summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorThierry Thomas <thierry@FreeBSD.org>2004-06-13 13:04:22 +0000
committerThierry Thomas <thierry@FreeBSD.org>2004-06-13 13:04:22 +0000
commita89c49c5de3966ec8276b1ad788c63e1cbbdea44 (patch)
tree81610191f867e0fcef3c593b4df1ab34a559cd8d /security
parento Update to 2004-06-12 (diff)
Change URLs for a better reference about IMP & Chora vulnerabilities.
Requested by: eik (bis).
Notes
Notes: svn path=/head/; revision=111391
Diffstat (limited to 'security')
-rw-r--r--security/portaudit-db/database/portaudit.txt4
1 files changed, 2 insertions, 2 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt
index 84ea021d92c1..c815511dbee2 100644
--- a/security/portaudit-db/database/portaudit.txt
+++ b/security/portaudit-db/database/portaudit.txt
@@ -10,5 +10,5 @@ ru-apache+mod_ssl<=1.3.31+30.20+2.8.18|http://www.apacheweek.com/features/securi
dbmail{-mysql,-postgresql}-1.2.8a|http://www.dbmail.org/|remote exploitable buffer overflow|3b9b196e-bd12-11d8-b071-00e08110b673
smtpproxy<=1.1.3|http://0xbadc0ded.org/advisories/0402.txt|remotely exploitable format string vulnerability|1abf65f9-bc9d-11d8-916c-000347dd607f
subversion<1.0.5|http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt|remote exploitable buffer overflow in 'svn://' parser|4616bc3b-bd0f-11d8-a252-02e0185c0b53
-imp<3.2.4|http://horde.org/imp/3.2/|XSS hole exploited via the Content-type header of malicious emails|911f1b19-bd20-11d8-84f9-000bdb1444a4
-chora<1.2.2|http://horde.org/chora/|hole in the diff code that allowed malicious input|9e09399d-bd21-11d8-84f9-000bdb1444a4
+imp<3.2.4|http://article.gmane.org/gmane.comp.horde.imp/14421/|XSS hole exploited via the Content-type header of malicious emails|911f1b19-bd20-11d8-84f9-000bdb1444a4
+chora<1.2.2|http://article.gmane.org/gmane.comp.horde.chora/610/|hole in the diff code that allowed malicious input|9e09399d-bd21-11d8-84f9-000bdb1444a4