openbsd-ports/security/nessus
aanriot 91ecf6c19e A buffer overflow vulnerability has been discovered in the
implementation of split() function in NASL, leading to consume a large
amount of CPU and memory resources before crashing. A solution is to
check for zero-length sep parameters.

CVE-2006-2093;
from ubuntu linux;
ok sturm@
2006-05-04 22:40:24 +00:00
..
core fix WANTLIB after gtk+2 downgrade, add USE_X11 2006-01-20 20:47:25 +00:00
libnasl A buffer overflow vulnerability has been discovered in the 2006-05-04 22:40:24 +00:00
libraries SHARED_LIBS and USE_LIBTOOL 2005-12-25 15:52:38 +00:00
plugins - regen PLIST to clean and add a few missing plugins. 2006-02-09 11:19:08 +00:00
Makefile sort 2005-05-16 16:17:24 +00:00
Makefile.inc - update to 2.2.5. 2005-08-02 12:37:27 +00:00