mirror of
https://git.freebsd.org/ports.git
synced 2025-07-18 01:39:16 -04:00
- Change spaces to tabs in <name> and <range>
- Remove some empty lines - Respect 2 spaces between <body> and <p> - Respect empty line between <vuln vid=""> entry.
This commit is contained in:
parent
77ec90b79c
commit
a49e6fe467
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=179752
1 changed files with 24 additions and 28 deletions
|
@ -312,7 +312,6 @@ Note: Please add new entries to the beginning of this file.
|
|||
<p>Another vulnerability has been discovered in the CGI library
|
||||
(cgi.rb) that ships with Ruby which could be used by a malicious
|
||||
user to create a denial of service attack (DoS).</p>
|
||||
|
||||
<p>A specific HTTP request for any web application using cgi.rb
|
||||
causes CPU consumption on the machine on which the web application
|
||||
is running. Many such requests result in a denial of service.</p>
|
||||
|
@ -327,6 +326,7 @@ Note: Please add new entries to the beginning of this file.
|
|||
<entry>2006-12-04</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="ed124f8c-82a2-11db-b46b-0012f06707f0">
|
||||
<topic>libmusicbrainz -- multiple buffer overflow vulnerabilities</topic>
|
||||
<affects>
|
||||
|
@ -343,7 +343,6 @@ Note: Please add new entries to the beginning of this file.
|
|||
vulnerabilities because the application fails to check the size of
|
||||
the data before copying it into a finite-sized internal memory
|
||||
buffer.</p>
|
||||
|
||||
<p>An attacker can exploit these issues to execute arbitrary code
|
||||
within the context of the application or to cause a
|
||||
denial-of-service condition.</p>
|
||||
|
@ -401,7 +400,6 @@ Note: Please add new entries to the beginning of this file.
|
|||
vulnerability because the application fails to properly
|
||||
bounds-check user-supplied input before copying it to an
|
||||
insufficiently sized memory buffer.</p>
|
||||
|
||||
<p>Exploiting this issue allows attackers to execute arbitrary
|
||||
machine code in the context of applications that use the
|
||||
ImageMagick library.</p>
|
||||
|
@ -642,11 +640,9 @@ Note: Please add new entries to the beginning of this file.
|
|||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Secunia reports:</p>
|
||||
<blockquote cite="http://secunia.com/advisories/22732/">
|
||||
|
||||
<p>Some vulnerabilities have been reported in imlib2, which can be
|
||||
exploited by malicious people to cause a DoS (Denial of Service) or
|
||||
potentially compromise an application using the library.</p>
|
||||
|
||||
exploited by malicious people to cause a DoS (Denial of Service)
|
||||
or potentially compromise an application using the library.</p>
|
||||
<p>The vulnerabilities are caused due to unspecified errors within
|
||||
the processing of JPG, ARGB, PNG, LBM, PNM, TIFF, and TGA images.
|
||||
This may be exploited to execute arbitrary code by e.g. tricking a
|
||||
|
|
Loading…
Add table
Reference in a new issue