat (limited to 'security')
-rw-r--r-- | security/portaudit-db/database/portaudit.txt | 1 | ||||
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
2 files changed, 29 insertions, 1 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt index 8ec9317eb162..aaebb2352286 100644 --- a/security/portaudit-db/database/portaudit.txt +++ b/security/portaudit-db/database/portaudit.txt @@ -3,7 +3,6 @@ apache>=2.*<2.0.49_1|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f apache+mod_ssl*<1.3.31+2.8.18|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f ru-apache+mod_ssl<1.3.31+30.20+2.8.18|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0488|mod_ssl stack-based buffer overflow|662cd99e-bc9d-11d8-916c-000347dd607f -gallery<1.4.3.2|http://secunia.com/advisories/11752 http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=123|Gallery user authentication bypass vulnerability|253ea131-bd12-11d8-b071-00e08110b673 apache<1.3.31_1|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f apache+mod_ssl*<1.3.31+2.8.18_4|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f ru-apache+mod_ssl<=1.3.31+30.20+2.8.18|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 48a99cb92b9b..882efe8feb78 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,35 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="253ea131-bd12-11d8-b071-00e08110b673"> + <topic>Gallery 1.4.3 and ealier user authentication bypass</topic> + <affects> + <package> + <name>gallery</name> + <range><lt>1.4.3.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A flaw exists in Gallery versions previous to + 1.4.3-pl1 and post 1.2 which may give an attacker + the potential to log in under the "admin" account. + Data outside of the gallery is unaffected and the + attacker cannot modify any data other than the + photos or photo albums.</p> + </body> + </description> + <references> + <cvename>CAN-2004-0522</cvename> + <url>http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=123</url> + <url>http://secunia.com/advisories/11752</url> + </references> + <dates> + <discovery>2004-06-01</discovery> + <entry>TO BE FILLED BEFORE COMMIT</entry> + </dates> + </vuln> + <vuln vid="6f955451-ba54-11d8-b88c-000d610a3b12"> <topic>Buffer overflow in Squid NTLM authentication helper</topic> <affects> |