aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authortrhodes <trhodes@FreeBSD.org>2004-06-28 11:58:47 +0800
committertrhodes <trhodes@FreeBSD.org>2004-06-28 11:58:47 +0800
commit3c6d6ecf2daf712ab9c56c1a019b1b32a13c4aa5 (patch)
tree0d35dc3b1fce5bc686b0382c0694a0db9a070986 /security
parentb3fb5053aca5fe161817e9eed4c31f9ad3a529a5 (diff)
downloadfreebsd-ports-graphics-3c6d6ecf2daf712ab9c56c1a019b1b32a13c4aa5.tar.gz
freebsd-ports-graphics-3c6d6ecf2daf712ab9c56c1a019b1b32a13c4aa5.tar.zst
freebsd-ports-graphics-3c6d6ecf2daf712ab9c56c1a019b1b32a13c4aa5.zip
Move MoinMoin entry to VuXML.
Diffstat (limited to 'security')
-rw-r--r--security/portaudit-db/database/portaudit.txt1
-rw-r--r--security/vuxml/vuln.xml24
2 files changed, 24 insertions, 1 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt
index 11d3718d087..dcca90b28ac 100644
--- a/security/portaudit-db/database/portaudit.txt
+++ b/security/portaudit-db/database/portaudit.txt
@@ -13,7 +13,6 @@ imp<3.2.4|http://article.gmane.org/gmane.comp.horde.imp/14421/|imp: XSS hole exp
chora<1.2.2|http://article.gmane.org/gmane.comp.horde.chora/610/|chora: hole in the diff code that allowed malicious input|9e09399d-bd21-11d8-84f9-000bdb1444a4
squirrelmail<1.4.3a|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0519 http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt|SquirrelMail XSS vulnerability|89a0de27-bf66-11d8-a252-02e0185c0b53
ja-squirrelmail<1.4.3a,1|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0519 http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt|SquirrelMail XSS vulnerability|89a0de27-bf66-11d8-a252-02e0185c0b53
-moinmoin<1.2.2|http://www.osvdb.org/6704|MoinMoin administrative group name privilege escalation vulnerability|da9e6438-bfc0-11d8-b00e-000347a4fa7d
phpnuke<=7.3|http://www.waraxe.us/?modname=sa&id=032 http://secunia.com/advisories/11920|Multiple security flaws in PhpNuke 6.x - 7.3|33ab4a47-bfc1-11d8-b00e-000347a4fa7d
webmin<1.150|http://www.webmin.com/changes-1.150.html http://www.osvdb.org/6729 http://www.osvdb.org/6730|Multiple vulnerabilities in Webmin|ab61715f-c027-11d8-b00e-000347a4fa7d
racoon<20040617a|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022617.html http://www.securityfocus.com/archive/1/366023 http://securitytracker.com/alerts/2004/Jun/1010495.html http://orange.kame.net/dev/cvsweb.cgi/kame/kame/kame/racoon/crypto_openssl.c#rev1.86|Racoon may validate invalid certificates|a96c1d37-c033-11d8-b00e-000347a4fa7d
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 4eda45a89e7..c2b4b89e130 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,30 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="da9e6438-bfc0-11d8-b00e-000347a4fa7d">
+ <topic>MoinMoin administrative group name privilege escalation vulnerability</topic>
+ <affects>
+ <package>
+ <name>moinmoin</name>
+ <range><lt>1.2.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A serious flaw exists in the MoinMoin software
+ which may allow a malicious user to gain access to
+ unauthorized privileges.</p>
+ </body>
+ </description>
+ <references>
+ <url>http://www.osvdb.org/6704</url>
+ </references>
+ <dates>
+ <discovery>2004-05-04</discovery>
+ <entry>2004-06-28</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7a9d5dfe-c507-11d8-8898-000d6111a684">
<topic>isc-dhcp3-server buffer overflow in logging mechanism</topic>
<affects>