c6ff149b09
escalation vulnerabilities) and updated translations: * Sympa was not fully compliant to the RFC 2616, leading for example to possible unwanted list deletion by administrators using prefetching tools. This was fixed by replacing all the threatening GET requests by POST requests; * Use of sprint() function for creating SQL queries lead to possible SQL injection through cookie manipulation; * The use of files in /tmp lead to vulnerabilities.
13 lines
713 B
Text
13 lines
713 B
Text
$NetBSD: distinfo,v 1.11 2008/12/20 19:02:12 bouyer Exp $
|
|
|
|
SHA1 (sympa-5.4.4.tar.gz) = 673d3a031ef2718ed234ce0814ad1d0083883919
|
|
RMD160 (sympa-5.4.4.tar.gz) = fb0b61ac3a56981ac7f44a1863504be937e4f4b5
|
|
Size (sympa-5.4.4.tar.gz) = 6523229 bytes
|
|
SHA1 (patch-aa) = 8db2096214d667d5bada0ffb97994be9e0891547
|
|
SHA1 (patch-ab) = 404ce642a733ef7922f58613c56f449f75641a9a
|
|
SHA1 (patch-ac) = 77802bab188da024c18810c07bf62064b28e3af1
|
|
SHA1 (patch-af) = ba9888ed1eed387f7758946aaeeaa5f408c2d760
|
|
SHA1 (patch-ag) = 97af077204f004945619d9a457e03430df1e2642
|
|
SHA1 (patch-ah) = 6a0b34ef49a7d68ac996251adee14ef29519f92d
|
|
SHA1 (patch-ai) = 4ce47ec2a664978cccbba7f075ee5315ee0bfa5d
|
|
SHA1 (patch-aj) = 639241f48effabc49d46a23f255a33cb51404d44
|