Date: Thu, 01 Oct 2015 02:17:51 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 203462] www/zend-framework1: security/vuxml: update to 1.12.16 (fixed ZF2015-08 SQL injection advisory) Message-ID: <bug-203462-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=203462 Bug ID: 203462 Summary: www/zend-framework1: security/vuxml: update to 1.12.16 (fixed ZF2015-08 SQL injection advisory) Product: Ports & Packages Version: Latest Hardware: Any URL: http://framework.zend.com/security/advisory/ZF2015-08 OS: Any Status: New Keywords: needs-patch, security Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: junovitch@freebsd.org CC: ports-secteam@FreeBSD.org, wg@FreeBSD.org CC: ports-secteam@FreeBSD.org, wg@FreeBSD.org Security Advisory ZF2015-08: Potential SQL injection vector using null byte for PDO (MsSql, SQLite) Full Text: http://framework.zend.com/security/advisory/ZF2015-08 -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-203462-13>