diff options
author | ak <ak@FreeBSD.org> | 2013-10-17 18:56:56 +0800 |
---|---|---|
committer | ak <ak@FreeBSD.org> | 2013-10-17 18:56:56 +0800 |
commit | 435b647df772ea6222228940bec0f7c494556482 (patch) | |
tree | 749a04a948ad7a35e38cb9bc081becbd08016a7b /security | |
parent | 01cec46fc2b7d4e0d4679c1af9867c2e3c1c5124 (diff) | |
download | freebsd-ports-gnome-435b647df772ea6222228940bec0f7c494556482.tar.gz freebsd-ports-gnome-435b647df772ea6222228940bec0f7c494556482.tar.zst freebsd-ports-gnome-435b647df772ea6222228940bec0f7c494556482.zip |
- Fix year, move entry up
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 64 |
1 files changed, 32 insertions, 32 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b3d81c72582b..93aea1b217d4 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,38 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8c9b48d1-3715-11e3-a624-00262d8b701d"> + <topic>dropbear -- exposure of sensitive information, DoS</topic> + <affects> + <package> + <name>dropbear</name> + <range><ge>2012.55</ge><lt>2013.59</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Dropbear project reports:</p> + <blockquote cite="http://secunia.com/advisories/55173/"> + <p>A weakness and a vulnerability have been reported in Dropbear + SSH Server, which can be exploited by malicious people to disclose + certain sensitive information and cause a DoS.</p> + </blockquote> + </body> + </description> + <references> + <bid>62958</bid> + <bid>62993</bid> + <cvename>CVE-2013-4421</cvename> + <cvename>CVE-2013-4434</cvename> + <url>http://secunia.com/advisories/55173</url> + </references> + <dates> + <discovery>2013-05-08</discovery> + <discovery>2013-10-03</discovery> + <entry>2013-10-17</entry> + </dates> + </vuln> + <vuln vid="710cd5d5-35cb-11e3-85f9-00262d5ed8ee"> <topic>chromium -- multiple vulnerabilities</topic> <affects> @@ -90,38 +122,6 @@ Note: Please add new entries to the beginning of this file. </dates> </vuln> - <vuln vid="8c9b48d1-3715-11e3-a624-00262d8b701d"> - <topic>dropbear -- exposure of sensitive information, DoS</topic> - <affects> - <package> - <name>dropbear</name> - <range><ge>2012.55</ge><lt>2013.59</lt></range> - </package> - </affects> - <description> - <body xmlns="http://www.w3.org/1999/xhtml"> - <p>The Dropbear project reports:</p> - <blockquote cite="http://secunia.com/advisories/55173/"> - <p>A weakness and a vulnerability have been reported in Dropbear - SSH Server, which can be exploited by malicious people to disclose - certain sensitive information and cause a DoS.</p> - </blockquote> - </body> - </description> - <references> - <bid>62958</bid> - <bid>62993</bid> - <cvename>CVE-2013-4421</cvename> - <cvename>CVE-2013-4434</cvename> - <url>http://secunia.com/advisories/55173</url> - </references> - <dates> - <discovery>2013-05-08</discovery> - <discovery>2013-10-03</discovery> - <entry>2012-10-17</entry> - </dates> - </vuln> - <vuln vid="9003b500-31e3-11e3-b0d0-20cf30e32f6d"> <topic>mod_fcgid -- possible heap buffer overwrite</topic> <affects> |