From owner-cvs-ports@FreeBSD.ORG Sat Aug 27 18:17:24 2005 Return-Path: X-Original-To: cvs-ports@FreeBSD.org Delivered-To: cvs-ports@FreeBSD.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id B704816A41F; Sat, 27 Aug 2005 18:17:24 +0000 (GMT) (envelope-from simon@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id 7592043D46; Sat, 27 Aug 2005 18:17:24 +0000 (GMT) (envelope-from simon@FreeBSD.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.1/8.13.1) with ESMTP id j7RIHOxR075707; Sat, 27 Aug 2005 18:17:24 GMT (envelope-from simon@repoman.freebsd.org) Received: (from simon@localhost) by repoman.freebsd.org (8.13.1/8.13.1/Submit) id j7RIHOXK075706; Sat, 27 Aug 2005 18:17:24 GMT (envelope-from simon) Message-Id: <200508271817.j7RIHOXK075706@repoman.freebsd.org> From: "Simon L. Nielsen" Date: Sat, 27 Aug 2005 18:17:24 +0000 (UTC) To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: HEAD Cc: Subject: cvs commit: ports/security/vuxml vuln.xml X-BeenThere: cvs-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: CVS commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 27 Aug 2005 18:17:24 -0000 simon 2005-08-27 18:17:24 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: Mark phpgroupware as vulnerable to pear-XML_RPC -- remote PHP code injection vulnerability. Reported by: olgeni Approved by: portmgr (blanket, VuXML) Revision Changes Path 1.798 +7 -2 ports/security/vuxml/vuln.xml