diff options
author | eik <eik@FreeBSD.org> | 2004-06-29 06:09:24 +0800 |
---|---|---|
committer | eik <eik@FreeBSD.org> | 2004-06-29 06:09:24 +0800 |
commit | 5af588a180f57462c6ae5d0c24e8b56e175d1e16 (patch) | |
tree | 00c6797dc0a591e94bfee205274e1bdd959dcc1d /ports-mgmt | |
parent | 5dada7153497ec7b1883eb77d766165e551199c5 (diff) | |
download | freebsd-ports-gnome-5af588a180f57462c6ae5d0c24e8b56e175d1e16.tar.gz freebsd-ports-gnome-5af588a180f57462c6ae5d0c24e8b56e175d1e16.tar.zst freebsd-ports-gnome-5af588a180f57462c6ae5d0c24e8b56e175d1e16.zip |
add Apache input header folding DoS vulnerability
Diffstat (limited to 'ports-mgmt')
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.txt | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt index 5a4b93fbfa9a..affa22af082b 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.txt +++ b/ports-mgmt/portaudit-db/database/portaudit.txt @@ -34,3 +34,4 @@ sup<=2.0|http://secunia.com/advisories/11898 http://cve.mitre.org/cgi-bin/cvenam rlpr<2.04_1|http://secunia.com/advisories/11906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0454 http://www.osvdb.org/7194 http://www.osvdb.org/7195 http://securitytracker.com/id?1010545 http://www.securityfocus.com/archive/1/367045|rlpr "msg()" buffer overflow and format string vulnerabilities|29a72da5-c5ea-11d8-8898-000d6111a684 pure-ftpd<1.0.19|http://www.pureftpd.org/|Pure-FTPd DoS when maximum number of connections is reached|ec5cf461-c691-11d8-8898-000d6111a684 libxine<1.0.r4|http://www.xinehq.de/index.php/security/XSA-2004-3 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0433 http://secunia.com/advisories/11500|xine-lib RTSP handling vulnerabilities|83cbd52c-c8e8-11d8-8898-000d6111a684 +apache>=2.*<2.0.49_3|http://www.guninski.com/httpd1.html http://www.apacheweek.com/features/security-20 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493 http://secunia.com/advisories/11956 http://www.osvdb.org/7269|Apache input header folding DoS vulnerability|81a8c9c2-c94f-11d8-8898-000d6111a684 |