aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRemko Lodder <remko@FreeBSD.org>2005-12-22 15:49:31 +0000
committerRemko Lodder <remko@FreeBSD.org>2005-12-22 15:49:31 +0000
commit9467f6bd7a914020b3a324ec744d281d048014da (patch)
treec7902112f19ef8151874c33446b439a063ab6f90
parent56786dc9f34a51a5b7849299ce3147453154d17b (diff)
downloadports-9467f6bd7a914020b3a324ec744d281d048014da.tar.gz
ports-9467f6bd7a914020b3a324ec744d281d048014da.zip
Notes
-rw-r--r--security/vuxml/vuln.xml70
1 files changed, 40 insertions, 30 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 58fce53b9ea7..10c11cfb9b4b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -135,7 +135,8 @@ Note: Please add new entries to the beginning of this file.
</vuln>
<vuln vid="2506f558-6a8a-11da-b96e-000fb586ba73">
- <topic>mnemo -- Cross site scripting vulnerabilities in several of the notepad name and note data fields</topic>
+ <topic>mnemo -- Cross site scripting vulnerabilities in several of
+ the notepad name and note data fields</topic>
<affects>
<package>
<name>mnemo</name>
@@ -146,11 +147,12 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Announce of Mnemo H3 (2.0.3) (final):</p>
<blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&amp;m=113433279228172&amp;w=2">
- <p>This [2.0.3] is a security release that fixes cross site scripting
- vulnerabilities in several of the notepad name and note data
- fields. None of the vulnerabilities can be exploited by
- unauthenticated users; however, we strongly recommend that all users
- of Mnemo 2.0.2 upgrade to 2.0.3 as soon as possible.</p>
+ <p>This [2.0.3] is a security release that fixes cross site
+ scripting vulnerabilities in several of the notepad name
+ and note data fields. None of the vulnerabilities can be
+ exploited by unauthenticated users; however, we strongly
+ recommend that all users of Mnemo 2.0.2 upgrade to 2.0.3
+ as soon as possible.</p>
</blockquote>
</body>
</description>
@@ -164,7 +166,8 @@ Note: Please add new entries to the beginning of this file.
</vuln>
<vuln vid="ee6b5956-6a89-11da-b96e-000fb586ba73">
- <topic>nag -- Cross site scripting vulnerabilities in several of the tasklist name and task data fields</topic>
+ <topic>nag -- Cross site scripting vulnerabilities in several of
+ the tasklist name and task data fields</topic>
<affects>
<package>
<name>nag</name>
@@ -175,11 +178,12 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Announce of Nag H3 (2.0.4) (final):</p>
<blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&amp;m=113433205826731&amp;w=2">
- <p>This [2.0.4] is a security release that fixes cross site scripting
- vulnerabilities in several of the tasklist name and task data
- fields. None of the vulnerabilities can be exploited by
- unauthenticated users; however, we strongly recommend that all users
- of Nag 2.0.3 upgrade to 2.0.4 as soon as possible.</p>
+ <p>This [2.0.4] is a security release that fixes cross site
+ scripting vulnerabilities in several of the tasklist name
+ and task data fields. None of the vulnerabilities can be
+ exploited by unauthenticated users; however, we strongly
+ recommend that all users of Nag 2.0.3 upgrade to 2.0.4 as
+ soon as possible.</p>
</blockquote>
</body>
</description>
@@ -193,7 +197,8 @@ Note: Please add new entries to the beginning of this file.
</vuln>
<vuln vid="eeebd55d-6a88-11da-b96e-000fb586ba73">
- <topic>turba -- Cross site scripting vulnerabilities in several of the address book name and contact data fields</topic>
+ <topic>turba -- Cross site scripting vulnerabilities in several of
+ the address book name and contact data fields</topic>
<affects>
<package>
<name>turba</name>
@@ -204,11 +209,12 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Announce of Turba H3 (2.0.5) (final):</p>
<blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&amp;m=113433120829232&amp;w=2">
- <p>This [2.0.5] is a security release that fixes cross site scripting
- vulnerabilities in several of the address book name and contact data
- fields. None of the vulnerabilities can be exploited by
- unauthenticated users; however, we strongly recommend that all users
- of Turba 2.0.4 upgrade to 2.0.5 as soon as possible.</p>
+ <p>This [2.0.5] is a security release that fixes cross site
+ scripting vulnerabilities in several of the address book
+ name and contact data fields. None of the vulnerabilities
+ can be exploited by unauthenticated users; however, we
+ strongly recommend that all users of Turba 2.0.4 upgrade
+ to 2.0.5 as soon as possible.</p>
</blockquote>
</body>
</description>
@@ -222,7 +228,8 @@ Note: Please add new entries to the beginning of this file.
</vuln>
<vuln vid="36494478-6a88-11da-b96e-000fb586ba73">
- <topic>kronolith -- Cross site scripting vulnerabilities in several of the calendar name and event data fields</topic>
+ <topic>kronolith -- Cross site scripting vulnerabilities in several
+ of the calendar name and event data fields</topic>
<affects>
<package>
<name>kronolith</name>
@@ -233,11 +240,12 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Announce of Kronolith H3 (2.0.6) (final):</p>
<blockquote cite="http://marc.theaimsgroup.com/?l=kronolith&amp;m=113433029822279&amp;w=2">
- <p>This [2.0.6] is a security release that fixes cross site scripting
- vulnerabilities in several of the calendar name and event data
- fields. None of the vulnerabilities can be exploited by
- unauthenticated users; however, we strongly recommend that all users
- of Kronolith 2.0.5 upgrade to 2.0.6 as soon as possible.</p>
+ <p>This [2.0.6] is a security release that fixes cross site
+ scripting vulnerabilities in several of the calendar name
+ and event data fields. None of the vulnerabilities can be
+ exploited by unauthenticated users; however, we strongly
+ recommend that all users of Kronolith 2.0.5 upgrade to
+ 2.0.6 as soon as possible.</p>
</blockquote>
</body>
</description>
@@ -251,7 +259,8 @@ Note: Please add new entries to the beginning of this file.
</vuln>
<vuln vid="01356ccc-6a87-11da-b96e-000fb586ba73">
- <topic>horde -- Cross site scripting vulnerabilities in several of Horde's templates</topic>
+ <topic>horde -- Cross site scripting vulnerabilities in several of
+ Horde's templates</topic>
<affects>
<package>
<name>horde</name>
@@ -263,11 +272,12 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Announce of Horde H3 3.0.8 (final):</p>
<blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&amp;m=113433346726097&amp;w=2">
- <p>This [3.0.8] is a security release that fixes cross site scripting
- vulnerabilities in several of Horde's templates. None of the
- vulnerabilities can be exploited by unauthenticated users; however, we
- strongly recommend that all users of Horde 3.0.7 upgrade to 3.0.8 as
- soon as possible.</p>
+ <p>This [3.0.8] is a security release that fixes cross site
+ scripting vulnerabilities in several of Horde's templates.
+ None of the vulnerabilities can be exploited by
+ unauthenticated users; however, we strongly recommend that
+ all users of Horde 3.0.7 upgrade to 3.0.8 as soon as
+ possible.</p>
</blockquote>
</body>
</description>