mirror of
https://git.FreeBSD.org/ports.git
synced 2025-01-12 07:27:57 +00:00
move "phpMyAdmin code injection" to vuxml
This commit is contained in:
parent
580eeeff30
commit
172c204547
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=112715
@ -38,4 +38,3 @@ apache>=2.*<2.0.49_3|http://www.guninski.com/httpd1.html http://www.apacheweek.c
|
||||
isakmpd<20040611|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022399.html http://www.osvdb.org/6951 http://www.secunia.com/advisories/11827 http://www.securityfocus.com/bid/10496|isakmpd security association deletion vulnerability|9a73a5b4-c9b5-11d8-95ca-02e081301d81
|
||||
krb5<1.3.4|http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-001-an_to_ln.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0523 http://www.osvdb.org/6846 http://secunia.com/advisories/11753 http://www.kb.cert.org/vuls/id/686862 http://www.securityfocus.com/bid/10448|MIT Kerberos 5 krb5_aname_to_localname() buffer overflow|5177b6e5-c9b7-11d8-95ca-02e081301d81
|
||||
SSLtelnet<=0.13_1|http://lists.freebsd.org/pipermail/freebsd-ports/2004-June/013878.html|SSLtelnet remote format string vulnerability|c63936c1-caed-11d8-8898-000d6111a684
|
||||
phpMyAdmin<=2.5.7|http://sf.net/forum/forum.php?forum_id=387635 http://www.securityfocus.com/archive/1/367486 http://secunia.com/advisories/11974 http://eagle.kecapi.com/sec/fd/phpMyAdmin.html|phpMyAdmin code injection|0d4c31ac-cb91-11d8-8898-000d6111a684
|
||||
|
@ -38,4 +38,3 @@ apache>=2.*<2.0.49_3|http://www.guninski.com/httpd1.html http://www.apacheweek.c
|
||||
isakmpd<20040611|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022399.html http://www.osvdb.org/6951 http://www.secunia.com/advisories/11827 http://www.securityfocus.com/bid/10496|isakmpd security association deletion vulnerability|9a73a5b4-c9b5-11d8-95ca-02e081301d81
|
||||
krb5<1.3.4|http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-001-an_to_ln.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0523 http://www.osvdb.org/6846 http://secunia.com/advisories/11753 http://www.kb.cert.org/vuls/id/686862 http://www.securityfocus.com/bid/10448|MIT Kerberos 5 krb5_aname_to_localname() buffer overflow|5177b6e5-c9b7-11d8-95ca-02e081301d81
|
||||
SSLtelnet<=0.13_1|http://lists.freebsd.org/pipermail/freebsd-ports/2004-June/013878.html|SSLtelnet remote format string vulnerability|c63936c1-caed-11d8-8898-000d6111a684
|
||||
phpMyAdmin<=2.5.7|http://sf.net/forum/forum.php?forum_id=387635 http://www.securityfocus.com/archive/1/367486 http://secunia.com/advisories/11974 http://eagle.kecapi.com/sec/fd/phpMyAdmin.html|phpMyAdmin code injection|0d4c31ac-cb91-11d8-8898-000d6111a684
|
||||
|
@ -136,10 +136,14 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
</description>
|
||||
<references>
|
||||
<url>http://developer.berlios.de/forum/forum.php?forum_id=5814</url>
|
||||
<url>http://www.osvdb.org/7266</url>
|
||||
<url>http://secunia.com/advisories/11941</url>
|
||||
<bid>10604</bid>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2004-06-19</discovery>
|
||||
<entry>2004-06-25</entry>
|
||||
<modified>2004-06-29</modified>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
@ -3649,7 +3653,7 @@ misc.c:
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="9fe115e6-cbb9-11d8-a8d4-0002b34cc336">
|
||||
<vuln vid="0d4c31ac-cb91-11d8-8898-000d6111a684">
|
||||
<topic>Remote code injection in phpMyAdmin</topic>
|
||||
<affects>
|
||||
<package>
|
||||
@ -3666,7 +3670,10 @@ misc.c:
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<url>http://www.securityfocus.com/archive/1/367486/2004-06-28/2004-07-04/0</url>
|
||||
<url>http://sf.net/forum/forum.php?forum_id=387635</url>
|
||||
<mlist msgid="20040629025752.976.qmail@www.securityfocus.com">http://www.securityfocus.com/archive/1/367486</mlist>
|
||||
<url>http://secunia.com/advisories/11974</url>
|
||||
<url>http://eagle.kecapi.com/sec/fd/phpMyAdmin.html</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2004-06-29</discovery>
|
||||
|
Loading…
Reference in New Issue
Block a user