diff options
author | trhodes <trhodes@FreeBSD.org> | 2004-07-03 14:48:34 +0800 |
---|---|---|
committer | trhodes <trhodes@FreeBSD.org> | 2004-07-03 14:48:34 +0800 |
commit | cd8a4386dca921b62a2f1e02c7691a5a700edfd9 (patch) | |
tree | d003f3a9eb3c724c271969b26f98627f9372d9f3 /ports-mgmt | |
parent | f66e5020d8658fc97b5da635e50fef73aa8a067d (diff) | |
download | freebsd-ports-gnome-cd8a4386dca921b62a2f1e02c7691a5a700edfd9.tar.gz freebsd-ports-gnome-cd8a4386dca921b62a2f1e02c7691a5a700edfd9.tar.zst freebsd-ports-gnome-cd8a4386dca921b62a2f1e02c7691a5a700edfd9.zip |
Move phpnuke vulnerabilities to VuXML.
Diffstat (limited to 'ports-mgmt')
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.txt | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt index b79afda5a33a..c569699b4c1e 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.txt +++ b/ports-mgmt/portaudit-db/database/portaudit.txt @@ -13,7 +13,6 @@ imp<3.2.4|http://article.gmane.org/gmane.comp.horde.imp/14421/|imp: XSS hole exp chora<1.2.2|http://article.gmane.org/gmane.comp.horde.chora/610/|chora: hole in the diff code that allowed malicious input|9e09399d-bd21-11d8-84f9-000bdb1444a4 squirrelmail<1.4.3a|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0519 http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt|SquirrelMail XSS vulnerability|89a0de27-bf66-11d8-a252-02e0185c0b53 ja-squirrelmail<1.4.3a,1|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0519 http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt|SquirrelMail XSS vulnerability|89a0de27-bf66-11d8-a252-02e0185c0b53 -phpnuke<=7.3|http://www.waraxe.us/?modname=sa&id=032 http://secunia.com/advisories/11920|Multiple security flaws in PhpNuke 6.x - 7.3|33ab4a47-bfc1-11d8-b00e-000347a4fa7d webmin<1.150|http://www.webmin.com/changes-1.150.html http://www.osvdb.org/6729 http://www.osvdb.org/6730|Multiple vulnerabilities in Webmin|ab61715f-c027-11d8-b00e-000347a4fa7d racoon<20040617a|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022617.html http://www.securityfocus.com/archive/1/366023 http://securitytracker.com/alerts/2004/Jun/1010495.html http://orange.kame.net/dev/cvsweb.cgi/kame/kame/kame/racoon/crypto_openssl.c#rev1.86|Racoon may validate invalid certificates|a96c1d37-c033-11d8-b00e-000347a4fa7d ircd-hybrid<=7.0_1|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022820.html http://www.securityfocus.com/archive/1/366486 http://www.osvdb.org/7242|ircd-hybrid-7 low-bandwidth DoS|23aafa20-c28a-11d8-864c-02e0185c0b53 |