diff options
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.txt | 1 | ||||
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.xml | 4 | ||||
-rw-r--r-- | security/portaudit-db/database/portaudit.txt | 1 | ||||
-rw-r--r-- | security/portaudit-db/database/portaudit.xml | 4 |
4 files changed, 8 insertions, 2 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt index 10ea23b80886..aae6c7c0e274 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.txt +++ b/ports-mgmt/portaudit-db/database/portaudit.txt @@ -62,5 +62,4 @@ ripmime<1.3.2.3|http://www.osvdb.org/8287 http://secunia.com/advisories/12201|ri squid<2.5.5_11|http://www.osvdb.org/6791|Squid NTLM authentication helper overflow|f72ccf7c-e607-11d8-9b0a-000347a4fa7d acroread<5.09|http://www.osvdb.org/7429 http://freshmeat.net/projects/acrobatreader/?branch_id=92&release_id=164883|Acrobat Reader handling of malformed uuencoded pdf files|ab166a60-e60a-11d8-9b0a-000347a4fa7d {linux-,}opera<7.54|http://www.opera.com/freebsd/changelogs/754/ http://www.greymagic.com/security/advisories/gm008-op/ http://secunia.com/advisories/12233 http://www.osvdb.org/8331|Opera "location" object write access vulnerability|0deed2ce-e6f5-11d8-9a79-000347dd607f -ja-samba>=2.2.0<2.2.10|http://www.osvdb.org/8191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686|Buffer overflow|7eded4b8-e6fe-11d8-b12f-0a001f31891a putty<0.55|http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html http://www.coresecurity.com/common/showdoc.php?idx=417&idxseccion=10|modified server can execute commands on the client|4424f4db-e697-11d8-bf04-000c763e9a47 diff --git a/ports-mgmt/portaudit-db/database/portaudit.xml b/ports-mgmt/portaudit-db/database/portaudit.xml index 950d27ba7640..635d7325c9e5 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.xml +++ b/ports-mgmt/portaudit-db/database/portaudit.xml @@ -101,4 +101,8 @@ This file is in the public domain. <entry>2004-06-30</entry> </dates> </vuln> + + <vuln vid="7eded4b8-e6fe-11d8-b12f-0a001f31891a"> + <cancelled superseded="2de14f7a-dad9-11d8-b59a-00061bc2ad93"/> + </vuln> </vuxml> diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt index 10ea23b80886..aae6c7c0e274 100644 --- a/security/portaudit-db/database/portaudit.txt +++ b/security/portaudit-db/database/portaudit.txt @@ -62,5 +62,4 @@ ripmime<1.3.2.3|http://www.osvdb.org/8287 http://secunia.com/advisories/12201|ri squid<2.5.5_11|http://www.osvdb.org/6791|Squid NTLM authentication helper overflow|f72ccf7c-e607-11d8-9b0a-000347a4fa7d acroread<5.09|http://www.osvdb.org/7429 http://freshmeat.net/projects/acrobatreader/?branch_id=92&release_id=164883|Acrobat Reader handling of malformed uuencoded pdf files|ab166a60-e60a-11d8-9b0a-000347a4fa7d {linux-,}opera<7.54|http://www.opera.com/freebsd/changelogs/754/ http://www.greymagic.com/security/advisories/gm008-op/ http://secunia.com/advisories/12233 http://www.osvdb.org/8331|Opera "location" object write access vulnerability|0deed2ce-e6f5-11d8-9a79-000347dd607f -ja-samba>=2.2.0<2.2.10|http://www.osvdb.org/8191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0686|Buffer overflow|7eded4b8-e6fe-11d8-b12f-0a001f31891a putty<0.55|http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html http://www.coresecurity.com/common/showdoc.php?idx=417&idxseccion=10|modified server can execute commands on the client|4424f4db-e697-11d8-bf04-000c763e9a47 diff --git a/security/portaudit-db/database/portaudit.xml b/security/portaudit-db/database/portaudit.xml index 950d27ba7640..635d7325c9e5 100644 --- a/security/portaudit-db/database/portaudit.xml +++ b/security/portaudit-db/database/portaudit.xml @@ -101,4 +101,8 @@ This file is in the public domain. <entry>2004-06-30</entry> </dates> </vuln> + + <vuln vid="7eded4b8-e6fe-11d8-b12f-0a001f31891a"> + <cancelled superseded="2de14f7a-dad9-11d8-b59a-00061bc2ad93"/> + </vuln> </vuxml> |