| 145024 | FreeBSD : Node.js -- January 2021 Security Releases (08b553ed-537a-11eb-be6e-0022489ad614) | high |
| 145023 | FreeBSD : wavpack -- integer overflow in pack_utils.c (6d554d6e-5638-11eb-9d36-5404a68ad561) | medium |
| 144962 | FreeBSD : jenkins -- multiple vulnerabilities (d6f76976-e86d-4f9a-9362-76c849b10db2) | high |
| 144927 | FreeBSD : phpmyfaq -- XSS vulnerability (1f655433-551b-11eb-9cda-589cfc0f81b0) | high |
| 144868 | FreeBSD : sudo -- Potential information leak in sudoedit (6193b3f6-548c-11eb-ba01-206a8a720317) | low |
| 144841 | FreeBSD : mail/dovecot -- multiple vulnerabilities (bd98066d-4ea4-11eb-b412-e86a64caca56) | medium |
| 144826 | FreeBSD : CairoSVG -- Regular Expression Denial of Service vulnerability (a3cef1e6-51d8-11eb-9b8d-08002728f74c) | high |
| 144823 | FreeBSD : chromium -- multiple vulnerabilities (d153c4d2-50f8-11eb-8046-3065ec8fd3ec) | critical |
| 144815 | FreeBSD : Gitlab -- multiple vulnerabilities (a2a2b34d-52b4-11eb-87cb-001b217b3468) | high |
| 144673 | FreeBSD : InspIRCd websocket module double free vulnerability (53e9efa1-4be7-11eb-8558-3085a9a47796) | high |
| 144658 | FreeBSD : gitea -- multiple vulnerabilities (2739b88b-4b88-11eb-a4c0-08002734b9ed) | high |
| 144625 | FreeBSD : Intel CPU issues (fbcba194-ac7d-11ea-8b5e-b42e99a1b9c3) | medium |
| 144582 | FreeBSD : postsrsd -- Denial of service vulnerability (eb2845c4-43ce-11eb-aba5-00a09858faf5) | high |
| 144573 | FreeBSD : asterisk -- Remote crash in res_pjsip_diversion (6adf6ce0-44a6-11eb-95b7-001999f8d30b) | high |
| 144569 | FreeBSD : powerdns -- Various issues in GSS-TSIG support (61d89849-43cb-11eb-aba5-00a09858faf5) | critical |
| 144446 | FreeBSD : vault -- User Enumeration via LDAP auth (cc1fd3da-b8fd-4f4d-a092-c38541c0f993) | medium |
| 144193 | FreeBSD : Unbound/NSD -- Denial of service vulnerability (388ebb5b-3c95-11eb-929d-d4c9ef517024) | medium |
| 144191 | FreeBSD : glpi -- Unauthenticated File Deletion (675e5098-3b15-11eb-af2a-080027dbe4b7) | critical |
| 144190 | FreeBSD : glpi -- Any CalDAV calendars is read-only for every authenticated user (6a467439-3b38-11eb-af2a-080027dbe4b7) | medium |
| 144188 | FreeBSD : glpi -- weak csrf tokens (b64edef7-3b10-11eb-af2a-080027dbe4b7) | critical |
| 144187 | FreeBSD : glpi -- SQL injection for all usages of 'Clone' feature (7f163c81-3b12-11eb-af2a-080027dbe4b7) | high |
| 144185 | FreeBSD : LibreSSL -- NULL pointer dereference (88dfd92f-3b9c-11eb-929d-d4c9ef517024) | high |
| 144184 | FreeBSD : glpi -- SQL Injection in Search API (0ba61fcc-3b38-11eb-af2a-080027dbe4b7) | medium |
| 144182 | FreeBSD : glpi -- multiple related stored XSS vulnerabilities (27a230a2-3b11-11eb-af2a-080027dbe4b7) | medium |
| 144179 | FreeBSD : glpi -- Account takeover vulnerability (d3f60db0-3aea-11eb-af2a-080027dbe4b7) | high |
| 144177 | FreeBSD : glpi -- Insecure Direct Object Reference on ajax/getDropdownValue.php (695b2310-3b3a-11eb-af2a-080027dbe4b7) | medium |
| 144174 | FreeBSD : jasper -- heap overflow vulnerability (85349584-3ba4-11eb-919d-08002728f74c) | high |
| 144172 | FreeBSD : glpi -- leakage issue with knowledge base (5acd95db-3b16-11eb-af2a-080027dbe4b7) | medium |
| 144167 | FreeBSD : py-matrix-synapse -- DoS on Federation API (cfa0be42-3cd7-11eb-9de7-641c67a117d8) | medium |
| 144165 | FreeBSD : glpi -- Unauthenticated Stored XSS (09eef008-3b16-11eb-af2a-080027dbe4b7) | medium |
| 144158 | FreeBSD : glpi -- bypass of the open redirect protection (3a63f478-3b10-11eb-af2a-080027dbe4b7) | medium |
| 144157 | FreeBSD : glpi -- Insecure Direct Object Reference on ajax/comments.ph (190176ce-3b3a-11eb-af2a-080027dbe4b7) | medium |
| 144148 | FreeBSD : glpi -- Public GLPIKEY can be used to decrypt any data (b3695b08-3b3a-11eb-af2a-080027dbe4b7) | medium |
| 144147 | FreeBSD : glpi -- Reflexive XSS in Dropdown menus (07aecafa-3b12-11eb-af2a-080027dbe4b7) | medium |
| 144146 | FreeBSD : p11-kit -- Multiple vulnerabilities (fdc49972-3ca7-11eb-929d-d4c9ef517024) | medium |
| 144144 | FreeBSD : glpi -- Remote Code Execution (RCE) via the backup functionality (832fd11b-3b11-11eb-af2a-080027dbe4b7) | high |
| 144133 | FreeBSD : glpi -- SQL injection for all helpdesk instances (b3aae7ea-3aef-11eb-af2a-080027dbe4b7) | high |
| 144126 | FreeBSD : glpi -- able to read any token through API user endpoint (aec9cbe0-3b0f-11eb-af2a-080027dbe4b7) | high |
| 144125 | FreeBSD : glpi -- Improve encryption algorithm (0309c898-3aed-11eb-af2a-080027dbe4b7) | high |
| 144122 | FreeBSD : glpi -- Multiple SQL Injections Stemming From isNameQuoted() (b7abdb0f-3b15-11eb-af2a-080027dbe4b7) | high |
| 144028 | FreeBSD : cURL -- Multiple vulnerabilities (3c77f139-3a09-11eb-929d-d4c9ef517024) | high |
| 143591 | FreeBSD : OpenSSL -- NULL pointer de-reference (1d56cfc5-3970-11eb-929d-d4c9ef517024) | medium |
| 143543 | FreeBSD : Gitlab -- Multiple vulnerabilities (5d5e5cda-38e6-11eb-bbbf-001b217b3468) | medium |
| 143526 | FreeBSD : consul -- Fix Consul Connect CA private key configuration (8d17229f-3054-11eb-a455-ac1f6b16e566) | medium |
| 143517 | FreeBSD : chromium -- multiple vulnerabilities (01ffd06a-36ed-11eb-b655-3065ec8fd3ec) | high |
| 143510 | FreeBSD : gitea -- multiple vulnerabilities (b99492b2-362b-11eb-9f86-08002734b9ed) | high |
| 143467 | FreeBSD : FreeBSD -- Multiple vulnerabilities in rtsold (e2748c9d-3483-11eb-b87a-901b0ef719ab) | critical |
| 143466 | FreeBSD : FreeBSD -- ICMPv6 use-after-free in error message handling (8eed0c5c-3482-11eb-b87a-901b0ef719ab) | high |
| 143437 | FreeBSD : xorg-server -- Multiple input validation failures in X server XKB extension (76c8b690-340b-11eb-a2b7-54e1ad3d6335) | high |
| 143306 | FreeBSD : nomad -- multiple vulnerabilities (618010ff-3044-11eb-8112-000c292ee6b8) | critical |