git: 69f20ef2a482 - main - security/vuxml: add entry for net-mgmt/cacti < 1.2.29
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 06 Feb 2025 21:11:43 UTC
The branch main has been updated by rodrigo:
URL: https://cgit.FreeBSD.org/ports/commit/?id=69f20ef2a482143502e32126a2f9307a8031b252
commit 69f20ef2a482143502e32126a2f9307a8031b252
Author: Rodrigo Osorio <rodrigo@FreeBSD.org>
AuthorDate: 2025-02-06 20:32:21 +0000
Commit: Rodrigo Osorio <rodrigo@FreeBSD.org>
CommitDate: 2025-02-06 21:08:13 +0000
security/vuxml: add entry for net-mgmt/cacti < 1.2.29
---
security/vuxml/vuln/2025.xml | 37 +++++++++++++++++++++++++++++++++++++
1 file changed, 37 insertions(+)
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 09b12d17a4b9..f70870b2975f 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,40 @@
+ <vuln vid="e7974ca5-e4c8-11ef-aab3-40b034429ecf">
+ <topic>cacti -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>cacti</name>
+ <range><lt>1.2.29</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Cacti repo reports:</p>
+ <blockquote cite="https://github.com/Cacti/cacti/releases/tag/release%2F1.2.29">
+ <ul>
+ <li>security #GHSA-c5j8-jxj3-hh36: Authenticated RCE via multi-line SNMP responses</li>
+ <li>security #GHSA-f9c7-7rc3-574c: SQL Injection vulnerability when using tree rules through Automation API</li>
+ <li>security #GHSA-fh3x-69rr-qqpp: SQL Injection vulnerability when request automation devices</li>
+ <li>security #GHSA-fxrq-fr7h-9rqq: Arbitrary File Creation leading to RCE</li>
+ <li>security #GHSA-pv2c-97pp-vxwg: Local File Inclusion (LFI) Vulnerability via Poller Standard Error Log Path</li>
+ <li>security #GHSA-vj9g-p7f2-4wqj: SQL Injection vulnerability when view host template</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-22604</cvename>
+ <cvename>CVE-2025-24368</cvename>
+ <cvename>CVE-2024-54145</cvename>
+ <cvename>CVE-2025-24367</cvename>
+ <cvename>CVE-2024-45598</cvename>
+ <cvename>CVE-2024-54146</cvename>
+ </references>
+ <dates>
+ <discovery>2025-02-02</discovery>
+ <entry>2025-02-05</entry>
+ </dates>
+ </vuln>
+
<vuln vid="9761af78-e3e4-11ef-9f4a-589cfc10a551">
<topic>nginx-devel -- SSL session reuse vulnerability</topic>
<affects>