diff options
author | remko <remko@FreeBSD.org> | 2005-12-22 23:49:31 +0800 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2005-12-22 23:49:31 +0800 |
commit | 07f4b45852b16b682a3843d1f786ba2f8bbb8d51 (patch) | |
tree | 04511209f449f74ca04c16f6a7cad6a4fd647a5e /security/vuxml | |
parent | 606473bd9a96c06ea6b9e6c6ac35a4eb98ead3ca (diff) | |
download | freebsd-ports-graphics-07f4b45852b16b682a3843d1f786ba2f8bbb8d51.tar.gz freebsd-ports-graphics-07f4b45852b16b682a3843d1f786ba2f8bbb8d51.tar.zst freebsd-ports-graphics-07f4b45852b16b682a3843d1f786ba2f8bbb8d51.zip |
Correct the recent horde entries as per the FDP
(made the entries max 72 chars wide).
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 70 |
1 files changed, 40 insertions, 30 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 58fce53b9ea..10c11cfb9b4 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -135,7 +135,8 @@ Note: Please add new entries to the beginning of this file. </vuln> <vuln vid="2506f558-6a8a-11da-b96e-000fb586ba73"> - <topic>mnemo -- Cross site scripting vulnerabilities in several of the notepad name and note data fields</topic> + <topic>mnemo -- Cross site scripting vulnerabilities in several of + the notepad name and note data fields</topic> <affects> <package> <name>mnemo</name> @@ -146,11 +147,12 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Announce of Mnemo H3 (2.0.3) (final):</p> <blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&m=113433279228172&w=2"> - <p>This [2.0.3] is a security release that fixes cross site scripting - vulnerabilities in several of the notepad name and note data - fields. None of the vulnerabilities can be exploited by - unauthenticated users; however, we strongly recommend that all users - of Mnemo 2.0.2 upgrade to 2.0.3 as soon as possible.</p> + <p>This [2.0.3] is a security release that fixes cross site + scripting vulnerabilities in several of the notepad name + and note data fields. None of the vulnerabilities can be + exploited by unauthenticated users; however, we strongly + recommend that all users of Mnemo 2.0.2 upgrade to 2.0.3 + as soon as possible.</p> </blockquote> </body> </description> @@ -164,7 +166,8 @@ Note: Please add new entries to the beginning of this file. </vuln> <vuln vid="ee6b5956-6a89-11da-b96e-000fb586ba73"> - <topic>nag -- Cross site scripting vulnerabilities in several of the tasklist name and task data fields</topic> + <topic>nag -- Cross site scripting vulnerabilities in several of + the tasklist name and task data fields</topic> <affects> <package> <name>nag</name> @@ -175,11 +178,12 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Announce of Nag H3 (2.0.4) (final):</p> <blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&m=113433205826731&w=2"> - <p>This [2.0.4] is a security release that fixes cross site scripting - vulnerabilities in several of the tasklist name and task data - fields. None of the vulnerabilities can be exploited by - unauthenticated users; however, we strongly recommend that all users - of Nag 2.0.3 upgrade to 2.0.4 as soon as possible.</p> + <p>This [2.0.4] is a security release that fixes cross site + scripting vulnerabilities in several of the tasklist name + and task data fields. None of the vulnerabilities can be + exploited by unauthenticated users; however, we strongly + recommend that all users of Nag 2.0.3 upgrade to 2.0.4 as + soon as possible.</p> </blockquote> </body> </description> @@ -193,7 +197,8 @@ Note: Please add new entries to the beginning of this file. </vuln> <vuln vid="eeebd55d-6a88-11da-b96e-000fb586ba73"> - <topic>turba -- Cross site scripting vulnerabilities in several of the address book name and contact data fields</topic> + <topic>turba -- Cross site scripting vulnerabilities in several of + the address book name and contact data fields</topic> <affects> <package> <name>turba</name> @@ -204,11 +209,12 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Announce of Turba H3 (2.0.5) (final):</p> <blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&m=113433120829232&w=2"> - <p>This [2.0.5] is a security release that fixes cross site scripting - vulnerabilities in several of the address book name and contact data - fields. None of the vulnerabilities can be exploited by - unauthenticated users; however, we strongly recommend that all users - of Turba 2.0.4 upgrade to 2.0.5 as soon as possible.</p> + <p>This [2.0.5] is a security release that fixes cross site + scripting vulnerabilities in several of the address book + name and contact data fields. None of the vulnerabilities + can be exploited by unauthenticated users; however, we + strongly recommend that all users of Turba 2.0.4 upgrade + to 2.0.5 as soon as possible.</p> </blockquote> </body> </description> @@ -222,7 +228,8 @@ Note: Please add new entries to the beginning of this file. </vuln> <vuln vid="36494478-6a88-11da-b96e-000fb586ba73"> - <topic>kronolith -- Cross site scripting vulnerabilities in several of the calendar name and event data fields</topic> + <topic>kronolith -- Cross site scripting vulnerabilities in several + of the calendar name and event data fields</topic> <affects> <package> <name>kronolith</name> @@ -233,11 +240,12 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Announce of Kronolith H3 (2.0.6) (final):</p> <blockquote cite="http://marc.theaimsgroup.com/?l=kronolith&m=113433029822279&w=2"> - <p>This [2.0.6] is a security release that fixes cross site scripting - vulnerabilities in several of the calendar name and event data - fields. None of the vulnerabilities can be exploited by - unauthenticated users; however, we strongly recommend that all users - of Kronolith 2.0.5 upgrade to 2.0.6 as soon as possible.</p> + <p>This [2.0.6] is a security release that fixes cross site + scripting vulnerabilities in several of the calendar name + and event data fields. None of the vulnerabilities can be + exploited by unauthenticated users; however, we strongly + recommend that all users of Kronolith 2.0.5 upgrade to + 2.0.6 as soon as possible.</p> </blockquote> </body> </description> @@ -251,7 +259,8 @@ Note: Please add new entries to the beginning of this file. </vuln> <vuln vid="01356ccc-6a87-11da-b96e-000fb586ba73"> - <topic>horde -- Cross site scripting vulnerabilities in several of Horde's templates</topic> + <topic>horde -- Cross site scripting vulnerabilities in several of + Horde's templates</topic> <affects> <package> <name>horde</name> @@ -263,11 +272,12 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Announce of Horde H3 3.0.8 (final):</p> <blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&m=113433346726097&w=2"> - <p>This [3.0.8] is a security release that fixes cross site scripting - vulnerabilities in several of Horde's templates. None of the - vulnerabilities can be exploited by unauthenticated users; however, we - strongly recommend that all users of Horde 3.0.7 upgrade to 3.0.8 as - soon as possible.</p> + <p>This [3.0.8] is a security release that fixes cross site + scripting vulnerabilities in several of Horde's templates. + None of the vulnerabilities can be exploited by + unauthenticated users; however, we strongly recommend that + all users of Horde 3.0.7 upgrade to 3.0.8 as soon as + possible.</p> </blockquote> </body> </description> |