diff options
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.txt | 1 | ||||
-rw-r--r-- | security/portaudit-db/database/portaudit.txt | 1 | ||||
-rw-r--r-- | security/vuxml/vuln.xml | 27 |
3 files changed, 27 insertions, 2 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt index f4233b127db8..22b1f9342a54 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.txt +++ b/ports-mgmt/portaudit-db/database/portaudit.txt @@ -35,4 +35,3 @@ rssh<2.2.1|http://secunia.com/advisories/11926 http://www.securityfocus.com/arch sup<=2.0|http://secunia.com/advisories/11898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0451|CMU SUP logging format string vulnerabilities|238ea8eb-c5cf-11d8-8898-000d6111a684 rlpr<2.04_1|http://secunia.com/advisories/11906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0454 http://www.osvdb.org/7194 http://www.osvdb.org/7195 http://securitytracker.com/id?1010545 http://www.securityfocus.com/archive/1/367045|rlpr "msg()" buffer overflow and format string vulnerabilities|29a72da5-c5ea-11d8-8898-000d6111a684 pure-ftpd<1.0.19|http://www.pureftpd.org/|Pure-FTPd DoS when maximum number of connections is reached|ec5cf461-c691-11d8-8898-000d6111a684 -giFT-FastTrack<0.8.7|http://developer.berlios.de/forum/forum.php?forum_id=5814|giFT-FastTrack remote DoS of HTTP server and client|1f738bda-c6ac-11d8-8898-000d6111a684 diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt index f4233b127db8..22b1f9342a54 100644 --- a/security/portaudit-db/database/portaudit.txt +++ b/security/portaudit-db/database/portaudit.txt @@ -35,4 +35,3 @@ rssh<2.2.1|http://secunia.com/advisories/11926 http://www.securityfocus.com/arch sup<=2.0|http://secunia.com/advisories/11898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0451|CMU SUP logging format string vulnerabilities|238ea8eb-c5cf-11d8-8898-000d6111a684 rlpr<2.04_1|http://secunia.com/advisories/11906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0454 http://www.osvdb.org/7194 http://www.osvdb.org/7195 http://securitytracker.com/id?1010545 http://www.securityfocus.com/archive/1/367045|rlpr "msg()" buffer overflow and format string vulnerabilities|29a72da5-c5ea-11d8-8898-000d6111a684 pure-ftpd<1.0.19|http://www.pureftpd.org/|Pure-FTPd DoS when maximum number of connections is reached|ec5cf461-c691-11d8-8898-000d6111a684 -giFT-FastTrack<0.8.7|http://developer.berlios.de/forum/forum.php?forum_id=5814|giFT-FastTrack remote DoS of HTTP server and client|1f738bda-c6ac-11d8-8898-000d6111a684 diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 4a68eaa4e347..5a08d9c2e57b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,33 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1f738bda-c6ac-11d8-8898-000d6111a684"> + <topic>Remote Denial of Service of HTTP server and client</topic> + <affects> + <package> + <name>giFT-FastTrack</name> + <range><lt>0.8.7</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>giFT-FastTrack is susceptible to a remote + Denial of Service attack which could allow + a remote attacker to render HTTP services + unusable. According to the developers, no + code execution is possible; however, they + recommend an immediate upgrade.</p> + </body> + </description> + <references> + <url>http://developer.berlios.de/forum/forum.php?forum_id=5814</url> + </references> + <dates> + <discovery>2004-06-19</discovery> + <entry>2004-06-25</entry> + </dates> + </vuln> + <vuln vid="253ea131-bd12-11d8-b071-00e08110b673"> <topic>Gallery 1.4.3 and ealier user authentication bypass</topic> <affects> |