aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorniels <niels@FreeBSD.org>2010-05-08 03:53:26 +0800
committerniels <niels@FreeBSD.org>2010-05-08 03:53:26 +0800
commitd5ff476de0d35edc72490f1854f767e59d2d23a0 (patch)
tree4b827f5971448df6be4fe8be201b9f2dec430732 /security
parente46c846175b3df721ceeb461958d172484eff476 (diff)
downloadfreebsd-ports-gnome-d5ff476de0d35edc72490f1854f767e59d2d23a0.tar.gz
freebsd-ports-gnome-d5ff476de0d35edc72490f1854f767e59d2d23a0.tar.zst
freebsd-ports-gnome-d5ff476de0d35edc72490f1854f767e59d2d23a0.zip
Added wireshark (DoS) and piwik (XSS) issues
Approved by: itetcu (mentor, implicit) Security: http://www.wireshark.org/security/wnpa-sec-2010-03.html Security: http://www.wireshark.org/security/wnpa-sec-2010-04.html Security: http://piwik.org/blog/2010/04/piwik-0-6-security-advisory/
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml57
1 files changed, 57 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index bb5fc402ccb9..354d78cf4ed9 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,63 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="28022228-5a0e-11df-942d-0015587e2cc1">
+ <topic>wireshark -- DOCSIS dissector denial of service</topic>
+ <affects>
+ <package>
+ <name>wireshark</name>
+ <range><le>1.2.6_1</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A vulnerability found in the DOCSIS dissector can cause
+ Wireshark to crash when a malformed packet trace file is
+ opened. This means that an attacker will have to trick a
+ victim into opening such a trace file before being able
+ to crash the application</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2010-1455</cvename>
+ <url>http://www.wireshark.org/security/wnpa-sec-2010-03.html</url>
+ <url>http://www.wireshark.org/security/wnpa-sec-2010-04.html</url>
+ </references>
+ <dates>
+ <discovery>2010-05-05</discovery>
+ <entry>2010-05-07</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c0869649-5a0c-11df-942d-0015587e2cc1">
+ <topic>piwik -- cross site scripting vulnerability</topic>
+ <affects>
+ <package>
+ <name>piwik</name>
+ <range><le>0.5.5</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Piwik security advisory reports:</p>
+ <blockquote cite="http://piwik.org/blog/2010/04/piwik-0-6-security-advisory/">
+ <p>A non-persistent, cross-site scripting vulnerability
+ (XSS) was found in Piwik's Login form that reflected
+ the form_url parameter without being properly escaped
+ or filtered.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2010-1453</cvename>
+ <url>http://piwik.org/blog/2010/04/piwik-0-6-security-advisory/</url>
+ </references>
+ <dates>
+ <discovery>2010-04-15</discovery>
+ <entry>2010-05-07</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7132c842-58e2-11df-8d80-0015587e2cc1">
<topic>spamass-milter -- remote command execution vulnerability</topic>
<affects>