diff options
author | eik <eik@FreeBSD.org> | 2004-06-16 15:46:18 +0800 |
---|---|---|
committer | eik <eik@FreeBSD.org> | 2004-06-16 15:46:18 +0800 |
commit | 82654e36deba0cab63c2c532f609426cd90f9947 (patch) | |
tree | 9947f5287e265cc71d86ddaf64a883bcb1e94faf /ports-mgmt | |
parent | 2da0ae1b2b08e97bd539a04d676d412b0b1b0a6a (diff) | |
download | freebsd-ports-gnome-82654e36deba0cab63c2c532f609426cd90f9947.tar.gz freebsd-ports-gnome-82654e36deba0cab63c2c532f609426cd90f9947.tar.zst freebsd-ports-gnome-82654e36deba0cab63c2c532f609426cd90f9947.zip |
Add SquirrelMail XSS vulnerability
Diffstat (limited to 'ports-mgmt')
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.txt | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt index 9dc67b65b84f..d0ba02eec036 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.txt +++ b/ports-mgmt/portaudit-db/database/portaudit.txt @@ -12,3 +12,4 @@ smtpproxy<=1.1.3|http://0xbadc0ded.org/advisories/0402.txt|smtpproxy: remotely e subversion<1.0.5|http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt|subversion: remote exploitable buffer overflow in 'svn://' parser|4616bc3b-bd0f-11d8-a252-02e0185c0b53 imp<3.2.4|http://article.gmane.org/gmane.comp.horde.imp/14421/|imp: XSS hole exploited via the Content-type header of malicious emails|911f1b19-bd20-11d8-84f9-000bdb1444a4 chora<1.2.2|http://article.gmane.org/gmane.comp.horde.chora/610/|chora: hole in the diff code that allowed malicious input|9e09399d-bd21-11d8-84f9-000bdb1444a4 +squirrelmail<1.4.3a|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0519|SquirrelMail XSS vulnerability|89a0de27-bf66-11d8-a252-02e0185c0b53 |