summaryrefslogtreecommitdiff
path: root/security/portaudit-db
diff options
context:
space:
mode:
authorOliver Eikemeier <eik@FreeBSD.org>2004-08-27 10:31:21 +0000
committerOliver Eikemeier <eik@FreeBSD.org>2004-08-27 10:31:21 +0000
commite60105678983e3a2ab0ee3ee5eca0e9a209068a6 (patch)
tree8e4b788465fd457c4b41ee48a2c23bf40c0d944e /security/portaudit-db
parentDepend on GNOME/pkgconfig (diff)
Mozilla / NSS S/MIME DoS vulnerability & Scorched 3D server chat box format string vulnerability
Notes
Notes: svn path=/head/; revision=117403
Diffstat (limited to 'security/portaudit-db')
-rw-r--r--security/portaudit-db/database/portaudit.txt2
1 files changed, 2 insertions, 0 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt
index e22cf32f1fff..1df30f4cf0ff 100644
--- a/security/portaudit-db/database/portaudit.txt
+++ b/security/portaudit-db/database/portaudit.txt
@@ -69,3 +69,5 @@ apache>=2.*<2.0.50_2|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-
a2ps-{a4,letter,letterdj}<4.13b_2|http://www.freebsd.org/cgi/query-pr.cgi?pr=70618|a2ps: Possible execution of shell commands as local user|8091fcea-f35e-11d8-81b0-000347a4fa7d
{ja-,}xv<=3.10a_3|http://secunia.com/advisories/12352 http://www.securityfocus.com/archive/1/372345 http://www.osvdb.org/9115 http://www.osvdb.org/9118 http://www.osvdb.org/9119 http://www.osvdb.org/9120|multiple buffer overflows in xv|34c453ba-f686-11d8-81b0-000347a4fa7d
nss<3.9.2|http://xforce.iss.net/xforce/alerts/id/180 http://secunia.com/advisories/12362 http://www.osvdb.org/9116|Netscape network security services (NSS) library SSL remote buffer overflow|207f8ff3-f697-11d8-81b0-000347a4fa7d
+nss<3.9|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0564 http://secunia.com/advisories/11096 http://www.osvdb.org/4197|Mozilla / NSS S/MIME DoS vulnerability|65532ad9-f69b-11d8-81b0-000347a4fa7d
+scorched3d<0.37.2|http://secunia.com/advisories/11319 http://www.osvdb.org/5086 http://security.gentoo.org/glsa/glsa-200404-12.xml|Scorched 3D server chat box format string vulnerability|ee04040e-f813-11d8-81b0-000347a4fa7d