1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-07 06:40:06 +00:00

Add eGroupWare to the list of packages affected by "pear-XML_RPC --

remote PHP code injection vulnerability".

Approved by:	portmgr (blanket, VuXML)
This commit is contained in:
Simon L. B. Nielsen 2005-08-16 20:56:54 +00:00
parent f2db0bcd95
commit 75172d796f
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=140897

View File

@ -89,6 +89,10 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<name>drupal</name>
<range><lt>4.6.3</lt></range>
</package>
<package>
<name>eGroupWare</name>
<range><lt>1.0.0.009</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
@ -114,6 +118,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<references>
<cvename>CAN-2005-2498</cvename>
<url>http://drupal.org/files/sa-2005-004/advisory.txt</url>
<url>http://sourceforge.net/project/shownotes.php?release_id=349626</url>
<url>http://www.hardened-php.net/advisory_142005.66.html</url>
<url>http://www.hardened-php.net/advisory_152005.67.html</url>
<url>http://www.phpmyfaq.de/advisory_2005-08-15.php</url>
@ -121,6 +126,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<dates>
<discovery>2005-08-15</discovery>
<entry>2005-08-15</entry>
<modified>2005-08-16</modified>
</dates>
</vuln>