65989 | FreeBSD : ModSecurity -- XML External Entity Processing Vulnerability (2070c79a-8e1e-11e2-b34d-000c2957946c) | high |
65975 | FreeBSD : sieve-connect -- TLS hostname verification was not occurring (a2ff483f-a5c6-11e2-9601-000d601460a4) | high |
65969 | FreeBSD : FreeBSD -- Network ACL mishandling in mountd(8) (87261557-a450-11e2-9898-001060e06fd4) | medium |
65968 | FreeBSD : libxml -- Integer overflow (7be92050-a450-11e2-9898-001060e06fd4) | high |
65967 | FreeBSD : FreeBSD -- Multiple Denial of Service vulnerabilities with named(8) (4b79538b-a450-11e2-9898-001060e06fd4) | high |
65937 | FreeBSD : rubygem-rails -- multiple vulnerabilities (db0c4b00-a24c-11e2-9601-000d601460a4) | medium |
65936 | FreeBSD : linux-flashplugin -- multiple vulnerabilities (15236023-a21b-11e2-a460-208984377b34) | critical |
65935 | FreeBSD : NVIDIA UNIX driver -- ARGB cursor buffer overflow in 'NoScanout' mode (1431f2d6-a06e-11e2-b9e0-001636d274f3) | high |
65853 | FreeBSD : otrs -- Information disclosure and Data manipulation (eae8e3cf-9dfe-11e2-ac7f-001fd056c417) | medium |
65852 | FreeBSD : asterisk -- multiple vulnerabilities (daf0a339-9850-11e2-879e-d43d7e0c7c02) | high |
65851 | FreeBSD : opera -- moderately severe issue (cebed39d-9e6f-11e2-b3f5-003067c2616f) | high |
65850 | FreeBSD : chromium -- multiple vulnerabilities (bdd48858-9656-11e2-a9a8-00262d5ed8ee) | high |
65849 | FreeBSD : Subversion -- multiple vulnerabilities (b6beb137-9dc0-11e2-882f-20cf30e32f6d) | medium |
65848 | FreeBSD : optipng -- use-after-free vulnerability (a8818f7f-9182-11e2-9bdf-d48564727302) | high |
65847 | FreeBSD : mozilla -- multiple vulnerabilities (94976433-9c74-11e2-a9fc-d43d7e0c7c02) | critical |
65846 | FreeBSD : OpenVPN -- potential side-channel/timing attack when comparing HMACs (92f30415-9935-11e2-ad4c-080027ef73ec) | low |
65845 | FreeBSD : libxml2 -- cpu consumption Dos (843a4641-9816-11e2-9c51-080027019be0) | medium |
65844 | FreeBSD : dns/bind9* -- Malicious Regex Can Cause Memory Exhaustion (7a282e49-95b6-11e2-8433-0800273fe665) | high |
65843 | FreeBSD : firebird -- Remote Stack Buffer Overflow (6adca5e9-95d2-11e2-8549-68b599b52a02) | medium |
65842 | FreeBSD : FreeBSD -- OpenSSL multiple vulnerabilities (69bfc852-9bd0-11e2-a7be-8c705af55518) | medium |
65841 | FreeBSD : PostgreSQL -- anonymous remote access data corruption vulnerability (3f332f16-9b6b-11e2-8fe9-08002798f6ff) | high |
65840 | FreeBSD : FreeBSD -- BIND remote denial of service (13031d98-9bd1-11e2-a7be-8c705af55518) | high |
65624 | FreeBSD : piwigo -- CSRF/Path Traversal (edd201a5-8fc3-11e2-b131-000c299b62e1) | high |
65623 | FreeBSD : php5 -- Multiple vulnerabilities (1d23109a-9005-11e2-9602-d43d7e0c7c02) | high |
65560 | FreeBSD : libexif -- multiple remote vulnerabilities (d881d254-70c6-11e2-862d-080027a5ec9a) | high |
65542 | FreeBSD : puppet27 and puppet -- multiple vulnerabilities (cda566a0-2df0-4eb0-b70e-ed7a6fb0ab3c) | high |
65541 | FreeBSD : linux-flashplugin -- multiple vulnerabilities (5ff40cb4-8b92-11e2-bdb6-001060e06fd4) | critical |
65540 | FreeBSD : puppet26 -- multiple vulnerabilities (04042f95-14b8-4382-a8b9-b30e365776cf) | high |
65199 | FreeBSD : perl -- denial of service via algorithmic complexity attack on hashing routines (68c1f75b-8824-11e2-9996-c48508086173) | high |
65185 | FreeBSD : mozilla -- use-after-free in HTML Editor (630c8c08-880f-11e2-807f-d43d7e0c7c02) | high |
65184 | FreeBSD : libpurple -- multiple vulnerabilities (549787c1-8916-11e2-8549-68b599b52a02) | medium |
65170 | FreeBSD : chromium -- WebKit vulnerability (54bed676-87ce-11e2-b528-00262d5ed8ee) | high |
65068 | FreeBSD : typo3 -- Multiple vulnerabilities in TYPO3 Core (b9a347ac-8671-11e2-b73c-0019d18c446a) | high |
65067 | FreeBSD : chromium -- multiple vulnerabilities (40d5ab37-85f2-11e2-b528-00262d5ed8ee) | high |
65003 | FreeBSD : stunnel -- Remote Code Execution (c97219b6-843d-11e2-b131-000c299b62e1) | medium |
64989 | FreeBSD : apache22 -- several vulnerabilities (9c88d8a8-8372-11e2-a010-20cf30e32f6d) | medium |
64988 | FreeBSD : sudo -- Potential bypass of tty_tickets constraints (82cfd919-8213-11e2-9273-902b343deec9) | medium |
64987 | FreeBSD : sudo -- Authentication bypass when clock is reset (764344fb-8214-11e2-9273-902b343deec9) | medium |
64923 | FreeBSD : linux-flashplugin -- multiple vulnerabilities (dbdac023-80e1-11e2-9a29-001060e06fd4) | critical |
64922 | FreeBSD : rubygem-dragonfly -- arbitrary code execution (aa7764af-0b5e-4ddc-bc65-38ad697a484f) | high |
64887 | FreeBSD : otrs -- XSS vulnerability in Firefox and Opera could lead to remote code execution (d60199df-7fb3-11e2-9c5a-000d601460a4) | low |
64886 | FreeBSD : otrs -- XSS vulnerability in Internet Explorer could lead to remote code execution (b50cbbc0-7fb2-11e2-9c5a-000d601460a4) | medium |
64885 | FreeBSD : otrs -- XSS vulnerability could lead to remote code execution (84065569-7fb4-11e2-9c5a-000d601460a4) | medium |
64875 | FreeBSD : rubygem-ruby_parser -- insecure tmp file usage (e1aa3bdd-839a-4a77-8617-cca439a8f9fc) | low |
64874 | FreeBSD : ruby -- DoS vulnerability in REXML (844cf3f5-9259-4b3e-ac9e-13ca17333ed7) | high |
64873 | FreeBSD : django -- multiple vulnerabilities (21c59f5e-7cc5-11e2-9c11-080027a5ec9a) | medium |
64860 | FreeBSD : krb5 -- NULL pointer dereference in the KDC PKINIT code [CVE-2013-1415] (f54584bc-7d2b-11e2-9bd1-206a8a720317) | high |
64859 | FreeBSD : chromium -- multiple vulnerabilities (dfd92cb2-7d48-11e2-ad48-00262d5ed8ee) | high |
64792 | FreeBSD : FreeBSD -- BIND remote DoS with deliberately crafted DNS64 query (4671cdc9-7c6d-11e2-809b-6c626d99876c) | high |
64791 | FreeBSD : FreeBSD -- glob(3) related resource exhaustion (3c90e093-7c6e-11e2-809b-6c626d99876c) | high |