aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authoreik <eik@FreeBSD.org>2004-06-25 18:31:30 +0800
committereik <eik@FreeBSD.org>2004-06-25 18:31:30 +0800
commit0c741c07bd5e215c754ff34fcac287470478cf67 (patch)
tree88da851f4be11505807e84f5da4cd9f672fb68be
parent0010ec8b0ded930266c2467a1f3c93d78a98dd28 (diff)
downloadfreebsd-ports-gnome-0c741c07bd5e215c754ff34fcac287470478cf67.tar.gz
freebsd-ports-gnome-0c741c07bd5e215c754ff34fcac287470478cf67.tar.zst
freebsd-ports-gnome-0c741c07bd5e215c754ff34fcac287470478cf67.zip
Pure-FTPd DoS when the max number of connection is reached
-rw-r--r--ports-mgmt/portaudit-db/database/portaudit.txt1
-rw-r--r--security/portaudit-db/database/portaudit.txt1
2 files changed, 2 insertions, 0 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt
index aaebb2352286..a35f14cfd6b0 100644
--- a/ports-mgmt/portaudit-db/database/portaudit.txt
+++ b/ports-mgmt/portaudit-db/database/portaudit.txt
@@ -34,3 +34,4 @@ icecast2<2.0.1,1|http://secunia.com/advisories/11578 http://www.osvdb.org/6075|I
rssh<2.2.1|http://secunia.com/advisories/11926 http://www.securityfocus.com/archive/1/366691|rssh file existence information disclosure weakness|a4815970-c5cc-11d8-8898-000d6111a684
sup<=2.0|http://secunia.com/advisories/11898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0451|CMU SUP logging format string vulnerabilities|238ea8eb-c5cf-11d8-8898-000d6111a684
rlpr<=2.02_2|http://secunia.com/advisories/11906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0454 http://www.osvdb.org/7194 http://www.osvdb.org/7195 http://securitytracker.com/id?1010545|rlpr "msg()" buffer overflow and format string vulnerabilities|29a72da5-c5ea-11d8-8898-000d6111a684
+pure-ftpd<1.0.19|http://www.pureftpd.org/|Pure-FTPd DoS when the max number of connection is reached|ec5cf461-c691-11d8-8898-000d6111a684
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt
index aaebb2352286..a35f14cfd6b0 100644
--- a/security/portaudit-db/database/portaudit.txt
+++ b/security/portaudit-db/database/portaudit.txt
@@ -34,3 +34,4 @@ icecast2<2.0.1,1|http://secunia.com/advisories/11578 http://www.osvdb.org/6075|I
rssh<2.2.1|http://secunia.com/advisories/11926 http://www.securityfocus.com/archive/1/366691|rssh file existence information disclosure weakness|a4815970-c5cc-11d8-8898-000d6111a684
sup<=2.0|http://secunia.com/advisories/11898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0451|CMU SUP logging format string vulnerabilities|238ea8eb-c5cf-11d8-8898-000d6111a684
rlpr<=2.02_2|http://secunia.com/advisories/11906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0454 http://www.osvdb.org/7194 http://www.osvdb.org/7195 http://securitytracker.com/id?1010545|rlpr "msg()" buffer overflow and format string vulnerabilities|29a72da5-c5ea-11d8-8898-000d6111a684
+pure-ftpd<1.0.19|http://www.pureftpd.org/|Pure-FTPd DoS when the max number of connection is reached|ec5cf461-c691-11d8-8898-000d6111a684