summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorClement Laforet <clement@FreeBSD.org>2004-02-11 00:07:28 +0000
committerClement Laforet <clement@FreeBSD.org>2004-02-11 00:07:28 +0000
commit51242e4c41b183108ad6470e74283070b99a2c29 (patch)
treea13866046900af56767bc186f09243092460fef9
parent571ac9b0605963b4f96312389fc6bc935bedf90a (diff)
downloadfreebsd-ports-51242e4c41b183108ad6470e74283070b99a2c29.zip
Add entries for:
- www/apache13-ssl<1.3.29.1.53 - www/monkey < 0.8.2
-rw-r--r--ports-mgmt/portaudit/database/auditfile.txt2
-rw-r--r--security/portaudit/database/auditfile.txt2
2 files changed, 4 insertions, 0 deletions
diff --git a/ports-mgmt/portaudit/database/auditfile.txt b/ports-mgmt/portaudit/database/auditfile.txt
index 94e81c6778ff..a69f908646b9 100644
--- a/ports-mgmt/portaudit/database/auditfile.txt
+++ b/ports-mgmt/portaudit/database/auditfile.txt
@@ -35,3 +35,5 @@ apache+ipv6>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Multiple
ru-apache>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Multiple security vulnerabilities
ru-apache+mod_ssl>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Multiple security vulnerabilities
clamav<0.65_7|http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/62586|remote exploitable DOS vulnerability
+apache+ssl>=1.3<1.3.29.1.53|http://www.apache-ssl.org/advisory-20040206.txt|optional client certificate vulnerability
+monkey<0.8.2||DoS bug caused by get_real_string()
diff --git a/security/portaudit/database/auditfile.txt b/security/portaudit/database/auditfile.txt
index 94e81c6778ff..a69f908646b9 100644
--- a/security/portaudit/database/auditfile.txt
+++ b/security/portaudit/database/auditfile.txt
@@ -35,3 +35,5 @@ apache+ipv6>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Multiple
ru-apache>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Multiple security vulnerabilities
ru-apache+mod_ssl>=1.3<1.3.29|http://www.apacheweek.com/features/security-13|Multiple security vulnerabilities
clamav<0.65_7|http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/62586|remote exploitable DOS vulnerability
+apache+ssl>=1.3<1.3.29.1.53|http://www.apache-ssl.org/advisory-20040206.txt|optional client certificate vulnerability
+monkey<0.8.2||DoS bug caused by get_real_string()