Author: joeyh
Date: 2005-07-14 08:05:21 +0000 (Thu, 14 Jul 2005)
New Revision: 1381

Modified:
   data/CAN/list
Log:
CAN-2005-2116 rejected, move issues to other CAN


Modified: data/CAN/list
===================================================================
--- data/CAN/list       2005-07-14 07:40:43 UTC (rev 1380)
+++ data/CAN/list       2005-07-14 08:05:21 UTC (rev 1381)
@@ -115,14 +115,7 @@
 CAN-2005-XXXX [Insecure tempfile generation in ekg]
        - ekg (unfixed; bug #318059; medium)
 CAN-2005-2116 (Unknown vulnerability in the third-party XML-RPC library in 
Drupal ...)
-       NOTE: This will probably be re-organized by the CVE editor, but lets 
keep it for now,
-       NOTE: as it's the same issue
-       - drupal 4.5.4-1 (high)
-       - phpgroupware 0.9.16.006-1 (high)
-       - egroupware 1.0.0.007-3.dfsg-1 (high)
-       - phpwiki 1.3.7-4 (high)
-       - ewiki (unfixed)
-       NOTE: horde3 is not affected by this issue, they ship different XMLRPC 
code
+       NOTE: rejected
 CAN-2005-2115 (Soldier of Fortune II 1.02x and 1.03 allows remote attackers to 
cause ...)
        NOTE: not-for-us (Soldier of Fortune)
 CAN-2005-2114 (Mozilla 1.7.8, Firefox 1.0.4 and Camino 0.8.4 allow remote 
attackers ...)
@@ -1317,6 +1310,14 @@
        - clamav 0.86.1-1 (low)
 CAN-2005-1921 (PEAR XML_RPC 1.3.0 and earlier, as used in products such as 
WordPress, ...)
        TODO: Track ITP #312413
+       NOTE: This will probably be re-organized by the CVE editor, but lets 
keep it for now,
+       NOTE: as it's the same issue
+       - drupal 4.5.4-1 (high)
+       - phpgroupware 0.9.16.006-1 (high)
+       - egroupware 1.0.0.007-3.dfsg-1 (high)
+       - phpwiki 1.3.7-4 (high)
+       - ewiki (unfixed)
+       NOTE: horde3 is not affected by this issue, they ship different XMLRPC 
code
 CAN-2005-1920
        NOTE: reserved
 CAN-2005-1919


_______________________________________________
Secure-testing-commits mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/secure-testing-commits

Reply via email to