FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

nothing found there

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
0c5cf7c4-856e-11e4-a089-60a44c524f57otrs -- Incomplete Access Control

The OTRS project reports:

An attacker with valid OTRS credentials could access and manipulate ticket data of other users via the GenericInterface, if a ticket webservice is configured and not additionally secured.


Discovery 2014-12-16
Entry 2014-12-16
otrs
gt 3.2.* lt 3.2.17

gt 3.3.* lt 3.3.11

gt 4.0.* lt 4.0.3

http://www.otrs.com/security-advisory-2014-06-incomplete-access-control/
CVE-2014-9324
c7b5d72b-886a-11e3-9533-60a44c524f57otrs -- multiple vulnerabilities

The OTRS Project reports:

SQL injection issue

An attacker that managed to take over the session of a logged in customer could create tickets and/or send follow-ups to existing tickets due to missing challenge token checks.


Discovery 2014-01-28
Entry 2014-01-28
Modified 2014-02-06
otrs
lt 3.1.19

gt 3.2.* lt 3.2.14

gt 3.3.* lt 3.3.4

CVE-2014-1471
https://www.otrs.com/security-advisory-2014-02-sql-injection-issue/
https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface/
70b72a52-9e54-11e3-babe-60a44c524f57otrs -- XSS Issue

The OTRS Project reports:

An attacker could send a specially prepared HTML email to OTRS. If he can then trick an agent into following a special link to display this email, JavaScript code would be executed.


Discovery 2014-02-25
Entry 2014-02-25
otrs
lt 3.1.20

gt 3.2.* lt 3.2.15

gt 3.3.* lt 3.3.5

https://www.otrs.com/security-advisory-2014-03-xss-issue/
CVE-2014-1695
1e7f0c11-673a-11e5-98c8-60a44c524f57otrs -- Scheduler Process ID File Access

The OTRS project reports:

An attacker with valid LOCAL credentials could access and manipulate the process ID file for bin/otrs.schduler.pl from the CLI.

The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.


Discovery 2015-09-17
Entry 2015-09-30
otrs
gt 3.2.* lt 3.2.18

gt 3.3.* lt 3.3.15

gt 4.0.* lt 4.0.13

https://www.otrs.com/security-advisory-2015-02-scheduler-process-id-file-access/
CVE-2015-6842
CVE-2013-7135
cebd05d6-ed7b-11e7-95f2-005056925db4OTRS -- Multiple vulnerabilities

OTRS reports:

An attacker who is logged into OTRS as an agent can request special URLs from OTRS which can lead to the execution of shell commands with the permissions of the web server user.

An attacker who is logged into OTRS as a customer can use the ticket search form to disclose internal article information of their customer tickets.

An attacker who is logged into OTRS as an agent can manipulate form parameters and execute arbitrary shell commands with the permissions of the OTRS or web server user.

An attacker can send a specially prepared email to an OTRS system. If this system has cookie support disabled, and a logged in agent clicks a link in this email, the session information could be leaked to external systems, allowing the attacker to take over the agent’s session.


Discovery 2017-11-21
Entry 2017-12-30
otrs
lt 5.0.26

CVE-2017-16664
CVE-2017-16854
CVE-2017-16921
ports/224729
https://www.otrs.com/security-advisory-2017-07-security-update-otrs-framework/
https://www.otrs.com/security-advisory-2017-08-security-update-otrs-framework/
https://www.otrs.com/security-advisory-2017-09-security-update-otrs-framework/
https://www.otrs.com/security-advisory-2017-10-security-update-otrs-framework/
ffa7c6e4-bb29-11e3-8136-60a44c524f57otrs -- Clickjacking issue

The OTRS Project reports:

An attacker could embed OTRS in a hidden iframe tag of another page, tricking the user into clicking links in OTRS.


Discovery 2014-04-01
Entry 2014-04-03
otrs
lt 3.1.21

gt 3.2.* lt 3.2.16

gt 3.3.* lt 3.3.6

http://www.w3.org/1999/xhtml
CVE-2014-2554