svn commit: r441197 - head/security/vuxml
Larry Rosenman
ler at FreeBSD.org
Thu May 18 20:08:51 UTC 2017
Author: ler
Date: Thu May 18 20:08:49 2017
New Revision: 441197
URL: https://svnweb.freebsd.org/changeset/ports/441197
Log:
Clean up joomla3 entry.
Submitted by: zi
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu May 18 20:07:30 2017 (r441196)
+++ head/security/vuxml/vuln.xml Thu May 18 20:08:49 2017 (r441197)
@@ -63,44 +63,20 @@ Notes:
<affects>
<package>
<name>joomla3</name>
- <range><ge>3.7.0</ge><lt>3.7.1</lt></range>
+ <range><eq>3.7.0</eq></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>JSST reports:</p>
<blockquote cite="https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.html">
- <p>[20170501] - Core - SQL Injection
-
-Project: Joomla!
-SubProject: CMS
-Severity: High
-Versions: 3.7.0
-Exploit type: SQL Injection
-Reported Date: 2017-May-11
-Fixed Date: 2017-May-17
-CVE Number: CVE-2017-8917
-Description
-
-Inadequate filtering of request data leads to a SQL Injection vulnerability.
-
-Affected Installs
-
-Joomla! CMS versions 3.7.0
-
-Solution
-
-Upgrade to version 3.7.1
-
-Contact
-
-The JSST at the Joomla! Security Centre.</p>
+ <p>Inadequate filtering of request data leads to a SQL Injection vulnerability.</p>
</blockquote>
</body>
</description>
<references>
- <url>https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.html</url>
<cvename>CVE-2017-8917</cvename>
+ <url>https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.html</url>
</references>
<dates>
<discovery>2017-05-11</discovery>
More information about the svn-ports-head
mailing list