diff options
author | Doug Barton <dougb@FreeBSD.org> | 2011-09-05 09:45:09 +0000 |
---|---|---|
committer | Doug Barton <dougb@FreeBSD.org> | 2011-09-05 09:45:09 +0000 |
commit | 9ca2a4be160ec6214f2b932537cfb77b7cf2244b (patch) | |
tree | 13d90bd10b0c17f53e1c4ab77a94a95a041cbbf4 /ports-mgmt | |
parent | d960034d57446830c13952f067c693b918854be0 (diff) | |
download | ports-9ca2a4be160ec6214f2b932537cfb77b7cf2244b.tar.gz ports-9ca2a4be160ec6214f2b932537cfb77b7cf2244b.zip |
Remove 2004 aspell entry that has long since been dealt with.
The format of the entry incorrectly matched dictionaries that
could not possibly be vulnerable to the buffer overflow issue.
Approved by: simon
Notes
Notes:
svn path=/head/; revision=281221
Diffstat (limited to 'ports-mgmt')
-rw-r--r-- | ports-mgmt/portaudit-db/database/portaudit.txt | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/ports-mgmt/portaudit-db/database/portaudit.txt b/ports-mgmt/portaudit-db/database/portaudit.txt index ccb7b401f54c..b2b2af826ecf 100644 --- a/ports-mgmt/portaudit-db/database/portaudit.txt +++ b/ports-mgmt/portaudit-db/database/portaudit.txt @@ -17,7 +17,6 @@ webmin<1.150|http://www.webmin.com/changes-1.150.html http://www.osvdb.org/6729 racoon<20040617a|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022617.html http://www.securityfocus.com/archive/1/366023 http://securitytracker.com/alerts/2004/Jun/1010495.html http://orange.kame.net/dev/cvsweb.cgi/kame/kame/kame/racoon/crypto_openssl.c#rev1.86 http://www.securityfocus.com/bid/10546 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0607|Racoon may validate invalid certificates|a96c1d37-c033-11d8-b00e-000347a4fa7d ircd-hybrid<=7.0_1|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022820.html http://www.securityfocus.com/archive/1/366486 http://www.osvdb.org/7242|ircd-hybrid-7 low-bandwidth DoS|23aafa20-c28a-11d8-864c-02e0185c0b53 ircd-hybrid-ru<=7.1_2|http://lists.netsys.com/pipermail/full-disclosure/2004-June/022820.html http://www.securityfocus.com/archive/1/366486 http://www.osvdb.org/7242|ircd-hybrid-7 low-bandwidth DoS|23aafa20-c28a-11d8-864c-02e0185c0b53 -{,??-}aspell<=0.50.5_2|http://nettwerked.mg2.org/advisories/wlc http://marc.theaimsgroup.com/?l=bugtraq&m=108761564006503&w=2 http://www.securityfocus.com/bid/10497|Buffer overflow in word-list-compress|b7b03bab-c296-11d8-bfb2-000bdb1444a4 linux-aspell<=0.50.4.1|http://nettwerked.mg2.org/advisories/wlc http://marc.theaimsgroup.com/?l=bugtraq&m=108761564006503&w=2 http://www.securityfocus.com/bid/10497|Buffer overflow in word-list-compress|b7b03bab-c296-11d8-bfb2-000bdb1444a4 bnbt<7.5b3|http://www.osvdb.org/6336|BNBT Authorization Header DoS|0f9b3542-c35f-11d8-8898-000d6111a684 scorched3d<0.37.2|http://marc.theaimsgroup.com/?l=bugtraq&m=108152473130133&w=2 http://www.osvdb.org/5086 http://www.freebsd.org/cgi/query-pr.cgi?pr=67541 http://secunia.com/advisories/11319 http://security.gentoo.org/glsa/glsa-200404-12.xml|Scorched 3D server chat box format string vulnerability|36808860-c363-11d8-8898-000d6111a684 |