mirror of
https://git.FreeBSD.org/ports.git
synced 2024-11-23 00:43:28 +00:00
Add an entry for Chora and IMP.
Requested by: eik
This commit is contained in:
parent
3edae3e24c
commit
5bd2ec8846
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=111380
@ -10,3 +10,5 @@ ru-apache+mod_ssl<=1.3.31+30.20+2.8.18|http://www.apacheweek.com/features/securi
|
||||
dbmail{-mysql,-postgresql}-1.2.8a|http://www.dbmail.org/|remote exploitable buffer overflow|3b9b196e-bd12-11d8-b071-00e08110b673
|
||||
smtpproxy<=1.1.3|http://0xbadc0ded.org/advisories/0402.txt|remotely exploitable format string vulnerability|1abf65f9-bc9d-11d8-916c-000347dd607f
|
||||
subversion<1.0.5|http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt|remote exploitable buffer overflow in 'svn://' parser|4616bc3b-bd0f-11d8-a252-02e0185c0b53
|
||||
imp<3.2.4|http://horde.org/imp/3.2/|XSS hole exploited via the Content-type header of malicious emails|911f1b19-bd20-11d8-84f9-000bdb1444a4
|
||||
chora<1.2.2|http://horde.org/chora/|hole in the diff code that allowed malicious input|9e09399d-bd21-11d8-84f9-000bdb1444a4
|
||||
|
@ -10,3 +10,5 @@ ru-apache+mod_ssl<=1.3.31+30.20+2.8.18|http://www.apacheweek.com/features/securi
|
||||
dbmail{-mysql,-postgresql}-1.2.8a|http://www.dbmail.org/|remote exploitable buffer overflow|3b9b196e-bd12-11d8-b071-00e08110b673
|
||||
smtpproxy<=1.1.3|http://0xbadc0ded.org/advisories/0402.txt|remotely exploitable format string vulnerability|1abf65f9-bc9d-11d8-916c-000347dd607f
|
||||
subversion<1.0.5|http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt|remote exploitable buffer overflow in 'svn://' parser|4616bc3b-bd0f-11d8-a252-02e0185c0b53
|
||||
imp<3.2.4|http://horde.org/imp/3.2/|XSS hole exploited via the Content-type header of malicious emails|911f1b19-bd20-11d8-84f9-000bdb1444a4
|
||||
chora<1.2.2|http://horde.org/chora/|hole in the diff code that allowed malicious input|9e09399d-bd21-11d8-84f9-000bdb1444a4
|
||||
|
Loading…
Reference in New Issue
Block a user