Date: Mon, 9 Jan 2023 10:16:48 GMT From: Li-Wen Hsu <lwhsu@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 276c0719eb5c - main - security/vuxml: Fix `make validate` Message-ID: <202301091016.309AGmBH024040@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by lwhsu: URL: https://cgit.FreeBSD.org/ports/commit/?id=276c0719eb5c609144e4e08691127d3f2c820410 commit 276c0719eb5c609144e4e08691127d3f2c820410 Author: Michael Glaus <michael.glaus@hostpoint.ch> AuthorDate: 2023-01-09 10:15:47 +0000 Commit: Li-Wen Hsu <lwhsu@FreeBSD.org> CommitDate: 2023-01-09 10:15:47 +0000 security/vuxml: Fix `make validate` PR: 268837 --- security/vuxml/vuln/2023.xml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 8aeb8c6e8caa..a435871a86b5 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,5 +1,5 @@ <vuln vid="59c284f4-8d2e-11ed-9ce0-b42e991fc52e"> - <topic> net-mgmt/cacti is vulnerable to remote command injection </topic> + <topic>net-mgmt/cacti is vulnerable to remote command injection</topic> <affects> <package> <name>cacti</name> @@ -10,12 +10,12 @@ <body xmlns="http://www.w3.org/1999/xhtml"> <p>cacti team reports:</p> <blockquote cite="https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf"> - <p> + <p> A command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. - </p> + </p> </blockquote> </body> </description> @@ -24,8 +24,9 @@ <url>https://nvd.nist.gov/vuln/detail/CVE-2022-46169</url> </references> <dates> - <discovery>12/05/2022</discovery> + <discovery>2022-12-05</discovery> <entry>2023-01-05</entry> + <modified>2023-01-09</modified> </dates> </vuln> @@ -122,4 +123,3 @@ <entry>2023-01-02</entry> </dates> </vuln> -
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202301091016.309AGmBH024040>