106699 | FreeBSD : Mailman -- XSS (XSS) vulnerability in the web UI (3d0eeef8-0cf9-11e8-99b0-d017c2987f9a) | medium |
106649 | FreeBSD : Flash Player -- multiple vulnerabilities (756a8631-0b84-11e8-a986-6451062f0f7a) (Underminer) | critical |
106612 | FreeBSD : mini_httpd,thttpd -- Buffer overflow in htpasswd (f5524753-67b1-4c88-8114-29c2d258b383) | high |
106600 | FreeBSD : w3m - multiple vulnerabilities (e72d5bf5-07a0-11e8-8248-0021ccb9e74d) | high |
106599 | FreeBSD : Django -- information leakage (d696473f-9f32-42c5-a106-bf4536fb1f74) | high |
106598 | FreeBSD : palemoon -- multiple vulnerabilities (5044bd23-08cb-11e8-b08f-00012e582166) | critical |
106597 | FreeBSD : shadowsocks-libev -- command injection via shell metacharacters (3746de31-0a1a-11e8-83e7-485b3931c969) | high |
106467 | FreeBSD : firefox -- Arbitrary code execution through unsanitized browser UI (103bf96a-6211-45ab-b567-1555ebb3a86a) | high |
106427 | FreeBSD : clamav -- multiple vulnerabilities (b464f61b-84c7-4e1c-8ad4-6cf9efffd025) | critical |
106426 | FreeBSD : dovecot -- abort of SASL authentication results in a memory leak (92b8b284-a3a2-41b1-956c-f9cf8b74f500) | high |
106425 | FreeBSD : gcab -- stack overflow (2cceb80e-c482-4cfd-81b3-2088d2c0ad53) | high |
106424 | FreeBSD : cURL -- Multiple vulnerabilities (0cbf0fa6-dcb7-469c-b87a-f94cffd94583) | critical |
106288 | FreeBSD : mozilla -- multiple vulnerabilities (a891c5b4-3d7a-4de9-9c71-eef3fd698c77) | critical |
106287 | FreeBSD : powerdns-recursor -- insufficient validation of DNSSEC signatures (24a82876-002e-11e8-9a95-0cc47a02c232) | low |
106238 | FreeBSD : chromium -- multiple vulnerabilities (e264e74e-ffe0-11e7-8b91-e8e0b747a45a) | medium |
106237 | FreeBSD : chromium -- out of bounds read (82894193-ffd4-11e7-8b91-e8e0b747a45a) | high |
106236 | FreeBSD : chromium -- multiple vulnerabilities (1d951e85-ffdb-11e7-8b91-e8e0b747a45a) | high |
106216 | FreeBSD : MySQL -- multiple vulnerabilities (e3445736-fd01-11e7-ac58-b499baebfeaf) | high |
106215 | FreeBSD : phpbb3 -- multiple issues (8e89a89a-fd15-11e7-bdf6-00e04c1ea73d) | high |
106214 | FreeBSD : unbound -- vulnerability in the processing of wildcard synthesized NSEC records (8d3bae09-fd28-11e7-95f2-005056925db4) | medium |
106181 | FreeBSD : wordpress -- multiple issues (c04dc18f-fcde-11e7-bdf6-00e04c1ea73d) | high |
106115 | FreeBSD : gitlab -- Remote code execution on project import (65fab89f-2231-46db-8541-978f4e87f32a) | critical |
106037 | FreeBSD : transmission-daemon -- vulnerable to dns rebinding attacks (3e5b8bd3-0c32-452f-a60e-beab7b762351) | high |
106036 | FreeBSD : shibboleth-sp -- vulnerable to forged user attribute data (3dbe9492-f7b8-11e7-a12d-6cc21735f730) | medium |
105712 | FreeBSD : Flash Player -- information disclosure (9c016563-f582-11e7-b33c-6451062f0f7a) | high |
105665 | FreeBSD : awstats -- remote code execution (4055aee5-f4c6-11e7-95f2-005056925db4) | critical |
105626 | FreeBSD : irssi -- multiple vulnerabilities (a3764767-f31e-11e7-95f2-005056925db4) | critical |
105625 | FreeBSD : mozilla -- Speculative execution side-channel attack (8429711b-76ca-474e-94a0-6b980f1e2d47) | high |
105503 | FreeBSD : OTRS -- Multiple vulnerabilities (cebd05d6-ed7b-11e7-95f2-005056925db4) | high |
105502 | FreeBSD : The Bouncy Castle Crypto APIs: CVE-2017-13098 ('ROBOT') (6a131fbf-ec76-11e7-aa65-001b216d295b) | medium |
105451 | FreeBSD : MariaDB -- unspecified vulnerability (b7d89082-e7c0-11e7-ac58-b499baebfeaf) | high |
105450 | FreeBSD : mozilla -- multiple vulnerabilities (6a09c80e-6ec7-442a-bc65-d72ce69fd887) | high |
105449 | FreeBSD : phpMyAdmin -- XSRF/CSRF vulnerability (63eb2b11-e802-11e7-a58c-6805ca0b3d42) | high |
105448 | FreeBSD : asterisk -- Crash in PJSIP resource when missing a contact header (2a3bc6ac-e7c6-11e7-a90b-001999f8d30b) | high |
105406 | FreeBSD : rsync -- multiple vulnerabilities (72fff788-e561-11e7-8097-0800271d4b9c) | critical |
105363 | FreeBSD : ruby -- Command injection vulnerability in Net::FTP (dd644964-e10e-11e7-8097-0800271d4b9c) | high |
105362 | FreeBSD : rubygem-passenger -- arbitrary file read vulnerability (8cf25a29-e063-11e7-9b2c-001e672571bc) | medium |
105339 | FreeBSD : libXcursor -- integer overflow that can lead to heap buffer overflow (ddecde18-e33b-11e7-a293-54e1ad3d6335) | high |
105338 | FreeBSD : jenkins -- Two startup race conditions (7136e6b7-e1b3-11e7-a4d3-000c292ee6b8) | high |
105337 | FreeBSD : global -- gozilla vulnerability (48cca164-e269-11e7-be51-6599c735afc8) | high |
105336 | FreeBSD : libXfont -- multiple memory leaks (3b9590a1-e358-11e7-a293-54e1ad3d6335) | high |
105335 | FreeBSD : libXfont -- permission bypass when opening files through symlinks (08a125f3-e35a-11e7-a293-54e1ad3d6335) | medium |
105260 | FreeBSD : GitLab -- multiple vulnerabilities (e72a8864-e0bc-11e7-b627-d43d7e971a1b) | high |
105259 | FreeBSD : node.js -- Data Confidentiality/Integrity Vulnerability, December 2017 (bea84a7a-e0c9-11e7-b4f3-11baa0c2df21) | critical |
105216 | FreeBSD : libxml2 -- Multiple Issues (76e59f55-4f7a-4887-bcb0-11604004163a) | critical |
105215 | FreeBSD : asterisk -- Remote Crash Vulnerability in RTCP Stack (4a67450a-e044-11e7-accc-001999f8d30b) | high |
105214 | FreeBSD : tor -- Use-after-free in onion service v2 (36ef8753-d86f-11e7-ad28-0025908740c2) | high |
105141 | FreeBSD : FreeBSD -- OpenSSL multiple vulnerabilities (9f7a0f39-ddc0-11e7-b5af-a4badb2f4699) | medium |
105140 | FreeBSD : wireshark -- multiple security issues (4b228e69-22e1-4019-afd0-8aa716d0ec0b) | high |
105090 | FreeBSD : OpenSSL -- multiple vulnerabilities (3bb451fc-db64-11e7-ac58-b499baebfeaf) | medium |