aboutsummaryrefslogtreecommitdiffstats
path: root/ports-mgmt
diff options
context:
space:
mode:
authoreik <eik@FreeBSD.org>2004-08-07 17:09:26 +0800
committereik <eik@FreeBSD.org>2004-08-07 17:09:26 +0800
commitbfd243bcef16ca810c1b8957bd8680a8b9d07a46 (patch)
treed0ae598add6f4f4b0801fd1be5df7ee4aea278ec /ports-mgmt
parente057720bbe4057e995f989b3c9342b25284a48c7 (diff)
downloadfreebsd-ports-graphics-bfd243bcef16ca810c1b8957bd8680a8b9d07a46.tar.gz
freebsd-ports-graphics-bfd243bcef16ca810c1b8957bd8680a8b9d07a46.tar.zst
freebsd-ports-graphics-bfd243bcef16ca810c1b8957bd8680a8b9d07a46.zip
CVStrac arbitrary remote code execution
Diffstat (limited to 'ports-mgmt')
-rw-r--r--ports-mgmt/portaudit-db/database/portaudit.txt3
1 files changed, 2 insertions, 1 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt
index aae6c7c0e27..949dcf430ac 100644
--- a/ports-mgmt/portaudit-db/database/portaudit.txt
+++ b/ports-mgmt/portaudit-db/database/portaudit.txt
@@ -62,4 +62,5 @@ ripmime<1.3.2.3|http://www.osvdb.org/8287 http://secunia.com/advisories/12201|ri
squid<2.5.5_11|http://www.osvdb.org/6791|Squid NTLM authentication helper overflow|f72ccf7c-e607-11d8-9b0a-000347a4fa7d
acroread<5.09|http://www.osvdb.org/7429 http://freshmeat.net/projects/acrobatreader/?branch_id=92&release_id=164883|Acrobat Reader handling of malformed uuencoded pdf files|ab166a60-e60a-11d8-9b0a-000347a4fa7d
{linux-,}opera<7.54|http://www.opera.com/freebsd/changelogs/754/ http://www.greymagic.com/security/advisories/gm008-op/ http://secunia.com/advisories/12233 http://www.osvdb.org/8331|Opera "location" object write access vulnerability|0deed2ce-e6f5-11d8-9a79-000347dd607f
-putty<0.55|http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html http://www.coresecurity.com/common/showdoc.php?idx=417&idxseccion=10|modified server can execute commands on the client|4424f4db-e697-11d8-bf04-000c763e9a47
+putty<0.55|http://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html http://www.coresecurity.com/common/showdoc.php?idx=417&idxseccion=10 http://www.osvdb.org/8299 http://secunia.com/advisories/12212|modified server can execute commands on the client|4424f4db-e697-11d8-bf04-000c763e9a47
+cvstrac<1.1.4|http://www.securityfocus.com/archive/1/370955 http://www.cvstrac.org/cvstrac/chngview?cn=316|CVStrac remote code execution vulnerability|0139e7e0-e850-11d8-9440-000347a4fa7d
6-06-23 17:48:53 +0800'>2016-06-231-1/+1 * Update Linux ports to Centos 6.8.tijl2016-06-212-10/+12 * CentOS ports: for c6_64, install 32bit libraries alongsideswills2016-04-132-0/+8 * Welcome Centos 6.7miwi2016-01-312-8/+8 * Re-commit ofnetchild2015-08-103-0/+10 * Unbreak INDEX, reverting r392921antoine2015-07-263-10/+0 * 64 bit linuxulator support (not activated by default):netchild2015-07-263-0/+10 * Upgrade CentOS to 6.6xmj2014-11-112-5/+6