diff options
author | eik <eik@FreeBSD.org> | 2004-08-27 18:31:21 +0800 |
---|---|---|
committer | eik <eik@FreeBSD.org> | 2004-08-27 18:31:21 +0800 |
commit | e91056ec76bf7718cfd5864b946390457474ccce (patch) | |
tree | 739b94be9a45a6a99ba27c036d8f58bc14d0baf4 /security/portaudit-db | |
parent | 9db83f37268ddd70bb46e1bb68e7018ef04cb21b (diff) | |
download | freebsd-ports-graphics-e91056ec76bf7718cfd5864b946390457474ccce.tar.gz freebsd-ports-graphics-e91056ec76bf7718cfd5864b946390457474ccce.tar.zst freebsd-ports-graphics-e91056ec76bf7718cfd5864b946390457474ccce.zip |
Mozilla / NSS S/MIME DoS vulnerability & Scorched 3D server chat box format string vulnerability
Diffstat (limited to 'security/portaudit-db')
-rw-r--r-- | security/portaudit-db/database/portaudit.txt | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt index e22cf32f1ff..1df30f4cf0f 100644 --- a/security/portaudit-db/database/portaudit.txt +++ b/security/portaudit-db/database/portaudit.txt @@ -69,3 +69,5 @@ apache>=2.*<2.0.50_2|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004- a2ps-{a4,letter,letterdj}<4.13b_2|http://www.freebsd.org/cgi/query-pr.cgi?pr=70618|a2ps: Possible execution of shell commands as local user|8091fcea-f35e-11d8-81b0-000347a4fa7d {ja-,}xv<=3.10a_3|http://secunia.com/advisories/12352 http://www.securityfocus.com/archive/1/372345 http://www.osvdb.org/9115 http://www.osvdb.org/9118 http://www.osvdb.org/9119 http://www.osvdb.org/9120|multiple buffer overflows in xv|34c453ba-f686-11d8-81b0-000347a4fa7d nss<3.9.2|http://xforce.iss.net/xforce/alerts/id/180 http://secunia.com/advisories/12362 http://www.osvdb.org/9116|Netscape network security services (NSS) library SSL remote buffer overflow|207f8ff3-f697-11d8-81b0-000347a4fa7d +nss<3.9|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0564 http://secunia.com/advisories/11096 http://www.osvdb.org/4197|Mozilla / NSS S/MIME DoS vulnerability|65532ad9-f69b-11d8-81b0-000347a4fa7d +scorched3d<0.37.2|http://secunia.com/advisories/11319 http://www.osvdb.org/5086 http://security.gentoo.org/glsa/glsa-200404-12.xml|Scorched 3D server chat box format string vulnerability|ee04040e-f813-11d8-81b0-000347a4fa7d |