Date: Tue, 28 Sep 2004 09:08:24 +0100 From: Matthew Seaman <m.seaman@infracaninophile.co.uk> To: Dan Langille <dan@langille.org> Cc: freebsd-vuxml@freebsd.org Subject: Re: VuXML entries found in FreshPorts Message-ID: <20040928080824.GB76460@happy-idiot-talk.infracaninophile.co.uk> In-Reply-To: <20040927221759.N6886@xeon.unixathome.org> References: <20040927221759.N6886@xeon.unixathome.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--QTprm0S8XgL7H0Dt Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Sep 27, 2004 at 11:13:28PM -0400, Dan Langille wrote: > The following URL lists the VuXML found in FreshPorts: >=20 > http://beta.freshports.org/vuxml.php?list > The more eyes that can check the results, the better. If you are familiar > with a particular vulnerability, I would appreciate feedback regarding the > accuracy. Here's one that I have a particular interest in. Compare 0d4c31ac-cb91-11d8-8898-000d6111a684 cc0fb686-6550-11d8-80e3-0020ed76ef5a The first isn't registered in http://beta.freshports.org/databases/phpmyadmin/ correctly, but the second is. Difference is the capitalisation: phpmyadmin vs. phpMyAdmin: the port may be databases/phpmyadmin, but the LATEST_LINK and the package name use phpMyAdmin. I guess that should be fixed in the vuln.xml for 0d4c31ac-cb91-11d8-8898-000d6111a684. Cheers, Matthew --=20 Dr Matthew J Seaman MA, D.Phil. 26 The Paddocks Savill Way PGP: http://www.infracaninophile.co.uk/pgpkey Marlow Tel: +44 1628 476614 Bucks., SL7 1TH UK --QTprm0S8XgL7H0Dt Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (FreeBSD) iD8DBQFBWRv4iD657aJF7eIRAqGWAJ4k0hB13jXGXjkGeYTVpwOz6qxb5gCff2hG sMNWtcZAWhiaz0icbqtH/Ig= =h8RB -----END PGP SIGNATURE----- --QTprm0S8XgL7H0Dt--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040928080824.GB76460>