diff options
author | thierry <thierry@FreeBSD.org> | 2004-06-13 18:16:30 +0800 |
---|---|---|
committer | thierry <thierry@FreeBSD.org> | 2004-06-13 18:16:30 +0800 |
commit | e05bd782f15f4420f1a10c23175a595b42e524f3 (patch) | |
tree | 5d06ddc27b5382e36a5d0252a335b778237ca4b4 /security/portaudit-db | |
parent | acab2c00faf7d50bf5da87ab7f3e60eab98058f7 (diff) | |
download | freebsd-ports-gnome-e05bd782f15f4420f1a10c23175a595b42e524f3.tar.gz freebsd-ports-gnome-e05bd782f15f4420f1a10c23175a595b42e524f3.tar.zst freebsd-ports-gnome-e05bd782f15f4420f1a10c23175a595b42e524f3.zip |
Add an entry for Chora and IMP.
Requested by: eik
Diffstat (limited to 'security/portaudit-db')
-rw-r--r-- | security/portaudit-db/database/portaudit.txt | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt index dfbef80b446e..84ea021d92c1 100644 --- a/security/portaudit-db/database/portaudit.txt +++ b/security/portaudit-db/database/portaudit.txt @@ -10,3 +10,5 @@ ru-apache+mod_ssl<=1.3.31+30.20+2.8.18|http://www.apacheweek.com/features/securi dbmail{-mysql,-postgresql}-1.2.8a|http://www.dbmail.org/|remote exploitable buffer overflow|3b9b196e-bd12-11d8-b071-00e08110b673 smtpproxy<=1.1.3|http://0xbadc0ded.org/advisories/0402.txt|remotely exploitable format string vulnerability|1abf65f9-bc9d-11d8-916c-000347dd607f subversion<1.0.5|http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt|remote exploitable buffer overflow in 'svn://' parser|4616bc3b-bd0f-11d8-a252-02e0185c0b53 +imp<3.2.4|http://horde.org/imp/3.2/|XSS hole exploited via the Content-type header of malicious emails|911f1b19-bd20-11d8-84f9-000bdb1444a4 +chora<1.2.2|http://horde.org/chora/|hole in the diff code that allowed malicious input|9e09399d-bd21-11d8-84f9-000bdb1444a4 |