From owner-svn-ports-all@FreeBSD.ORG Fri Jul 27 13:20:23 2012 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 99FC7106566B; Fri, 27 Jul 2012 13:20:23 +0000 (UTC) (envelope-from miwi@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:4f8:fff6::2c]) by mx1.freebsd.org (Postfix) with ESMTP id 6C5C68FC0C; Fri, 27 Jul 2012 13:20:23 +0000 (UTC) Received: from svn.freebsd.org (localhost [127.0.0.1]) by svn.freebsd.org (8.14.4/8.14.4) with ESMTP id q6RDKNA2009174; Fri, 27 Jul 2012 13:20:23 GMT (envelope-from miwi@svn.freebsd.org) Received: (from miwi@localhost) by svn.freebsd.org (8.14.4/8.14.4/Submit) id q6RDKMVf009171; Fri, 27 Jul 2012 13:20:23 GMT (envelope-from miwi@svn.freebsd.org) Message-Id: <201207271320.q6RDKMVf009171@svn.freebsd.org> From: Martin Wilke Date: Fri, 27 Jul 2012 13:20:22 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Cc: Subject: svn commit: r301610 - head/security/vuxml X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 27 Jul 2012 13:20:23 -0000 Author: miwi Date: Fri Jul 27 13:20:22 2012 New Revision: 301610 URL: http://svn.freebsd.org/changeset/ports/301610 Log: - Whitespace only fixes. Please care more about formating. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Jul 27 12:58:30 2012 (r301609) +++ head/security/vuxml/vuln.xml Fri Jul 27 13:20:22 2012 (r301610) @@ -563,17 +563,17 @@ Note: Please add new entries to the beg - - phpList -- SQL injection and XSS vulnerability + + phpList -- SQL injection and XSS vulnerability - phplist - 2.10.17 + phplist + 2.10.17 -

Zero Science Lab reports:

+

Zero Science Lab reports:

Input passed via the parameter 'sortby' is not properly sanitised before being returned to the user or used in SQL queries. @@ -584,16 +584,16 @@ Note: Please add new entries to the beg

- - CVE-2012-2740 - CVE-2012-2741 - 52657 - https://www.phplist.com/?lid=567 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5081.php + + CVE-2012-2740 + CVE-2012-2741 + 52657 + https://www.phplist.com/?lid=567 + http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5081.php - 2012-03-21 - 2012-07-02 + 2012-03-21 + 2012-07-02