84702 | FreeBSD : php -- arbitrary code execution (5a1d5d74-29a0-11e5-86ff-14dae9d210b8) | high |
84701 | FreeBSD : xen-kernel -- Information leak via internal x86 system device emulation (5023f559-27e2-11e5-a4a5-002590263bf5) | low |
84700 | FreeBSD : xen-tools -- PCI MSI mask bits inadvertently exposed to guests (4db8a0f4-27e9-11e5-a4a5-002590263bf5) | high |
84699 | FreeBSD : xen-tools -- Unmediated PCI register access in qemu (3d657340-27ea-11e5-a4a5-002590263bf5) | medium |
84698 | FreeBSD : php -- use-after-free vulnerability (3d39e927-29a2-11e5-86ff-14dae9d210b8) | high |
84697 | FreeBSD : freeradius -- insufficient CRL application vulnerability (379788f3-2900-11e5-a4a5-002590263bf5) | high |
84696 | FreeBSD : mysql -- SSL Downgrade (36bd352d-299b-11e5-86ff-14dae9d210b8) (BACKRONYM) | medium |
84695 | FreeBSD : pivotx -- XSS (XSS) vulnerability (14d846d6-27b3-11e5-a15a-50af736ef1c0) | low |
84694 | FreeBSD : xen-kernel -- Certain domctl operations may be abused to lock up the host (103a47d5-27e7-11e5-a4a5-002590263bf5) | high |
84693 | FreeBSD : xen-tools -- HVM qemu unexpectedly enabling emulated VGA graphics backends (0d732fd1-27e0-11e5-a4a5-002590263bf5) | low |
84653 | FreeBSD : wpa_supplicant -- WPS_NFC option payload length validation vulnerability (c93c9395-25e1-11e5-a4a5-002590263bf5) | medium |
84652 | FreeBSD : django -- multiple vulnerabilities (37ed8e9c-2651-11e5-86ff-14dae9d210b8) | high |
84651 | FreeBSD : openssl -- alternate chains certificate forgery vulnerability (075952fe-267e-11e5-9d03-3c970e169bc2) | medium |
84628 | FreeBSD : Adobe Flash Player -- critical vulnerabilities (348bfa69-25a2-11e5-ade1-0011d823eebd) (Underminer) | critical |
84601 | FreeBSD : haproxy -- information leak vulnerability (cbfa8bd7-24b6-11e5-86ff-14dae9d210b8) | medium |
84600 | FreeBSD : roundcube -- multiple vulnerabilities (038a5808-24b3-11e5-b0c8-bf4d8935d4fa) | high |
84555 | FreeBSD : squid -- client-first SSL-bump does not correctly validate X509 server certificate (b6da24da-23f7-11e5-a4a5-002590263bf5) | low |
84554 | FreeBSD : turnserver -- SQL injection vulnerability (543b5939-2067-11e5-a4a5-002590263bf5) | high |
84553 | FreeBSD : squid -- Improper Protection of Alternate Path with CONNECT requests (150d1538-23fa-11e5-a4a5-002590263bf5) | medium |
84530 | FreeBSD : ansible -- multiple vulnerabilities (e308c61a-2060-11e5-a4a5-002590263bf5) | high |
84529 | FreeBSD : bitcoin -- denial of service (d7b9a28d-238c-11e5-86ff-14dae9d210b8) | high |
84528 | FreeBSD : cups-filters -- texttopdf integer overflow (bf1d9331-21b6-11e5-86ff-14dae9d210b8) | high |
84527 | FreeBSD : ansible -- local symlink exploits (a6a9f9d5-205c-11e5-a4a5-002590263bf5) | low |
84526 | FreeBSD : ansible -- enable host key checking in paramiko connection type (a478421e-2059-11e5-a4a5-002590263bf5) | high |
84525 | FreeBSD : ansible -- code execution from compromised remote host data or untrusted local data (9dae9d62-205f-11e5-a4a5-002590263bf5) | critical |
84524 | FreeBSD : node, iojs, and v8 -- denial of service (864e6f75-2372-11e5-86ff-14dae9d210b8) | high |
84523 | FreeBSD : ansible -- multiple vulnerabilities (72fccfdf-2061-11e5-a4a5-002590263bf5) | high |
84522 | FreeBSD : ansible -- remote code execution vulnerability (2c493ac8-205e-11e5-a4a5-002590263bf5) | critical |
84496 | FreeBSD : libxml2 -- Enforce the reader to run in constant memory (9c7177ff-1fe1-11e5-9a01-bcaec565249c) | medium |
84484 | FreeBSD : cups-filters -- buffer overflow in texttopdf size allocation (b19da422-1e02-11e5-b43d-002590263bf5) | high |
84483 | FreeBSD : wesnoth -- disclosure of .pbl files with lowercase, uppercase, and mixed-case extension (2a8b7d21-1ecc-11e5-a4a5-002590263bf5) | medium |
84482 | FreeBSD : ntp -- control message remote Denial of Service vulnerability (0d0f3050-1f69-11e5-9ba9-d050996490d0) | high |
84438 | FreeBSD : qemu -- Heap overflow in QEMU PCNET controller, allowing guest to host escape (CVE-2015-3209) (acd5d037-1c33-11e5-be9c-6805ca1d3bb1) | high |
84413 | FreeBSD : elasticsearch -- directory traversal attack with site plugins (a71e7440-1ba3-11e5-b43d-002590263bf5) | medium |
84412 | FreeBSD : elasticsearch -- XSS vulnerability in the CORS functionality (5951fb49-1ba2-11e5-b43d-002590263bf5) | medium |
84411 | FreeBSD : elasticsearch and logstash -- remote OS command execution via dynamic scripting (43ac9d42-1b9a-11e5-b43d-002590263bf5) | medium |
84410 | FreeBSD : elasticsearch -- security fix for shared file-system repositories (23232028-1ba4-11e5-b43d-002590263bf5) | high |
84409 | FreeBSD : elasticsearch -- remote OS command execution via Groovy scripting engine (026759e0-1ba3-11e5-b43d-002590263bf5) | high |
84383 | FreeBSD : Adobe Flash Player -- critical vulnerabilities (d02f6b01-1a3f-11e5-8bd6-c485083ca99c) | critical |
84382 | FreeBSD : logstash-forwarder and logstash -- susceptibility to POODLE vulnerability (ad4d3871-1a0d-11e5-b43d-002590263bf5) | high |
84381 | FreeBSD : logstash -- Directory traversal vulnerability in the file output plugin (24bde04f-1a10-11e5-b43d-002590263bf5) | medium |
84380 | FreeBSD : logstash -- Remote command execution in Logstash zabbix and nagios_nsca outputs (2184ccad-1a10-11e5-b43d-002590263bf5) | high |
84329 | FreeBSD : rubygem-bson -- DoS and possible injection (f5225b23-192d-11e5-a1cf-002590263bf5) | critical |
84328 | FreeBSD : chicken -- buffer overrun in substring-index[-ci] (e7b7f2b5-177a-11e5-ad33-f8d111029e6a) | high |
84327 | FreeBSD : www/chromium -- multiple vulnerabilities (d46ed7b8-1912-11e5-9fdf-00262d5ed8ee) | medium |
84326 | FreeBSD : php5 -- multiple vulnerabilities (cdff0af2-1492-11e5-a1cf-002590263bf5) | critical |
84325 | FreeBSD : devel/ipython -- remote execution (a4460ac7-192c-11e5-9c01-bcaec55be5e5) | medium |
84324 | FreeBSD : cacti -- Multiple XSS and SQL injection vulnerabilities (a3929112-181b-11e5-a1cf-002590263bf5) | high |
84323 | FreeBSD : cacti -- multiple security vulnerabilities (a0e74731-181b-11e5-a1cf-002590263bf5) | high |
84322 | FreeBSD : rubygem-paperclip -- validation bypass vulnerability (0f154810-16e4-11e5-a1cf-002590263bf5) | medium |