git: 69f20ef2a482 - main - security/vuxml: add entry for net-mgmt/cacti < 1.2.29
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 06 Feb 2025 21:11:43 UTC
The branch main has been updated by rodrigo: URL: https://cgit.FreeBSD.org/ports/commit/?id=69f20ef2a482143502e32126a2f9307a8031b252 commit 69f20ef2a482143502e32126a2f9307a8031b252 Author: Rodrigo Osorio <rodrigo@FreeBSD.org> AuthorDate: 2025-02-06 20:32:21 +0000 Commit: Rodrigo Osorio <rodrigo@FreeBSD.org> CommitDate: 2025-02-06 21:08:13 +0000 security/vuxml: add entry for net-mgmt/cacti < 1.2.29 --- security/vuxml/vuln/2025.xml | 37 +++++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 09b12d17a4b9..f70870b2975f 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,40 @@ + <vuln vid="e7974ca5-e4c8-11ef-aab3-40b034429ecf"> + <topic>cacti -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>cacti</name> + <range><lt>1.2.29</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Cacti repo reports:</p> + <blockquote cite="https://github.com/Cacti/cacti/releases/tag/release%2F1.2.29"> + <ul> + <li>security #GHSA-c5j8-jxj3-hh36: Authenticated RCE via multi-line SNMP responses</li> + <li>security #GHSA-f9c7-7rc3-574c: SQL Injection vulnerability when using tree rules through Automation API</li> + <li>security #GHSA-fh3x-69rr-qqpp: SQL Injection vulnerability when request automation devices</li> + <li>security #GHSA-fxrq-fr7h-9rqq: Arbitrary File Creation leading to RCE</li> + <li>security #GHSA-pv2c-97pp-vxwg: Local File Inclusion (LFI) Vulnerability via Poller Standard Error Log Path</li> + <li>security #GHSA-vj9g-p7f2-4wqj: SQL Injection vulnerability when view host template</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-22604</cvename> + <cvename>CVE-2025-24368</cvename> + <cvename>CVE-2024-54145</cvename> + <cvename>CVE-2025-24367</cvename> + <cvename>CVE-2024-45598</cvename> + <cvename>CVE-2024-54146</cvename> + </references> + <dates> + <discovery>2025-02-02</discovery> + <entry>2025-02-05</entry> + </dates> + </vuln> + <vuln vid="9761af78-e3e4-11ef-9f4a-589cfc10a551"> <topic>nginx-devel -- SSL session reuse vulnerability</topic> <affects>