aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2005-12-22 23:49:31 +0800
committerremko <remko@FreeBSD.org>2005-12-22 23:49:31 +0800
commit07f4b45852b16b682a3843d1f786ba2f8bbb8d51 (patch)
tree04511209f449f74ca04c16f6a7cad6a4fd647a5e /security/vuxml
parent606473bd9a96c06ea6b9e6c6ac35a4eb98ead3ca (diff)
downloadfreebsd-ports-graphics-07f4b45852b16b682a3843d1f786ba2f8bbb8d51.tar.gz
freebsd-ports-graphics-07f4b45852b16b682a3843d1f786ba2f8bbb8d51.tar.zst
freebsd-ports-graphics-07f4b45852b16b682a3843d1f786ba2f8bbb8d51.zip
Correct the recent horde entries as per the FDP
(made the entries max 72 chars wide).
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml70
1 files changed, 40 insertions, 30 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 58fce53b9ea..10c11cfb9b4 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -135,7 +135,8 @@ Note: Please add new entries to the beginning of this file.
</vuln>
<vuln vid="2506f558-6a8a-11da-b96e-000fb586ba73">
- <topic>mnemo -- Cross site scripting vulnerabilities in several of the notepad name and note data fields</topic>
+ <topic>mnemo -- Cross site scripting vulnerabilities in several of
+ the notepad name and note data fields</topic>
<affects>
<package>
<name>mnemo</name>
@@ -146,11 +147,12 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Announce of Mnemo H3 (2.0.3) (final):</p>
<blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&amp;m=113433279228172&amp;w=2">
- <p>This [2.0.3] is a security release that fixes cross site scripting
- vulnerabilities in several of the notepad name and note data
- fields. None of the vulnerabilities can be exploited by
- unauthenticated users; however, we strongly recommend that all users
- of Mnemo 2.0.2 upgrade to 2.0.3 as soon as possible.</p>
+ <p>This [2.0.3] is a security release that fixes cross site
+ scripting vulnerabilities in several of the notepad name
+ and note data fields. None of the vulnerabilities can be
+ exploited by unauthenticated users; however, we strongly
+ recommend that all users of Mnemo 2.0.2 upgrade to 2.0.3
+ as soon as possible.</p>
</blockquote>
</body>
</description>
@@ -164,7 +166,8 @@ Note: Please add new entries to the beginning of this file.
</vuln>
<vuln vid="ee6b5956-6a89-11da-b96e-000fb586ba73">
- <topic>nag -- Cross site scripting vulnerabilities in several of the tasklist name and task data fields</topic>
+ <topic>nag -- Cross site scripting vulnerabilities in several of
+ the tasklist name and task data fields</topic>
<affects>
<package>
<name>nag</name>
@@ -175,11 +178,12 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Announce of Nag H3 (2.0.4) (final):</p>
<blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&amp;m=113433205826731&amp;w=2">
- <p>This [2.0.4] is a security release that fixes cross site scripting
- vulnerabilities in several of the tasklist name and task data
- fields. None of the vulnerabilities can be exploited by
- unauthenticated users; however, we strongly recommend that all users
- of Nag 2.0.3 upgrade to 2.0.4 as soon as possible.</p>
+ <p>This [2.0.4] is a security release that fixes cross site
+ scripting vulnerabilities in several of the tasklist name
+ and task data fields. None of the vulnerabilities can be
+ exploited by unauthenticated users; however, we strongly
+ recommend that all users of Nag 2.0.3 upgrade to 2.0.4 as
+ soon as possible.</p>
</blockquote>
</body>
</description>
@@ -193,7 +197,8 @@ Note: Please add new entries to the beginning of this file.
</vuln>
<vuln vid="eeebd55d-6a88-11da-b96e-000fb586ba73">
- <topic>turba -- Cross site scripting vulnerabilities in several of the address book name and contact data fields</topic>
+ <topic>turba -- Cross site scripting vulnerabilities in several of
+ the address book name and contact data fields</topic>
<affects>
<package>
<name>turba</name>
@@ -204,11 +209,12 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Announce of Turba H3 (2.0.5) (final):</p>
<blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&amp;m=113433120829232&amp;w=2">
- <p>This [2.0.5] is a security release that fixes cross site scripting
- vulnerabilities in several of the address book name and contact data
- fields. None of the vulnerabilities can be exploited by
- unauthenticated users; however, we strongly recommend that all users
- of Turba 2.0.4 upgrade to 2.0.5 as soon as possible.</p>
+ <p>This [2.0.5] is a security release that fixes cross site
+ scripting vulnerabilities in several of the address book
+ name and contact data fields. None of the vulnerabilities
+ can be exploited by unauthenticated users; however, we
+ strongly recommend that all users of Turba 2.0.4 upgrade
+ to 2.0.5 as soon as possible.</p>
</blockquote>
</body>
</description>
@@ -222,7 +228,8 @@ Note: Please add new entries to the beginning of this file.
</vuln>
<vuln vid="36494478-6a88-11da-b96e-000fb586ba73">
- <topic>kronolith -- Cross site scripting vulnerabilities in several of the calendar name and event data fields</topic>
+ <topic>kronolith -- Cross site scripting vulnerabilities in several
+ of the calendar name and event data fields</topic>
<affects>
<package>
<name>kronolith</name>
@@ -233,11 +240,12 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Announce of Kronolith H3 (2.0.6) (final):</p>
<blockquote cite="http://marc.theaimsgroup.com/?l=kronolith&amp;m=113433029822279&amp;w=2">
- <p>This [2.0.6] is a security release that fixes cross site scripting
- vulnerabilities in several of the calendar name and event data
- fields. None of the vulnerabilities can be exploited by
- unauthenticated users; however, we strongly recommend that all users
- of Kronolith 2.0.5 upgrade to 2.0.6 as soon as possible.</p>
+ <p>This [2.0.6] is a security release that fixes cross site
+ scripting vulnerabilities in several of the calendar name
+ and event data fields. None of the vulnerabilities can be
+ exploited by unauthenticated users; however, we strongly
+ recommend that all users of Kronolith 2.0.5 upgrade to
+ 2.0.6 as soon as possible.</p>
</blockquote>
</body>
</description>
@@ -251,7 +259,8 @@ Note: Please add new entries to the beginning of this file.
</vuln>
<vuln vid="01356ccc-6a87-11da-b96e-000fb586ba73">
- <topic>horde -- Cross site scripting vulnerabilities in several of Horde's templates</topic>
+ <topic>horde -- Cross site scripting vulnerabilities in several of
+ Horde's templates</topic>
<affects>
<package>
<name>horde</name>
@@ -263,11 +272,12 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Announce of Horde H3 3.0.8 (final):</p>
<blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&amp;m=113433346726097&amp;w=2">
- <p>This [3.0.8] is a security release that fixes cross site scripting
- vulnerabilities in several of Horde's templates. None of the
- vulnerabilities can be exploited by unauthenticated users; however, we
- strongly recommend that all users of Horde 3.0.7 upgrade to 3.0.8 as
- soon as possible.</p>
+ <p>This [3.0.8] is a security release that fixes cross site
+ scripting vulnerabilities in several of Horde's templates.
+ None of the vulnerabilities can be exploited by
+ unauthenticated users; however, we strongly recommend that
+ all users of Horde 3.0.7 upgrade to 3.0.8 as soon as
+ possible.</p>
</blockquote>
</body>
</description>