84321 | FreeBSD : chicken -- Potential buffer overrun in string-translate* (0da404ad-1891-11e5-a1cf-002590263bf5) | high |
84314 | FreeBSD : p5-Dancer -- possible to abuse session cookie values (968d1e74-1740-11e5-a643-40a8f0757fb4) | high |
84282 | FreeBSD : drupal -- multiple vulnerabilities (d605edb1-1616-11e5-a000-d050996490d0) | medium |
84255 | FreeBSD : rubygem-rails -- multiple vulnerabilities (eb8a8978-8dd5-49ce-87f4-49667b2166dd) | medium |
84254 | FreeBSD : cURL -- Multiple Vulnerability (2438d4af-1538-11e5-a106-3c970e169bc2) | medium |
84224 | FreeBSD : testdisk -- buffer overflow with malicious disk image (c67069dc-0986-11e5-bb90-002590263bf5) | high |
84201 | FreeBSD : tomcat -- multiple vulnerabilities (25e0593d-13c0-11e5-9afb-3c970e169bc2) | high |
84182 | FreeBSD : security/ossec-hids-* -- root escalation via syscheck feature (c470db07-1098-11e5-b6a8-002590263bf5) | high |
84133 | FreeBSD : openssl -- multiple vulnerabilities (8305e215-1080-11e5-8ba2-000c2980a9f3) (Logjam) | high |
84132 | FreeBSD : Adobe Flash Player -- critical vulnerabilities (1e63db88-1050-11e5-a4df-c485083ca99c) | critical |
84105 | FreeBSD : pgbouncer -- remote denial of service (8fbd4187-0f18-11e5-b6a8-002590263bf5) | high |
84104 | FreeBSD : libzmq4 -- V3 protocol handler vulnerable to downgrade attacks (10a6d0aa-0b1c-11e5-bb90-002590263bf5) | medium |
84070 | FreeBSD : cups -- multiple vulnerabilities (a40ec970-0efa-11e5-90e4-d050996490d0) | critical |
84069 | FreeBSD : strongswan -- Denial-of-service and potential remote code execution vulnerability (55363e65-0e71-11e5-8027-00167671dd1d) | critical |
84068 | FreeBSD : strongswan -- Information Leak Vulnerability (10d14955-0e45-11e5-b6a8-002590263bf5) | low |
84044 | FreeBSD : tidy -- heap-buffer-overflow (bd1ab7a5-0e01-11e5-9976-a0f3c100ae18) | medium |
84043 | FreeBSD : redis -- EVAL Lua Sandbox Escape (838fa84a-0e25-11e5-90e4-d050996490d0) | critical |
84011 | FreeBSD : pcre -- multiple vulnerabilities (e69af246-0ae2-11e5-90e4-d050996490d0) | critical |
83964 | FreeBSD : hostapd and wpa_supplicant -- multiple vulnerabilities (bbc0db92-084c-11e5-bb90-002590263bf5) | medium |
83944 | FreeBSD : rest-client -- plaintext password disclosure (ffe2d86c-07d9-11e5-9a28-001e67150279) | low |
83943 | FreeBSD : cabextract -- directory traversal with UTF-8 symbols in filenames (cfb12f02-06e1-11e5-8fda-002590263bf5) | medium |
83942 | FreeBSD : libmspack -- frame_end overflow which could cause infinite loop (cc7548ef-06e1-11e5-8fda-002590263bf5) | medium |
83941 | FreeBSD : rest-client -- session fixation vulnerability (83a7a720-07d8-11e5-9a28-001e67150279) | critical |
83940 | FreeBSD : ffmpeg -- multiple vulnerabilities (65b14d39-d01f-419c-b0b8-5df60b929973) | high |
83939 | FreeBSD : avidemux26 -- multiple vulnerabilities in bundled FFmpeg (022255be-0895-11e5-a242-5404a68ad561) | high |
83910 | FreeBSD : proxychains-ng -- current path as the first directory for the library search path (9471ec47-05a2-11e5-8fda-002590263bf5) | high |
83909 | FreeBSD : django -- Fixed session flushing in the cached_db backend (48504af7-07ad-11e5-879c-00e0814cab4e) | medium |
83902 | FreeBSD : wireshark -- multiple vulnerabilities (a13500d0-0570-11e5-aab1-d050996490d0) | high |
83901 | FreeBSD : krb5 -- requires_preauth bypass in PKINIT-enabled KDC (406636fe-055d-11e5-aab1-d050996490d0) | medium |
83842 | FreeBSD : cURL -- multiple vulnerabilities (6294f75f-03f2-11e5-aab1-d050996490d0) | medium |
83841 | FreeBSD : cURL -- sensitive HTTP server headers also sent to proxies (27f742f6-03f4-11e5-aab1-d050996490d0) | medium |
83799 | FreeBSD : PostgreSQL -- minor security problems. (fc38cd83-00b3-11e5-8ebd-0026551a22dc) | critical |
83798 | FreeBSD : py-salt -- potential shell injection vulnerabilities (865863af-fb5e-11e4-8fda-002590263bf5) | high |
83797 | FreeBSD : dnsmasq -- remotely exploitable buffer overflow in release candidate (7927165a-0126-11e5-9d98-080027ef73ec) | high |
83796 | FreeBSD : cassandra -- remote execution of arbitrary code (607f4d44-0158-11e5-8fda-002590263bf5) | high |
83795 | FreeBSD : pcre -- multiple vulnerabilities (4a88e3ed-00d3-11e5-a072-d050996490d0) | high |
83794 | FreeBSD : davmail -- fix potential CVE-2014-3566 vulnerability (POODLE) (384fc0b2-0144-11e5-8fda-002590263bf5) (POODLE) | low |
83793 | FreeBSD : dnsmasq -- data exposure and denial of service (37569eb7-0125-11e5-9d98-080027ef73ec) | medium |
83792 | FreeBSD : php -- multiple vulnerabilities (31de2e13-00d2-11e5-a072-d050996490d0) | high |
83752 | FreeBSD : proftpd -- arbitrary code execution vulnerability with chroot (d0034536-ff24-11e4-a072-d050996490d0) | critical |
83556 | FreeBSD : chromium -- multiple vulnerabilities (a9d456b4-fe4c-11e4-ad15-00262d5ed8ee) | high |
83555 | FreeBSD : clamav -- multiple vulnerabilities (3d0428b2-fdfb-11e4-894f-d050996490d0) | medium |
83554 | FreeBSD : ipsec-tools -- Memory leak leading to denial of service (35431f79-fe3e-11e4-ba63-000c292ee6b8) | high |
83514 | FreeBSD : rubygem-redcarpet -- XSS vulnerability (c368155a-fa83-11e4-bc58-001e67150279) | high |
83513 | FreeBSD : rubygems -- request hijacking vulnerability (a0089e18-fc9e-11e4-bc58-001e67150279) | medium |
83512 | FreeBSD : dcraw -- integer overflow condition (57325ecf-facc-11e4-968f-b888e347c638) | medium |
83511 | FreeBSD : Quassel IRC -- SQL injection vulnerability (49d9c28c-fbad-11e4-b0fb-00269ee29e57) | high |
83510 | FreeBSD : qemu, xen and VirtualBox OSE -- possible VM escape and code execution ('VENOM') (2780e442-fc59-11e4-b18b-6805ca1d3bb1) (Venom) | high |
83442 | FreeBSD : Adobe Flash Player -- critical vulnerabilities (e206df57-f97b-11e4-b799-c485083ca99c) | critical |
83441 | FreeBSD : phpMyAdmin -- XSRF and man-in-the-middle vulnerabilities (c6e31869-f99f-11e4-9f91-6805ca0b3d42) | medium |