diff options
author | eik <eik@FreeBSD.org> | 2004-08-03 01:54:10 +0800 |
---|---|---|
committer | eik <eik@FreeBSD.org> | 2004-08-03 01:54:10 +0800 |
commit | d938958d498fe5abc76ddbd7e6116fc9f02be370 (patch) | |
tree | 206f4c59936e82f1db3e41288f943f092291f662 /ports-mgmt | |
parent | 68ddc0cad0d7a796b628e16e8ed2a100c94d0ccd (diff) | |
download | freebsd-ports-gnome-d938958d498fe5abc76ddbd7e6116fc9f02be370.tar.gz freebsd-ports-gnome-d938958d498fe5abc76ddbd7e6116fc9f02be370.tar.zst freebsd-ports-gnome-d938958d498fe5abc76ddbd7e6116fc9f02be370.zip |
GnuTLS certificate chain verification DoS
Diffstat (limited to 'ports-mgmt')
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.txt | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt index f5f9dbc4688a..11ff3f58c6c8 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.txt +++ b/ports-mgmt/portaudit-db/database/portaudit.txt @@ -38,7 +38,7 @@ isakmpd<20040611|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022 krb5<1.3.4|http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-001-an_to_ln.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0523 http://www.osvdb.org/6846 http://secunia.com/advisories/11753 http://www.kb.cert.org/vuls/id/686862 http://www.securityfocus.com/bid/10448|MIT Kerberos 5 krb5_aname_to_localname() buffer overflow|5177b6e5-c9b7-11d8-95ca-02e081301d81 png<1.2.5_6|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363 http://rhn.redhat.com/errata/RHSA-2003-006.html http://www.osvdb.org/7191 http://www.securityfocus.com/bid/6431|libpng row buffer overflow|1b78d43f-d32b-11d8-b479-02e0185c0b53 linux-png<1.0.14_3|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1363 http://rhn.redhat.com/errata/RHSA-2003-006.html http://www.osvdb.org/7191 http://www.securityfocus.com/bid/6431|libpng row buffer overflow|1b78d43f-d32b-11d8-b479-02e0185c0b53 -{ja-,}bugzilla<2.16.6|http://www.bugzilla.org/security/2.16.5/ http://secunia.com/advisories/12057|multiple vulnerabilities in Bugzilla|672975cb-d526-11d8-b479-02e0185c0b53 +{ja-,}bugzilla<2.16.6|http://www.bugzilla.org/security/2.16.5/ http://secunia.com/advisories/12057 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0704 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0705 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0707 http://www.securityfocus.com/bid/10698|multiple vulnerabilities in Bugzilla|672975cb-d526-11d8-b479-02e0185c0b53 wv<=1.0.0_1|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0645 http://www.idefense.com/application/poi/display?id=115&type=vulnerabilities&flashstatus=false http://secunia.com/advisories/12040 http://www.osvdb.org/7761|wv library datetime field buffer overflow|7a5430df-d562-11d8-b479-02e0185c0b53 roundup<0.7.3|http://secunia.com/advisories/11801 http://www.osvdb.org/6691|Roundup directory traversal vulnerability|9fb5bb32-d6fa-11d8-b479-02e0185c0b53 ru-apache+mod_ssl<1.3.31+30.20+2.8.19|http://www.mail-archive.com/modssl-users@modssl.org/msg16853.html http://www.mail-archive.com/modssl-users@modssl.org/msg16855.html http://secunia.com/advisories/12077 http://www.osvdb.org/7929|mod_ssl format string vulnerability|a3b7cb56-d8a7-11d8-9b0a-000347a4fa7d @@ -57,3 +57,5 @@ dansguardian<2.8.0.1|http://secunia.com/advisories/12191 http://www.securityfocu firefox>=0.9.1<=0.9.2|http://www.securityfocus.com/archive/1/369953|Mozilla Firefox certificate spoofing|abe47a5a-e23c-11d8-9b0a-000347a4fa7d imp<3.2.5|http://www.greymagic.com/security/advisories/gm005-mc/ http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&r2=1.389.2.109&ty=h|XSS hole in the HTML viewer - This vulnerability only exists when using the Internet Explorer to access IMP and only when using the inline MIME viewer for HTML messages.|49189b47-e24d-11d8-9f75-000bdb1444a4 phpMyAdmin<2.5.7.1|http://www.securityfocus.com/archive/1/367486 http://www.securityfocus.com/bid/10629 http://secunia.com/SA11974 http://www.osvdb.org/7314 http://www.osvdb.org/7315|phpMyAdmin configuration manipulation and code injection|56648b44-e301-11d8-9b0a-000347a4fa7d +gnutls<1.0.17|http://www.hornik.sk/SA/SA-20040802.txt|GnuTLS certificate chain verification DoS|84ab58cf-e4ac-11d8-9b0a-000347a4fa7d +gnutls-devel>=1.1.*<1.1.12|http://www.hornik.sk/SA/SA-20040802.txt|GnuTLS certificate chain verification DoS|84ab58cf-e4ac-11d8-9b0a-000347a4fa7d |