summaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorRemko Lodder <remko@FreeBSD.org>2007-04-08 19:58:35 +0000
committerRemko Lodder <remko@FreeBSD.org>2007-04-08 19:58:35 +0000
commit61fb9e495ff47f9aad9060aaa81b1c18dbba1d61 (patch)
tree6fe2589393856ad83703f8979637e69c98c8e0f1 /security/vuxml
parentReference the VuXML entry for the FORBIDDEN reason. (diff)
Stylify the latest zope entry:
o Use consistent title description o Use tabs when 8 spaces are hit o Sort the references list (the alphabet goes from a to z) o Bump modification date (note: please check the entry date so that it matches the correct data of insertion). Also stylify the latest mcweject entry.
Notes
Notes: svn path=/head/; revision=189510
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml41
1 files changed, 21 insertions, 20 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index be7bd39012da..dcbe847e2899 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -44,19 +44,19 @@ Note: Please add new entries to the beginning of this file.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>CVE reports:</p>
+ <p>CVE reports:</p>
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1719">
- <p>Buffer overflow in eject.c in Jason W. Bacon mcweject 0.9 on
- FreeBSD, and possibly other versions, allows local users to execute
- arbitrary code via a long command line argument, possibly involving
- the device name.</p>
- </blockquote>
+ <p>Buffer overflow in eject.c in Jason W. Bacon mcweject 0.9 on
+ FreeBSD, and possibly other versions, allows local users to execute
+ arbitrary code via a long command line argument, possibly involving
+ the device name.</p>
+ </blockquote>
</body>
</description>
<references>
- <freebsdpr>ports/111365</freebsdpr>
- <url>http://www.milw0rm.com/exploits/3578</url>
- <cvename>CVE-2007-1719</cvename>
+ <cvename>CVE-2007-1719</cvename>
+ <freebsdpr>ports/111365</freebsdpr>
+ <url>http://www.milw0rm.com/exploits/3578</url>
</references>
<dates>
<discovery>2007-03-27</discovery>
@@ -100,7 +100,7 @@ Note: Please add new entries to the beginning of this file.
</vuln>
<vuln vid="34414a1e-e377-11db-b8ab-000c76189c4c">
- <topic>Zope2 -- Cross-site scripting vulnerability</topic>
+ <topic>zope -- cross-site scripting vulnerability</topic>
<affects>
<package>
<name>zope</name>
@@ -112,23 +112,24 @@ Note: Please add new entries to the beginning of this file.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>The Zope Team reports:</p>
- <blockquote cite="http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view">
- <p>A vulnerability has been discovered in Zope, where by certain types
- of misuse of HTTP GET, an attacker could gain elevated privileges. All
- Zope versions up to and including 2.10.2 are affected.</p>
- </blockquote>
+ <p>The Zope Team reports:</p>
+ <blockquote cite="http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view">
+ <p>A vulnerability has been discovered in Zope, where by certain types
+ of misuse of HTTP GET, an attacker could gain elevated privileges. All
+ Zope versions up to and including 2.10.2 are affected.</p>
+ </blockquote>
</body>
</description>
<references>
- <freebsdpr>ports/111119</freebsdpr>
- <url>http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view</url>
- <cvename>CVE-2007-0240</cvename>
- <bid>23084</bid>
+ <bid>23084</bid>
+ <cvename>CVE-2007-0240</cvename>
+ <freebsdpr>ports/111119</freebsdpr>
+ <url>http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view</url>
</references>
<dates>
<discovery>2007-01-16</discovery>
<entry>2007-04-05</entry>
+ <modified>2007-04-08</modified>
</dates>
</vuln>