correct topic of eda0ade6-f281-11d8-81b0-000347a4fa7d
This commit is contained in:
parent
e510a55afd
commit
61e848dda0
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=116744
2 changed files with 2 additions and 2 deletions
|
@ -70,4 +70,4 @@ phpgedview<2.65.5|http://sourceforge.net/forum/forum.php?forum_id=344342 http://
|
|||
{ja-,}phpgroupware<0.9.16.002|http://freshmeat.net/releases/168144 http://www.osvdb.org/8354 http://xforce.iss.net/xforce/xfdb/16970|phpGroupWare stores passwords in plain text|82f16a40-ef12-11d8-81b0-000347a4fa7d
|
||||
gallery<=1.4.4|http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html http://xforce.iss.net/xforce/xfdb/17021|Gallery arbitrary PHP file upload|031663de-f0a6-11d8-81b0-000347a4fa7d
|
||||
apache>=2.*<2.0.50_2|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751 http://issues.apache.org/bugzilla/show_bug.cgi?id=30134 http://issues.apache.org/bugzilla/show_bug.cgi?id=27945 http://issues.apache.org/bugzilla/show_bug.cgi?id=29690|potential security flaws in mod_ssl|0e08f539-f151-11d8-81b0-000347a4fa7d
|
||||
qt>=3.*<3.3.3|http://scary.beasts.org/security/CESA-2004-004.txt http://secunia.com/advisories/12325 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0693 http://www.osvdb.org/9026|QT 3.x BMP (and possibly other graphics formats) heap-based overflow|eda0ade6-f281-11d8-81b0-000347a4fa7d
|
||||
qt>=3.*<3.3.3|http://scary.beasts.org/security/CESA-2004-004.txt http://secunia.com/advisories/12325 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0693 http://www.osvdb.org/9026|QT 3.x BMP heap-based overflow, GIF and XPM DoS NULL pointer dereference|eda0ade6-f281-11d8-81b0-000347a4fa7d
|
||||
|
|
|
@ -70,4 +70,4 @@ phpgedview<2.65.5|http://sourceforge.net/forum/forum.php?forum_id=344342 http://
|
|||
{ja-,}phpgroupware<0.9.16.002|http://freshmeat.net/releases/168144 http://www.osvdb.org/8354 http://xforce.iss.net/xforce/xfdb/16970|phpGroupWare stores passwords in plain text|82f16a40-ef12-11d8-81b0-000347a4fa7d
|
||||
gallery<=1.4.4|http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html http://xforce.iss.net/xforce/xfdb/17021|Gallery arbitrary PHP file upload|031663de-f0a6-11d8-81b0-000347a4fa7d
|
||||
apache>=2.*<2.0.50_2|http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751 http://issues.apache.org/bugzilla/show_bug.cgi?id=30134 http://issues.apache.org/bugzilla/show_bug.cgi?id=27945 http://issues.apache.org/bugzilla/show_bug.cgi?id=29690|potential security flaws in mod_ssl|0e08f539-f151-11d8-81b0-000347a4fa7d
|
||||
qt>=3.*<3.3.3|http://scary.beasts.org/security/CESA-2004-004.txt http://secunia.com/advisories/12325 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0693 http://www.osvdb.org/9026|QT 3.x BMP (and possibly other graphics formats) heap-based overflow|eda0ade6-f281-11d8-81b0-000347a4fa7d
|
||||
qt>=3.*<3.3.3|http://scary.beasts.org/security/CESA-2004-004.txt http://secunia.com/advisories/12325 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0693 http://www.osvdb.org/9026|QT 3.x BMP heap-based overflow, GIF and XPM DoS NULL pointer dereference|eda0ade6-f281-11d8-81b0-000347a4fa7d
|
||||
|
|
Loading…
Reference in a new issue