diff options
author | eik <eik@FreeBSD.org> | 2004-07-06 03:45:32 +0800 |
---|---|---|
committer | eik <eik@FreeBSD.org> | 2004-07-06 03:45:32 +0800 |
commit | 30b36fade037adb68b326d58529f05088d8139fa (patch) | |
tree | f6bfd9f49aa6439690551903608db4ffea541eb9 /security | |
parent | a985bf32df3ffbfc6cdd5782732dcdae0cf36040 (diff) | |
download | freebsd-ports-graphics-30b36fade037adb68b326d58529f05088d8139fa.tar.gz freebsd-ports-graphics-30b36fade037adb68b326d58529f05088d8139fa.tar.zst freebsd-ports-graphics-30b36fade037adb68b326d58529f05088d8139fa.zip |
add MySQL server authentication bypass / buffer overflow
Diffstat (limited to 'security')
-rw-r--r-- | security/portaudit-db/database/portaudit.txt | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt index 945d85fb038..0016520246f 100644 --- a/security/portaudit-db/database/portaudit.txt +++ b/security/portaudit-db/database/portaudit.txt @@ -36,3 +36,5 @@ libxine<1.0.r4|http://www.xinehq.de/index.php/security/XSA-2004-3 http://cve.mit apache>=2.*<2.0.49_3|http://www.guninski.com/httpd1.html http://www.apacheweek.com/features/security-20 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493 http://secunia.com/advisories/11956 http://www.osvdb.org/7269|Apache input header folding DoS vulnerability|81a8c9c2-c94f-11d8-8898-000d6111a684 isakmpd<20040611|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022399.html http://www.osvdb.org/6951 http://www.secunia.com/advisories/11827 http://www.securityfocus.com/bid/10496|isakmpd security association deletion vulnerability|9a73a5b4-c9b5-11d8-95ca-02e081301d81 krb5<1.3.4|http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-001-an_to_ln.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0523 http://www.osvdb.org/6846 http://secunia.com/advisories/11753 http://www.kb.cert.org/vuls/id/686862 http://www.securityfocus.com/bid/10448|MIT Kerberos 5 krb5_aname_to_localname() buffer overflow|5177b6e5-c9b7-11d8-95ca-02e081301d81 +mysql-server<4.1.3|http://www.nextgenss.com/advisories/mysql-authbypass.txt|MySQL authentication bypass / buffer overflow|e5e2883d-ceb9-11d8-8898-000d6111a684 +mysql-server>=5.*<=5.0.0_2|http://www.nextgenss.com/advisories/mysql-authbypass.txt|MySQL authentication bypass / buffer overflow|e5e2883d-ceb9-11d8-8898-000d6111a684 |