diff options
author | Remko Lodder <remko@FreeBSD.org> | 2005-12-22 15:49:31 +0000 |
---|---|---|
committer | Remko Lodder <remko@FreeBSD.org> | 2005-12-22 15:49:31 +0000 |
commit | 9467f6bd7a914020b3a324ec744d281d048014da (patch) | |
tree | c7902112f19ef8151874c33446b439a063ab6f90 | |
parent | 56786dc9f34a51a5b7849299ce3147453154d17b (diff) | |
download | ports-9467f6bd7a914020b3a324ec744d281d048014da.tar.gz ports-9467f6bd7a914020b3a324ec744d281d048014da.zip |
Notes
-rw-r--r-- | security/vuxml/vuln.xml | 70 |
1 files changed, 40 insertions, 30 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 58fce53b9ea7..10c11cfb9b4b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -135,7 +135,8 @@ Note: Please add new entries to the beginning of this file. </vuln> <vuln vid="2506f558-6a8a-11da-b96e-000fb586ba73"> - <topic>mnemo -- Cross site scripting vulnerabilities in several of the notepad name and note data fields</topic> + <topic>mnemo -- Cross site scripting vulnerabilities in several of + the notepad name and note data fields</topic> <affects> <package> <name>mnemo</name> @@ -146,11 +147,12 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Announce of Mnemo H3 (2.0.3) (final):</p> <blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&m=113433279228172&w=2"> - <p>This [2.0.3] is a security release that fixes cross site scripting - vulnerabilities in several of the notepad name and note data - fields. None of the vulnerabilities can be exploited by - unauthenticated users; however, we strongly recommend that all users - of Mnemo 2.0.2 upgrade to 2.0.3 as soon as possible.</p> + <p>This [2.0.3] is a security release that fixes cross site + scripting vulnerabilities in several of the notepad name + and note data fields. None of the vulnerabilities can be + exploited by unauthenticated users; however, we strongly + recommend that all users of Mnemo 2.0.2 upgrade to 2.0.3 + as soon as possible.</p> </blockquote> </body> </description> @@ -164,7 +166,8 @@ Note: Please add new entries to the beginning of this file. </vuln> <vuln vid="ee6b5956-6a89-11da-b96e-000fb586ba73"> - <topic>nag -- Cross site scripting vulnerabilities in several of the tasklist name and task data fields</topic> + <topic>nag -- Cross site scripting vulnerabilities in several of + the tasklist name and task data fields</topic> <affects> <package> <name>nag</name> @@ -175,11 +178,12 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Announce of Nag H3 (2.0.4) (final):</p> <blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&m=113433205826731&w=2"> - <p>This [2.0.4] is a security release that fixes cross site scripting - vulnerabilities in several of the tasklist name and task data - fields. None of the vulnerabilities can be exploited by - unauthenticated users; however, we strongly recommend that all users - of Nag 2.0.3 upgrade to 2.0.4 as soon as possible.</p> + <p>This [2.0.4] is a security release that fixes cross site + scripting vulnerabilities in several of the tasklist name + and task data fields. None of the vulnerabilities can be + exploited by unauthenticated users; however, we strongly + recommend that all users of Nag 2.0.3 upgrade to 2.0.4 as + soon as possible.</p> </blockquote> </body> </description> @@ -193,7 +197,8 @@ Note: Please add new entries to the beginning of this file. </vuln> <vuln vid="eeebd55d-6a88-11da-b96e-000fb586ba73"> - <topic>turba -- Cross site scripting vulnerabilities in several of the address book name and contact data fields</topic> + <topic>turba -- Cross site scripting vulnerabilities in several of + the address book name and contact data fields</topic> <affects> <package> <name>turba</name> @@ -204,11 +209,12 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Announce of Turba H3 (2.0.5) (final):</p> <blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&m=113433120829232&w=2"> - <p>This [2.0.5] is a security release that fixes cross site scripting - vulnerabilities in several of the address book name and contact data - fields. None of the vulnerabilities can be exploited by - unauthenticated users; however, we strongly recommend that all users - of Turba 2.0.4 upgrade to 2.0.5 as soon as possible.</p> + <p>This [2.0.5] is a security release that fixes cross site + scripting vulnerabilities in several of the address book + name and contact data fields. None of the vulnerabilities + can be exploited by unauthenticated users; however, we + strongly recommend that all users of Turba 2.0.4 upgrade + to 2.0.5 as soon as possible.</p> </blockquote> </body> </description> @@ -222,7 +228,8 @@ Note: Please add new entries to the beginning of this file. </vuln> <vuln vid="36494478-6a88-11da-b96e-000fb586ba73"> - <topic>kronolith -- Cross site scripting vulnerabilities in several of the calendar name and event data fields</topic> + <topic>kronolith -- Cross site scripting vulnerabilities in several + of the calendar name and event data fields</topic> <affects> <package> <name>kronolith</name> @@ -233,11 +240,12 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Announce of Kronolith H3 (2.0.6) (final):</p> <blockquote cite="http://marc.theaimsgroup.com/?l=kronolith&m=113433029822279&w=2"> - <p>This [2.0.6] is a security release that fixes cross site scripting - vulnerabilities in several of the calendar name and event data - fields. None of the vulnerabilities can be exploited by - unauthenticated users; however, we strongly recommend that all users - of Kronolith 2.0.5 upgrade to 2.0.6 as soon as possible.</p> + <p>This [2.0.6] is a security release that fixes cross site + scripting vulnerabilities in several of the calendar name + and event data fields. None of the vulnerabilities can be + exploited by unauthenticated users; however, we strongly + recommend that all users of Kronolith 2.0.5 upgrade to + 2.0.6 as soon as possible.</p> </blockquote> </body> </description> @@ -251,7 +259,8 @@ Note: Please add new entries to the beginning of this file. </vuln> <vuln vid="01356ccc-6a87-11da-b96e-000fb586ba73"> - <topic>horde -- Cross site scripting vulnerabilities in several of Horde's templates</topic> + <topic>horde -- Cross site scripting vulnerabilities in several of + Horde's templates</topic> <affects> <package> <name>horde</name> @@ -263,11 +272,12 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Announce of Horde H3 3.0.8 (final):</p> <blockquote cite="http://marc.theaimsgroup.com/?l=horde-announce&m=113433346726097&w=2"> - <p>This [3.0.8] is a security release that fixes cross site scripting - vulnerabilities in several of Horde's templates. None of the - vulnerabilities can be exploited by unauthenticated users; however, we - strongly recommend that all users of Horde 3.0.7 upgrade to 3.0.8 as - soon as possible.</p> + <p>This [3.0.8] is a security release that fixes cross site + scripting vulnerabilities in several of Horde's templates. + None of the vulnerabilities can be exploited by + unauthenticated users; however, we strongly recommend that + all users of Horde 3.0.7 upgrade to 3.0.8 as soon as + possible.</p> </blockquote> </body> </description> |