git: 276c0719eb5c - main - security/vuxml: Fix `make validate`

From: Li-Wen Hsu <lwhsu_at_FreeBSD.org>
Date: Mon, 09 Jan 2023 10:16:48 UTC
The branch main has been updated by lwhsu:

URL: https://cgit.FreeBSD.org/ports/commit/?id=276c0719eb5c609144e4e08691127d3f2c820410

commit 276c0719eb5c609144e4e08691127d3f2c820410
Author:     Michael Glaus <michael.glaus@hostpoint.ch>
AuthorDate: 2023-01-09 10:15:47 +0000
Commit:     Li-Wen Hsu <lwhsu@FreeBSD.org>
CommitDate: 2023-01-09 10:15:47 +0000

    security/vuxml: Fix `make validate`
    
    PR:             268837
---
 security/vuxml/vuln/2023.xml | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 8aeb8c6e8caa..a435871a86b5 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,5 +1,5 @@
   <vuln vid="59c284f4-8d2e-11ed-9ce0-b42e991fc52e">
-    <topic> net-mgmt/cacti is vulnerable to remote command injection </topic>
+    <topic>net-mgmt/cacti is vulnerable to remote command injection</topic>
     <affects>
       <package>
 	<name>cacti</name>
@@ -10,12 +10,12 @@
       <body xmlns="http://www.w3.org/1999/xhtml">
 	<p>cacti team reports:</p>
 	<blockquote cite="https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf">
-          <p>
+	<p>
 	    A command injection vulnerability allows an
 	    unauthenticated user to execute arbitrary code on a server
 	    running Cacti, if a specific data source was selected for
 	    any monitored device.
-          </p>
+	</p>
 	</blockquote>
       </body>
     </description>
@@ -24,8 +24,9 @@
       <url>https://nvd.nist.gov/vuln/detail/CVE-2022-46169</url>
     </references>
     <dates>
-      <discovery>12/05/2022</discovery>
+      <discovery>2022-12-05</discovery>
       <entry>2023-01-05</entry>
+      <modified>2023-01-09</modified>
     </dates>
   </vuln>
 
@@ -122,4 +123,3 @@
       <entry>2023-01-02</entry>
     </dates>
   </vuln>
-