Add entry for Cacti

PR:		248140
Sponsored by:	Netzkommune GmbH
This commit is contained in:
Jochen Neumeister 2020-07-27 08:48:46 +00:00
parent 1ddc202865
commit 068860a5e5
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=543507

View file

@ -58,6 +58,44 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="cd2dc126-cfe4-11ea-9172-4c72b94353b5">
<topic>Cacti -- multiple vulnerabilities</topic>
<affects>
<package>
<name>cacti</name>
<range><lt>1.2.13</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Cacti developers reports:</p>
<blockquote cite="https://www.cacti.net/release_notes.php?version=1.2.13">
<p>Multiple fixes for bundled jQuery to prevent
code exec (CVE-2020-11022, CVE-2020-11023).</p>
<p>PHPMail contains a escaping bug
(CVE-2020-13625).</p>
<p>SQL Injection via color.php in Cacti
(CVE-2020-14295).</p>
</blockquote>
</body>
</description>
<references>
<url>https://www.cacti.net/release_notes.php?version=1.2.13</url>
<url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022</url>
<url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</url>
<url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13625</url>
<url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14295</url>
<cvename>CVE-2020-11022</cvename>
<cvename>CVE-2020-11023</cvename>
<cvename>CVE-2020-13625</cvename>
<cvename>CVE-2020-14295</cvename>
</references>
<dates>
<discovery>2020-07-15</discovery>
<entry>2020-07-27</entry>
</dates>
</vuln>
<vuln vid="e1d3a580-cd8b-11ea-bad0-08002728f74c">
<topic>Wagtail -- XSS vulnerability</topic>
<affects>