Date: Sun, 09 Apr 2023 15:50:50 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 270723] VuXML new entries for 20 vulnerable ports Message-ID: <bug-270723-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270723 Bug ID: 270723 Summary: VuXML new entries for 20 vulnerable ports Product: Ports & Packages Version: Latest Hardware: Any URL: https://github.com/HubTou/pysec2vuxml OS: Any Status: New Keywords: security Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: ports-secteam@FreeBSD.org Reporter: hubert.tournier@gmail.com CC: philip@FreeBSD.org Assignee: ports-secteam@FreeBSD.org Flags: maintainer-feedback?(ports-secteam@FreeBSD.org) Created attachment 241378 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D241378&action= =3Dedit VuXML new entries for 20 vulnerable ports A first batch of new VuXML entries for vulnerable ports discovered with pysec2vuxml (see https://github.com/HubTou/pysec2vuxml). Others will follow this week-end. Entries were verified with: # cd /usr/ports/security/vuxml # make validate --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-270723-7788>