aboutsummaryrefslogtreecommitdiffstats
path: root/ports-mgmt
diff options
context:
space:
mode:
authoreik <eik@FreeBSD.org>2004-01-29 00:19:08 +0800
committereik <eik@FreeBSD.org>2004-01-29 00:19:08 +0800
commit1191fdec7ae6af49fa2aae05b94e42c3f730819b (patch)
tree28cb8a7274be266ca824482cfeacc75c8ae20181 /ports-mgmt
parentad3e3caf045aa343c575221e004b70cb3d0510fa (diff)
downloadfreebsd-ports-gnome-1191fdec7ae6af49fa2aae05b94e42c3f730819b.tar.gz
freebsd-ports-gnome-1191fdec7ae6af49fa2aae05b94e42c3f730819b.tar.zst
freebsd-ports-gnome-1191fdec7ae6af49fa2aae05b94e42c3f730819b.zip
Add some more examples (inn, apache) to test combined >= & < relations
Diffstat (limited to 'ports-mgmt')
-rw-r--r--ports-mgmt/portaudit/database/auditfile.txt11
1 files changed, 10 insertions, 1 deletions
diff --git a/ports-mgmt/portaudit/database/auditfile.txt b/ports-mgmt/portaudit/database/auditfile.txt
index 89a325b2add4..d4653a573191 100644
--- a/ports-mgmt/portaudit/database/auditfile.txt
+++ b/ports-mgmt/portaudit/database/auditfile.txt
@@ -22,6 +22,15 @@
# notify the maintainer of the affected package(s)
#
-gnupg<1.2.3_4|http://lists.gnupg.org/pipermail/gnupg-devel/2003-November/020570.html|ElGamal signing keys compromised
+gnupg>1.0.2<1.2.3_4|http://lists.gnupg.org/pipermail/gnupg-devel/2003-November/020570.html|ElGamal signing keys compromised
rsync<2.5.7|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0962|Buffer overflow in server
gaim<0.75_2|http://security.e-matters.de/advisories/012004.txt|12 vulnerabilities that allow remote compromise
+proftpd<1.2.8_1|http://xforce.iss.net/xforce/alerts/id/154|ProFTPD ASCII File Remote Compromise Vulnerability
+inn>=2.4<2.4.1|http://lists.litech.org/pipermail/inn-workers/2004q1/002763.html|Buffer overflow in control message handling
+inn-stable>=2.4<20031022_1|http://lists.litech.org/pipermail/inn-workers/2004q1/002763.html|Buffer overflow in control message handling
+apache>=2.0.35<2.0.48|http://www.apacheweek.com/features/security-20|Multiple security vulnerabilities
+apache>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Multiple security vulnerabilities
+apache+mod_ssl>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Multiple security vulnerabilities
+apache+ipv6>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Multiple security vulnerabilities
+ru-apache>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Multiple security vulnerabilities
+ru-apache+mod_ssl>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Multiple security vulnerabilities