Currentry TimThumb.php remote file inclusion attack is in wild. Port maintainer (secteam@FreeBSD.org) is cc'd. Generated with FreeBSD Port Tools 0.99
Responsible Changed From-To: freebsd-ports-bugs->secteam Over to maintainer (via the GNATS Auto Assign Tool)
Responsible Changed From-To: secteam->delphij I'll take it.
delphij 2011-10-17 18:52:16 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: Document PivotX remote file inclusion vulnerability. PR: ports/161734 Submitted by: Fumiyuki Shimizu <fumifumi abacustech jp> Revision Changes Path 1.2462 +35 -1 ports/security/vuxml/vuln.xml _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
State Changed From-To: open->closed Committed, thanks!
miwi 2011-11-01 07:18:06 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: - bid from latest PivotX entry [1] - while remove a lot whitespaces PR: 161734 [1] Submitted by: Fumiyuki Shimizu <fumifumi@abacustech.jp> Revision Changes Path 1.2476 +28 -28 ports/security/vuxml/vuln.xml _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"