aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2006-10-21 06:59:39 +0800
committersimon <simon@FreeBSD.org>2006-10-21 06:59:39 +0800
commit3d0feb0bbbf5dc8e318b947f531fa57c17742605 (patch)
tree3acd9211aad05550e72264a1fcc20763c10b9123 /security/vuxml
parent1f008ebe1a308d9e0ea937bba427fe7d190ff892 (diff)
downloadfreebsd-ports-gnome-3d0feb0bbbf5dc8e318b947f531fa57c17742605.tar.gz
freebsd-ports-gnome-3d0feb0bbbf5dc8e318b947f531fa57c17742605.tar.zst
freebsd-ports-gnome-3d0feb0bbbf5dc8e318b947f531fa57c17742605.zip
Add reference, which I missed the first time around, from Opera
Software to opera -- URL parsing heap overflow vulnerability entry, Approved by: portmgr (secteam blanket)
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml1
1 files changed, 1 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 00dd6a7b733e..108cf2b21b7e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -64,6 +64,7 @@ Note: Please add new entries to the beginning of this file.
<cvename>CVE-2006-4819</cvename>
<url>http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=424</url>
<url>http://secunia.com/advisories/22218/</url>
+ <url>http://www.opera.com/support/search/supsearch.dml?index=848</url>
</references>
<dates>
<discovery>2006-10-17</discovery>