diff options
author | Dirk Meyer <dinoex@FreeBSD.org> | 2004-08-05 04:33:45 +0000 |
---|---|---|
committer | Dirk Meyer <dinoex@FreeBSD.org> | 2004-08-05 04:33:45 +0000 |
commit | 13fef83a69c394f3126042e5df72a5fd6362ec03 (patch) | |
tree | 415bc706c18b86d67558166daf94cda8d4ef7150 /security/portaudit-db/database/portaudit.txt | |
parent | 3e024e4469e1ed76967af39aed30e8922e69631f (diff) |
back out last commit
Notes
Notes:
svn path=/head/; revision=115442
Diffstat (limited to 'security/portaudit-db/database/portaudit.txt')
-rw-r--r-- | security/portaudit-db/database/portaudit.txt | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/security/portaudit-db/database/portaudit.txt b/security/portaudit-db/database/portaudit.txt index 320471f6de9c..acccad8a2e90 100644 --- a/security/portaudit-db/database/portaudit.txt +++ b/security/portaudit-db/database/portaudit.txt @@ -65,4 +65,3 @@ acroread<5.09|http://www.osvdb.org/7429 http://freshmeat.net/projects/acrobatrea png<=1.2.5_7|http://www.securityfocus.com/archive/1/370853 http://www.osvdb.org/8312 http://www.osvdb.org/8313 http://www.osvdb.org/8314 http://www.osvdb.org/8315 http://www.osvdb.org/8316 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599 http://www.kb.cert.org/vuls/id/388984 http://www.kb.cert.org/vuls/id/236656 http://www.kb.cert.org/vuls/id/160448 http://www.kb.cert.org/vuls/id/477512 http://www.kb.cert.org/vuls/id/817368 http://www.kb.cert.org/vuls/id/286464|libPNG stack-based buffer overflow and other code concerns|f9e3e60b-e650-11d8-9b0a-000347a4fa7d linux-png<=1.0.14_3|http://www.securityfocus.com/archive/1/370853 http://www.osvdb.org/8312 http://www.osvdb.org/8313 http://www.osvdb.org/8314 http://www.osvdb.org/8315 http://www.osvdb.org/8316 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599 http://www.kb.cert.org/vuls/id/388984 http://www.kb.cert.org/vuls/id/236656 http://www.kb.cert.org/vuls/id/160448 http://www.kb.cert.org/vuls/id/477512 http://www.kb.cert.org/vuls/id/817368 http://www.kb.cert.org/vuls/id/286464|libPNG stack-based buffer overflow and other code concerns|f9e3e60b-e650-11d8-9b0a-000347a4fa7d linux-png>=1.2.*<=1.2.2|http://www.securityfocus.com/archive/1/370853 http://www.osvdb.org/8312 http://www.osvdb.org/8313 http://www.osvdb.org/8314 http://www.osvdb.org/8315 http://www.osvdb.org/8316 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599 http://www.kb.cert.org/vuls/id/388984 http://www.kb.cert.org/vuls/id/236656 http://www.kb.cert.org/vuls/id/160448 http://www.kb.cert.org/vuls/id/477512 http://www.kb.cert.org/vuls/id/817368 http://www.kb.cert.org/vuls/id/286464|libPNG stack-based buffer overflow and other code concerns|f9e3e60b-e650-11d8-9b0a-000347a4fa7d -putty<0.55|http://www.chiark.greenend.org.uk/~sgtatham/putty/|modified server can execute commands on the client|4424f4db-e697-11d8-bf04-000c763e9a47 |