aboutsummaryrefslogtreecommitdiff
path: root/graphics/maim
diff options
context:
space:
mode:
authorCraig Leres <leres@FreeBSD.org>2020-04-14 20:53:37 +0000
committerCraig Leres <leres@FreeBSD.org>2020-04-14 20:53:37 +0000
commitb6d8f95ba31422e2576751b300cfb52149f7685f (patch)
tree6cf86577aaff0b0db5dcbad84d85035b700525f1 /graphics/maim
parentdeeaf0e960b1ebbe3a159fe56b9ae43edf1b4678 (diff)
downloadports-b6d8f95ba31422e2576751b300cfb52149f7685f.tar.gz
ports-b6d8f95ba31422e2576751b300cfb52149f7685f.zip
security/vuxml: Mark zeek < 3.0.4 as vulnerable as per:
https://github.com/zeek/zeek/blob/e059d4ec2e689b3c8942f4aa08b272f24ed3f612/NEWS An attacker can crash Zeek remotely via crafted packet sequence via a stack overflow in POP3 analyzer.
Notes
Notes: svn path=/head/; revision=531728
Diffstat (limited to 'graphics/maim')
0 files changed, 0 insertions, 0 deletions