diff options
author | Luciano Bello <luciano@debian.org> | 2016-04-14 20:16:46 +0000 |
---|---|---|
committer | Luciano Bello <luciano@debian.org> | 2016-04-14 20:16:46 +0000 |
commit | 94101df1de214ba19697926bc95d858dc1e0f383 (patch) | |
tree | 6dfba6ec812dc89b629a5812081687de3898265a /data/CVE/list.2004 | |
parent | 57f23c3f564d22120467e0232722549dd76c873f (diff) |
broken links
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@40936 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/CVE/list.2004')
-rw-r--r-- | data/CVE/list.2004 | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/data/CVE/list.2004 b/data/CVE/list.2004 index e502b3a2a3..7a48c38c49 100644 --- a/data/CVE/list.2004 +++ b/data/CVE/list.2004 @@ -3944,7 +3944,7 @@ CVE-2004-0957 (Unknown vulnerability in MySQL 3.23.58 and earlier, when a local - mysql-dfsg-4.1 4.1.10a-6 - mysql-dfsg 4.0.24-5 CVE-2004-0956 (MySQL before 4.0.20 allows remote attackers to cause a denial of ...) - - mysql-dfsg <not-affected> (Not vulnerable, http://www.debian.org/security/nonvulns-sarge) + - mysql-dfsg <not-affected> (Not vulnerable, http://web.archive.org/web/20070529152436/http://www.debian.org/security/nonvulns-sarge) CVE-2004-0955 REJECTED CVE-2004-0954 @@ -4383,7 +4383,7 @@ CVE-2004-0788 (Integer overflow in the ICO image decoder for (1) gdk-pixbuf befo CVE-2004-0787 (Cross-site scripting (XSS) vulnerability in the web frontend in OpenCA ...) NOT-FOR-US: OpenCA CVE-2004-0786 (The IPv6 URI parsing routines in the apr-util library for Apache ...) - - apache <not-affected> (not vulnerable according to http://www.debian.org/security/nonvulns-sarge) + - apache <not-affected> (not vulnerable according to http://web.archive.org/web/20070529152436/http://www.debian.org/security/nonvulns-sarge) - apache2 2.0.51 CVE-2004-0785 (Multiple buffer overflows in Gaim before 0.82 allow remote attackers ...) - gaim 1:0.82 @@ -5341,7 +5341,7 @@ CVE-2004-0395 (The xatitv program in the gatos package does not properly drop ro CVE-2004-0394 (A "potential" buffer overflow exists in the panic() function in Linux ...) {DSA-1082-1 DSA-1070-1 DSA-1069-1 DSA-1067-1} - linux-2.6 <not-affected> - NOTE: patch: http://www.ultramonkey.org/bugs/cve-patch/CVE-2004-0394.patch + NOTE: patch: http://www.ultramonkey.org/bugs/cve-patch/CAN-2004-0394.patch CVE-2004-0393 (Format string vulnerability in the msg function for rlpr daemon ...) {DSA-524} - rlpr 2.02-7.1 (bug #255402) @@ -5552,7 +5552,7 @@ CVE-2004-0288 (Buffer overflow in the UdmDocToTextBuf function in mnoGoSearch 3. NOTE: it's not quite clear which version exactly fixes the problem; NOTE: I checked the source code of the most recent version and compared NOTE: it with the problematic section described in the advisory - NOTE: (http://marc.theaimsgroup.com/?l=bugtraq&m=107695139930726&w=2) + NOTE: (http://web.archive.org/web/20060430085228/http://marc.theaimsgroup.com/?l=bugtraq&m=107695139930726&w=2) NOTE: and I can confirm the buffer overflow is fixed there CVE-2004-0287 (Xlight FTP server 1.52 allows remote authenticated users to cause a ...) NOT-FOR-US: Xlight FTP server 1.52; |