svn commit: r441185 - head/security/vuxml
Larry Rosenman
ler at FreeBSD.org
Thu May 18 17:18:46 UTC 2017
Author: ler
Date: Thu May 18 17:18:44 2017
New Revision: 441185
URL: https://svnweb.freebsd.org/changeset/ports/441185
Log:
Add entry for Joomla3 20170501.
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu May 18 17:14:01 2017 (r441184)
+++ head/security/vuxml/vuln.xml Thu May 18 17:18:44 2017 (r441185)
@@ -58,6 +58,55 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3c2549b3-3bed-11e7-a9f0-a4badb296695">
+ <topic>Joomla3 -- SQL Injection</topic>
+ <affects>
+ <package>
+ <name>joomla3</name>
+ <range><ge>3.7.0</ge><lt>3.7.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>JSST reports:</p>
+ <blockquote cite="https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.html">
+ <p>[20170501] - Core - SQL Injection
+
+Project: Joomla!
+SubProject: CMS
+Severity: High
+Versions: 3.7.0
+Exploit type: SQL Injection
+Reported Date: 2017-May-11
+Fixed Date: 2017-May-17
+CVE Number: CVE-2017-8917
+Description
+
+Inadequate filtering of request data leads to a SQL Injection vulnerability.
+
+Affected Installs
+
+Joomla! CMS versions 3.7.0
+
+Solution
+
+Upgrade to version 3.7.1
+
+Contact
+
+The JSST at the Joomla! Security Centre.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.html</url>
+ </references>
+ <dates>
+ <discovery>2017-05-11</discovery>
+ <entry>2017-05-18</entry>
+ </dates>
+ </vuln>
+
<vuln vid="9704930c-3bb7-11e7-93f7-d43d7e971a1b">
<topic>gitlab -- Various security issues</topic>
<affects>
More information about the svn-ports-all
mailing list