diff options
author | Clement Laforet <clement@FreeBSD.org> | 2004-02-11 18:28:18 +0000 |
---|---|---|
committer | Clement Laforet <clement@FreeBSD.org> | 2004-02-11 18:28:18 +0000 |
commit | 88f171bfd3fb2881f98baf73a7ab037e2a4cb510 (patch) | |
tree | 741718971663dec71ab5c28b28f2c0cc004f10b4 /ports-mgmt | |
parent | 40b77fe1e29da47e01b7d82b99f05c78dd214c1c (diff) | |
download | ports-88f171bfd3fb2881f98baf73a7ab037e2a4cb510.tar.gz ports-88f171bfd3fb2881f98baf73a7ab037e2a4cb510.zip |
Add mutt < 1.4.2 vulnerabilty.
Notes
Notes:
svn path=/head/; revision=100697
Diffstat (limited to 'ports-mgmt')
-rw-r--r-- | ports-mgmt/portaudit/database/auditfile.txt | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/ports-mgmt/portaudit/database/auditfile.txt b/ports-mgmt/portaudit/database/auditfile.txt index d75ff83ba501..3495703868b5 100644 --- a/ports-mgmt/portaudit/database/auditfile.txt +++ b/ports-mgmt/portaudit/database/auditfile.txt @@ -37,3 +37,4 @@ ru-apache+mod_ssl>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Mul clamav<0.65_7|http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/62586|remote exploitable DOS vulnerability apache+ssl>=1.3<1.3.29.1.53|http://www.apache-ssl.org/advisory-20040206.txt|optional client certificate vulnerability monkey<0.8.2|http://monkeyd.sourceforge.net/|DoS bug caused by get_real_string() +mutt<1.4.2|http://www.securityfocus.com/archive/1/353428/2004-02-08/2004-02-14/0|buffer overflow that can be triggered by incoming messages |