aboutsummaryrefslogtreecommitdiff
path: root/ports-mgmt/portaudit-db/database
diff options
context:
space:
mode:
authorOliver Eikemeier <eik@FreeBSD.org>2004-06-25 12:37:32 +0000
committerOliver Eikemeier <eik@FreeBSD.org>2004-06-25 12:37:32 +0000
commita77dbe0db0dd6f0be33b0430ece661adfe0fccc4 (patch)
treeb78049f089e00c3071d398a7a12d12032dc9e638 /ports-mgmt/portaudit-db/database
parentd3eca5fdf3d008419812d196d6232f648c49a505 (diff)
Notes
Diffstat (limited to 'ports-mgmt/portaudit-db/database')
-rw-r--r--ports-mgmt/portaudit-db/database/portaudit.txt4
1 files changed, 2 insertions, 2 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt
index a35f14cfd6b0..22b1f9342a54 100644
--- a/ports-mgmt/portaudit-db/database/portaudit.txt
+++ b/ports-mgmt/portaudit-db/database/portaudit.txt
@@ -33,5 +33,5 @@ isc-dhcp3-{relay,server}>=3.0.1.r12<3.0.1.r14|http://www.us-cert.gov/cas/techale
icecast2<2.0.1,1|http://secunia.com/advisories/11578 http://www.osvdb.org/6075|Icecast remote DoS vulnerability|8de7cf18-c5ca-11d8-8898-000d6111a684
rssh<2.2.1|http://secunia.com/advisories/11926 http://www.securityfocus.com/archive/1/366691|rssh file existence information disclosure weakness|a4815970-c5cc-11d8-8898-000d6111a684
sup<=2.0|http://secunia.com/advisories/11898 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0451|CMU SUP logging format string vulnerabilities|238ea8eb-c5cf-11d8-8898-000d6111a684
-rlpr<=2.02_2|http://secunia.com/advisories/11906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0454 http://www.osvdb.org/7194 http://www.osvdb.org/7195 http://securitytracker.com/id?1010545|rlpr "msg()" buffer overflow and format string vulnerabilities|29a72da5-c5ea-11d8-8898-000d6111a684
-pure-ftpd<1.0.19|http://www.pureftpd.org/|Pure-FTPd DoS when the max number of connection is reached|ec5cf461-c691-11d8-8898-000d6111a684
+rlpr<2.04_1|http://secunia.com/advisories/11906 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0393 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0454 http://www.osvdb.org/7194 http://www.osvdb.org/7195 http://securitytracker.com/id?1010545 http://www.securityfocus.com/archive/1/367045|rlpr "msg()" buffer overflow and format string vulnerabilities|29a72da5-c5ea-11d8-8898-000d6111a684
+pure-ftpd<1.0.19|http://www.pureftpd.org/|Pure-FTPd DoS when maximum number of connections is reached|ec5cf461-c691-11d8-8898-000d6111a684