<vuln vid="f4bc80f4-da62-11d8-90ea-0004ac98a7b9"> (1)
<topic>Several vulnerabilities found in Foo</topic> (2)
<affects>
<package>
<name>foo</name> (3)
<name>foo-devel</name>
<name>ja-foo</name>
<range><ge>1.6</ge><lt>1.9</lt></range> (4)
<range><ge>2.*</ge><lt>2.4_1</lt></range>
<range><eq>3.0b1</eq></range>
</package>
<package>
<name>openfoo</name> (5)
<range><lt>1.10_7</lt></range> (6)
<range><ge>1.2,1</ge><lt>1.3_1,1</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>J. Random Hacker reports:</p> (7)
<blockquote
cite="http://j.r.hacker.com/advisories/1">
<p>Several issues in the Foo software may be exploited
via carefully crafted QUUX requests. These requests will
permit the injection of Bar code, mumble theft, and the
readability of the Foo administrator account.</p>
</blockquote>
</body>
</description>
<references> (8)
<freebsdsa>SA-10:75.foo</freebsdsa> (9)
<freebsdpr>ports/987654</freebsdpr> (10)
<cvename>CAN-2010-0201</cvename> (11)
<cvename>CAN-2010-0466</cvename>
<bid>96298</bid> (12)
<certsa>CA-2010-99</certsa> (13)
<certvu>740169</certvu> (14)
<uscertsa>SA10-99A</uscertsa> (15)
<uscertta>SA10-99A</uscertta> (16)
<mlist msgid="201075606@hacker.com">http://marc.theaimsgroup.com/?l=bugtraq&m=203886607825605</mlist> (17)
<url>http://j.r.hacker.com/advisories/1</url> (18)
</references>
<dates>
<discovery>2010-05-25</discovery> (19)
<entry>2010-07-13</entry> (20)
<modified>2010-09-17</modified> (21)
</dates>
</vuln>