summaryrefslogtreecommitdiff
path: root/ports-mgmt/portaudit
diff options
context:
space:
mode:
authorOliver Eikemeier <eik@FreeBSD.org>2004-02-16 19:14:24 +0000
committerOliver Eikemeier <eik@FreeBSD.org>2004-02-16 19:14:24 +0000
commit3fcca49ba6e2f8bcf7b61d4ce2a55c772e8d09b8 (patch)
tree4eac09210553da81fd8ea249c9b81fc8e85ccc0d /ports-mgmt/portaudit
parentOn ia64, libpython2.3 must be built with -fPIC as well. This unbreaks (diff)
add mutt and mailman
Notes
Notes: svn path=/head/; revision=101079
Diffstat (limited to 'ports-mgmt/portaudit')
-rw-r--r--ports-mgmt/portaudit/database/auditfile.txt2
1 files changed, 2 insertions, 0 deletions
diff --git a/ports-mgmt/portaudit/database/auditfile.txt b/ports-mgmt/portaudit/database/auditfile.txt
index 7d2b6a6b83a9..33b086476565 100644
--- a/ports-mgmt/portaudit/database/auditfile.txt
+++ b/ports-mgmt/portaudit/database/auditfile.txt
@@ -45,3 +45,5 @@ libtool>=1.5<1.5.2|http://www.securityfocus.com/archive/1/352333|symlink vulnera
gnats<=3.113.1_9|http://www.securityfocus.com/archive/1/326337|Local privilege elevation
XFree86-Server>=4.1.0<4.3.0_14|http://www.xfree86.org/security/|Font file buffer overflows
XFree86-Server>=4.3.99<4.3.99.15_2|http://www.xfree86.org/security/|Font file buffer overflows
+mutt<1.4.2|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0078|Remote exploitable buffer overflow
+mailman<2.1.4|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0965|Cross-site scripting (XSS) vulnerability