aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authoreik <eik@FreeBSD.org>2004-06-18 14:33:31 +0800
committereik <eik@FreeBSD.org>2004-06-18 14:33:31 +0800
commit52b258f05472572953362a95f0d7662708d83075 (patch)
treed7ed2e7293a37bcd80393de382b276844c8d77f9 /security
parent731b2a271cc0dfd8c37c2a165d9148f2b9720001 (diff)
downloadfreebsd-ports-gnome-52b258f05472572953362a95f0d7662708d83075.tar.gz
freebsd-ports-gnome-52b258f05472572953362a95f0d7662708d83075.tar.zst
freebsd-ports-gnome-52b258f05472572953362a95f0d7662708d83075.zip
add subversion-perl, subversion-python
Diffstat (limited to 'security')
-rw-r--r--security/portaudit-db/database/portaudit.txt2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt
index cf4fdd67221a..f993ab381469 100644
--- a/security/portaudit-db/database/portaudit.txt
+++ b/security/portaudit-db/database/portaudit.txt
@@ -9,7 +9,7 @@ apache+mod_ssl*<1.3.31+2.8.18_4|http://www.apacheweek.com/features/security-13|m
ru-apache+mod_ssl<=1.3.31+30.20+2.8.18|http://www.apacheweek.com/features/security-13|mod_proxy buffer overflow (CAN-2004-0492)|5bcd500c-bc9d-11d8-916c-000347dd607f
dbmail{-mysql,-postgresql}<1.2.8a|http://mailman.fastxs.net/pipermail/dbmail/2004-June/004960.html|DBMail: remote exploitable buffer overflow|3b9b196e-bd12-11d8-b071-00e08110b673
smtpproxy<=1.1.3|http://0xbadc0ded.org/advisories/0402.txt|smtpproxy: remotely exploitable format string vulnerability|1abf65f9-bc9d-11d8-916c-000347dd607f
-subversion<1.0.5|http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt|subversion: remote exploitable buffer overflow in 'svn://' parser|4616bc3b-bd0f-11d8-a252-02e0185c0b53
+subversion{,-perl,-python}<1.0.5|http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt|subversion: remote exploitable buffer overflow in 'svn://' parser|4616bc3b-bd0f-11d8-a252-02e0185c0b53
imp<3.2.4|http://article.gmane.org/gmane.comp.horde.imp/14421/|imp: XSS hole exploited via the Content-type header of malicious emails|911f1b19-bd20-11d8-84f9-000bdb1444a4
chora<1.2.2|http://article.gmane.org/gmane.comp.horde.chora/610/|chora: hole in the diff code that allowed malicious input|9e09399d-bd21-11d8-84f9-000bdb1444a4
squirrelmail<1.4.3a|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0519 http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt|SquirrelMail XSS vulnerability|89a0de27-bf66-11d8-a252-02e0185c0b53