aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorOliver Eikemeier <eik@FreeBSD.org>2004-06-25 13:34:38 +0000
committerOliver Eikemeier <eik@FreeBSD.org>2004-06-25 13:34:38 +0000
commit44285aa4bae2214b2385f176b3ccf477e8510ee7 (patch)
tree25725fe5ea562c7f5f6709096eddf5287c605c55
parentf16e01b9429c6a815e89002b1a68f166dde9211d (diff)
downloadports-44285aa4bae2214b2385f176b3ccf477e8510ee7.tar.gz
ports-44285aa4bae2214b2385f176b3ccf477e8510ee7.zip
Notes
-rw-r--r--ports-mgmt/portaudit-db/database/portaudit.txt1
-rw-r--r--security/portaudit-db/database/portaudit.txt1
2 files changed, 2 insertions, 0 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt
index 22b1f9342a54..f4233b127db8 100644
--- a/ports-mgmt/portaudit-db/database/portaudit.txt
+++ b/ports-mgmt/portaudit-db/database/portaudit.txt
@@ -35,3 +35,4 @@ rssh<2.2.1|http://secunia.com/advisories/11926 http://www.securityfocus.com/arch
sup<=2.0|http://secunia.com/advisories/11898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0451|CMU SUP logging format string vulnerabilities|238ea8eb-c5cf-11d8-8898-000d6111a684
rlpr<2.04_1|http://secunia.com/advisories/11906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0454 http://www.osvdb.org/7194 http://www.osvdb.org/7195 http://securitytracker.com/id?1010545 http://www.securityfocus.com/archive/1/367045|rlpr "msg()" buffer overflow and format string vulnerabilities|29a72da5-c5ea-11d8-8898-000d6111a684
pure-ftpd<1.0.19|http://www.pureftpd.org/|Pure-FTPd DoS when maximum number of connections is reached|ec5cf461-c691-11d8-8898-000d6111a684
+giFT-FastTrack<0.8.7|http://developer.berlios.de/forum/forum.php?forum_id=5814|giFT-FastTrack remote DoS of HTTP server and client|1f738bda-c6ac-11d8-8898-000d6111a684
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt
index 22b1f9342a54..f4233b127db8 100644
--- a/security/portaudit-db/database/portaudit.txt
+++ b/security/portaudit-db/database/portaudit.txt
@@ -35,3 +35,4 @@ rssh<2.2.1|http://secunia.com/advisories/11926 http://www.securityfocus.com/arch
sup<=2.0|http://secunia.com/advisories/11898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0451|CMU SUP logging format string vulnerabilities|238ea8eb-c5cf-11d8-8898-000d6111a684
rlpr<2.04_1|http://secunia.com/advisories/11906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0454 http://www.osvdb.org/7194 http://www.osvdb.org/7195 http://securitytracker.com/id?1010545 http://www.securityfocus.com/archive/1/367045|rlpr "msg()" buffer overflow and format string vulnerabilities|29a72da5-c5ea-11d8-8898-000d6111a684
pure-ftpd<1.0.19|http://www.pureftpd.org/|Pure-FTPd DoS when maximum number of connections is reached|ec5cf461-c691-11d8-8898-000d6111a684
+giFT-FastTrack<0.8.7|http://developer.berlios.de/forum/forum.php?forum_id=5814|giFT-FastTrack remote DoS of HTTP server and client|1f738bda-c6ac-11d8-8898-000d6111a684