diff options
author | delphij <delphij@FreeBSD.org> | 2012-02-04 16:40:01 +0800 |
---|---|---|
committer | delphij <delphij@FreeBSD.org> | 2012-02-04 16:40:01 +0800 |
commit | 5c1ef1a32c384199b8e681b781c6b6fb5ea90094 (patch) | |
tree | 5246cd86c17b3e36671f725a0e0bc44e7d8b9390 /security/vuxml | |
parent | f943aa0a58a351c8c30fab5da66d523bdf8bfa57 (diff) | |
download | freebsd-ports-gnome-5c1ef1a32c384199b8e681b781c6b6fb5ea90094.tar.gz freebsd-ports-gnome-5c1ef1a32c384199b8e681b781c6b6fb5ea90094.tar.zst freebsd-ports-gnome-5c1ef1a32c384199b8e681b781c6b6fb5ea90094.zip |
Document PHP remote code vulnerability.
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index f2a5036a45ea..31ec81de681d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -47,6 +47,32 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3fd040be-4f0b-11e1-9e32-0025900931f8"> + <topic>php -- arbitrary remote code execution vulnerability</topic> + <affects> + <package> + <name>php5</name> + <range><ge>5.3.9</ge><lt>5.3.10</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>PHP development team reports:</p> + <blockquote cite="http://www.php.net/ChangeLog-5.php"> + <p>Fixed arbitrary remote code execution vulnerability reported + by Stefan Esser, CVE-2012-0830.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-0830</cvename> + </references> + <dates> + <discovery>2012-02-02</discovery> + <entry>2012-02-04</entry> + </dates> + </vuln> + <vuln vid="6e7ad1d7-4e27-11e1-8e12-90e6ba8a36a2"> <topic>mathopd - directory traversal vulnerability</topic> <affects> |