diff options
author | Luciano Bello <luciano@debian.org> | 2016-04-14 20:16:46 +0000 |
---|---|---|
committer | Luciano Bello <luciano@debian.org> | 2016-04-14 20:16:46 +0000 |
commit | 4adf9a05fdd2ce876ee8ea44b5e4d0d4947de6af (patch) | |
tree | 4040fac17deae885726231b324b1c8e36b3fff3e /data/CVE/2004.list | |
parent | 52d7d219be6b1b54c02e0a69a1efee96cee641e5 (diff) |
broken links
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@40936 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/CVE/2004.list')
-rw-r--r-- | data/CVE/2004.list | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/data/CVE/2004.list b/data/CVE/2004.list index e502b3a2a3..7a48c38c49 100644 --- a/data/CVE/2004.list +++ b/data/CVE/2004.list @@ -3944,7 +3944,7 @@ CVE-2004-0957 (Unknown vulnerability in MySQL 3.23.58 and earlier, when a local - mysql-dfsg-4.1 4.1.10a-6 - mysql-dfsg 4.0.24-5 CVE-2004-0956 (MySQL before 4.0.20 allows remote attackers to cause a denial of ...) - - mysql-dfsg <not-affected> (Not vulnerable, http://www.debian.org/security/nonvulns-sarge) + - mysql-dfsg <not-affected> (Not vulnerable, http://web.archive.org/web/20070529152436/http://www.debian.org/security/nonvulns-sarge) CVE-2004-0955 REJECTED CVE-2004-0954 @@ -4383,7 +4383,7 @@ CVE-2004-0788 (Integer overflow in the ICO image decoder for (1) gdk-pixbuf befo CVE-2004-0787 (Cross-site scripting (XSS) vulnerability in the web frontend in OpenCA ...) NOT-FOR-US: OpenCA CVE-2004-0786 (The IPv6 URI parsing routines in the apr-util library for Apache ...) - - apache <not-affected> (not vulnerable according to http://www.debian.org/security/nonvulns-sarge) + - apache <not-affected> (not vulnerable according to http://web.archive.org/web/20070529152436/http://www.debian.org/security/nonvulns-sarge) - apache2 2.0.51 CVE-2004-0785 (Multiple buffer overflows in Gaim before 0.82 allow remote attackers ...) - gaim 1:0.82 @@ -5341,7 +5341,7 @@ CVE-2004-0395 (The xatitv program in the gatos package does not properly drop ro CVE-2004-0394 (A "potential" buffer overflow exists in the panic() function in Linux ...) {DSA-1082-1 DSA-1070-1 DSA-1069-1 DSA-1067-1} - linux-2.6 <not-affected> - NOTE: patch: http://www.ultramonkey.org/bugs/cve-patch/CVE-2004-0394.patch + NOTE: patch: http://www.ultramonkey.org/bugs/cve-patch/CAN-2004-0394.patch CVE-2004-0393 (Format string vulnerability in the msg function for rlpr daemon ...) {DSA-524} - rlpr 2.02-7.1 (bug #255402) @@ -5552,7 +5552,7 @@ CVE-2004-0288 (Buffer overflow in the UdmDocToTextBuf function in mnoGoSearch 3. NOTE: it's not quite clear which version exactly fixes the problem; NOTE: I checked the source code of the most recent version and compared NOTE: it with the problematic section described in the advisory - NOTE: (http://marc.theaimsgroup.com/?l=bugtraq&m=107695139930726&w=2) + NOTE: (http://web.archive.org/web/20060430085228/http://marc.theaimsgroup.com/?l=bugtraq&m=107695139930726&w=2) NOTE: and I can confirm the buffer overflow is fixed there CVE-2004-0287 (Xlight FTP server 1.52 allows remote authenticated users to cause a ...) NOT-FOR-US: Xlight FTP server 1.52; |