aboutsummaryrefslogtreecommitdiffstats
path: root/security/portaudit-db
diff options
context:
space:
mode:
authornectar <nectar@FreeBSD.org>2004-08-27 22:43:07 +0800
committernectar <nectar@FreeBSD.org>2004-08-27 22:43:07 +0800
commitdd104ec9a690e4b11799bf93bf0c4c7947d33000 (patch)
tree767e882c62731e6dd6eade58ac2330e1c87111d2 /security/portaudit-db
parentb6957ad9ac8fe57ee587bf9da0e4a83b39e9ba09 (diff)
downloadfreebsd-ports-gnome-dd104ec9a690e4b11799bf93bf0c4c7947d33000.tar.gz
freebsd-ports-gnome-dd104ec9a690e4b11799bf93bf0c4c7947d33000.tar.zst
freebsd-ports-gnome-dd104ec9a690e4b11799bf93bf0c4c7947d33000.zip
Document ripMIME decoding bug (already referenced in portaudit.txt).
Diffstat (limited to 'security/portaudit-db')
-rw-r--r--security/portaudit-db/database/portaudit.txt1
1 files changed, 0 insertions, 1 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt
index 2777cc16ea42..ac09a89ae347 100644
--- a/security/portaudit-db/database/portaudit.txt
+++ b/security/portaudit-db/database/portaudit.txt
@@ -56,7 +56,6 @@ imp<3.2.5|http://www.greymagic.com/security/advisories/gm005-mc/ http://cvs.hord
phpMyAdmin<2.5.7.1|http://www.securityfocus.com/archive/1/367486 http://www.securityfocus.com/bid/10629 http://secunia.com/SA11974 http://www.osvdb.org/7314 http://www.osvdb.org/7315|phpMyAdmin configuration manipulation and code injection|56648b44-e301-11d8-9b0a-000347a4fa7d
gnutls<1.0.17|http://www.hornik.sk/SA/SA-20040802.txt http://secunia.com/advisories/12156|GnuTLS certificate chain verification DoS|84ab58cf-e4ac-11d8-9b0a-000347a4fa7d
gnutls-devel>=1.1.*<1.1.12|http://www.hornik.sk/SA/SA-20040802.txt http://secunia.com/advisories/12156|GnuTLS certificate chain verification DoS|84ab58cf-e4ac-11d8-9b0a-000347a4fa7d
-ripmime<1.3.2.3|http://www.osvdb.org/8287 http://secunia.com/advisories/12201 http://www.securityfocus.com/bid/10848|ripMIME attachment extraction bypass|85e19dff-e606-11d8-9b0a-000347a4fa7d
{linux-,}opera<7.54|http://www.opera.com/freebsd/changelogs/754/ http://www.greymagic.com/security/advisories/gm008-op/ http://secunia.com/advisories/12233 http://www.osvdb.org/8331|Opera "location" object write access vulnerability|0deed2ce-e6f5-11d8-9a79-000347dd607f
putty<0.55|http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html http://www.coresecurity.com/common/showdoc.php?idx=417&idxseccion=10 http://www.osvdb.org/8299 http://secunia.com/advisories/12212|modified server can execute commands on the client|4424f4db-e697-11d8-bf04-000c763e9a47
cfengine2<2.1.8|http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 http://secunia.com/advisories/12251|cfengine authentication heap corruption|f2a1dc8b-ea66-11d8-9440-000347a4fa7d