diff options
author | eik <eik@FreeBSD.org> | 2004-08-21 18:45:26 +0800 |
---|---|---|
committer | eik <eik@FreeBSD.org> | 2004-08-21 18:45:26 +0800 |
commit | 257a476374eacd58b3734ba2e92c4fab104e0b1d (patch) | |
tree | 229e63d9af97e61cd61d81d2ac1c9f52029ad2cb /security/portaudit-db | |
parent | b0594b435d6322a6fb9f723883f7c7074ad57586 (diff) | |
download | freebsd-ports-gnome-257a476374eacd58b3734ba2e92c4fab104e0b1d.tar.gz freebsd-ports-gnome-257a476374eacd58b3734ba2e92c4fab104e0b1d.tar.zst freebsd-ports-gnome-257a476374eacd58b3734ba2e92c4fab104e0b1d.zip |
a2ps: Possible execution of shell commands as local user.
Diffstat (limited to 'security/portaudit-db')
-rw-r--r-- | security/portaudit-db/database/portaudit.txt | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt index e28691383653..ed35599ec6b0 100644 --- a/security/portaudit-db/database/portaudit.txt +++ b/security/portaudit-db/database/portaudit.txt @@ -70,4 +70,5 @@ phpgedview<2.65.5|http://sourceforge.net/forum/forum.php?forum_id=344342 http:// {ja-,}phpgroupware<0.9.16.002|http://freshmeat.net/releases/168144 http://www.osvdb.org/8354 http://xforce.iss.net/xforce/xfdb/16970|phpGroupWare stores passwords in plain text|82f16a40-ef12-11d8-81b0-000347a4fa7d gallery<=1.4.4|http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html http://xforce.iss.net/xforce/xfdb/17021|Gallery arbitrary PHP file upload|031663de-f0a6-11d8-81b0-000347a4fa7d apache>=2.*<2.0.50_2|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751 http://issues.apache.org/bugzilla/show_bug.cgi?id=30134 http://issues.apache.org/bugzilla/show_bug.cgi?id=27945 http://issues.apache.org/bugzilla/show_bug.cgi?id=29690|potential security flaws in mod_ssl|0e08f539-f151-11d8-81b0-000347a4fa7d -qt>=3.*<3.3.3|http://scary.beasts.org/security/CESA-2004-004.txt http://secunia.com/advisories/12325 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0693 http://www.osvdb.org/9026|QT 3.x BMP heap-based overflow, GIF and XPM DoS NULL pointer dereference|eda0ade6-f281-11d8-81b0-000347a4fa7d +qt>=3.*<3.3.3|http://scary.beasts.org/security/CESA-2004-004.txt http://secunia.com/advisories/12325 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0693 http://www.osvdb.org/9026 http://xforce.iss.net/xforce/xfdb/17040 http://xforce.iss.net/xforce/xfdb/17041 http://xforce.iss.net/xforce/xfdb/17042|Qt 3.x BMP heap-based overflow, GIF and XPM DoS NULL pointer dereference|eda0ade6-f281-11d8-81b0-000347a4fa7d +a2ps-{a4,letter,letterdj}<4.13b_2|http://www.freebsd.org/cgi/query-pr.cgi?pr=70618|a2ps: Possible execution of shell commands as local user|8091fcea-f35e-11d8-81b0-000347a4fa7d |