55845 | FreeBSD : isc-dhcp-server -- server halt upon processing certain packets (510b630e-c43b-11e0-916c-00e0815b8da8) | high |
55822 | FreeBSD : freetype2 -- execute arbitrary code or cause denial of service (5d374b01-c3ee-11e0-8aa5-485d60cb5385) | high |
55821 | FreeBSD : libXfont -- possible local privilege escalation (304409c3-c3ef-11e0-8aa5-485d60cb5385) | high |
55812 | FreeBSD : linux-flashplugin -- multiple vulnerabilities (2c12ae0c-c38d-11e0-8eb7-001b2134ef46) | critical |
55723 | FreeBSD : libsoup -- unintentionally allow access to entire local filesystem (30cb4522-b94d-11e0-8182-485d60cb5385) | high |
55682 | FreeBSD : phpmyadmin -- multiple vulnerabilities (d79fc873-b5f9-11e0-89b4-001ec9578670) | medium |
55681 | FreeBSD : opensaml2 -- unauthenticated login (9f14cb36-b6fc-11e0-a044-445c73746d79) | medium |
55633 | FreeBSD : rsync -- incremental recursion memory corruption vulnerability (9a777c23-b310-11e0-832d-00215c6a37bb) | medium |
55518 | FreeBSD : BIND -- Remote DoS against authoritative and recursive servers (fd64188d-a71d-11e0-89b4-001ec9578670) | medium |
55517 | FreeBSD : BIND -- Remote DoS with certain RPZ configurations (4ccee784-a721-11e0-89b4-001ec9578670) | low |
55502 | FreeBSD : phpmyadmin -- multiple vulnerabilities (7e4e5c53-a56c-11e0-b180-00216aa06fc2) | high |
55439 | FreeBSD : mambo -- multiple SQL injection vulnerabilities (8a5770b4-54b5-11db-a5ae-00508d6a62df) | high |
55430 | FreeBSD : Asterisk -- multiple vulnerabilities (40544e8c-9f7b-11e0-9bec-6c626dd55a41) | medium |
55429 | FreeBSD : ejabberd -- remote denial of service vulnerability (01d3ab7d-9c43-11e0-bc0f-0014a5e3cda6) | medium |
55397 | FreeBSD : mozilla -- multiple vulnerabilities (dfe40cff-9c3f-11e0-9bec-6c626dd55a41) | high |
55396 | FreeBSD : Samba -- Denial of service - memory corruption (bfdbc7ec-9c3f-11e0-9bec-6c626dd55a41) | medium |
55395 | FreeBSD : Piwik -- remote command execution vulnerability (23c8423e-9bff-11e0-8ea2-0019d18c446a) | high |
55281 | FreeBSD : Dokuwiki -- XSS vulnerability (0b535cd0-9b90-11e0-800a-00215c6a37bb) | high |
55158 | FreeBSD : linux-flashplugin -- remote code execution vulnerability (55a528e8-9787-11e0-b24a-001b2134ef46) | critical |
55157 | FreeBSD : ikiwiki -- tty hijacking via ikiwiki-mass-rebuild (3145faf1-974c-11e0-869e-000c29249b2e) | high |
55009 | FreeBSD : linux-flashplugin -- XSS vulnerability (57573136-920e-11e0-bdc9-001b2134ef46) | medium |
54983 | FreeBSD : fetchmail -- STARTTLS denial of service (f7d838f2-9039-11e0-a051-080027ef73ec) | medium |
54982 | FreeBSD : BIND -- Large RRSIG RRsets and Negative Caching DoS (1e1421f0-8d6f-11e0-89b4-001ec9578670) | medium |
54952 | FreeBSD : Subversion -- multiple vulnerabilities (e27a1af3-8d21-11e0-a45d-001e8c75030d) | medium |
54951 | FreeBSD : asterisk -- Remote crash vulnerability (34ce5817-8d56-11e0-b5a2-6c626dd55a41) | medium |
54838 | FreeBSD : drupal6 -- multiple vulnerabilities (1acf9ec5-877d-11e0-b937-001372fd0af2) | high |
54826 | FreeBSD : Erlang -- ssh library uses a weak random number generator (e4833927-86e5-11e0-a6b4-000a5e1e33c6) | high |
54825 | FreeBSD : Unbound -- an empty error packet handling assertion failure (dc96ac1f-86b1-11e0-9e85-00215af774f0) | medium |
54625 | FreeBSD : Opera -- code injection vulnerability through broken frameset handling (e666498a-852a-11e0-8f78-080027ef73ec) | high |
54624 | FreeBSD : linux-flashplugin -- multiple vulnerabilities (d226626c-857f-11e0-95cc-001b2134ef46) | high |
54623 | FreeBSD : Apache APR -- DoS vulnerabilities (99a5590c-857e-11e0-96b7-00300582f9fc) | medium |
54622 | FreeBSD : ViewVC -- user-reachable override of cvsdb row limit (7af2fb85-8584-11e0-96b7-00300582f9fc) | high |
54621 | FreeBSD : mod_pubcookie -- Empty Authentication Security Advisory (1ca8228f-858d-11e0-a76c-000743057ca2) | high |
54620 | FreeBSD : pureftpd -- multiple vulnerabilities (1495f931-8522-11e0-a1c1-00215c6a37bb) | medium |
54619 | FreeBSD : Pubcookie Login Server -- XSS vulnerability (115a1389-858e-11e0-a76c-000743057ca2) | high |
53907 | FreeBSD : Exim -- remote code execution and information disclosure (36594c54-7be7-11e0-9838-0022156e8794) | high |
53906 | FreeBSD : Zend Framework -- potential SQL injection when using PDO_MySql (34e8ccf5-7d71-11e0-9d83-000c29cc39d3) | high |
53905 | FreeBSD : Apache APR -- DoS vulnerabilities (00b296b6-7db1-11e0-96b7-00300582f9fc) | medium |
53881 | FreeBSD : mediawiki -- multiple vulnerabilities (3fadb7c6-7b0a-11e0-89b4-001ec9578670) | high |
53852 | FreeBSD : Postfix -- memory corruption vulnerability (3eb2c100-738b-11e0-89f4-001e90d46635) | medium |
53579 | FreeBSD : Mozilla -- multiple vulnerabilities (04b7d46c-7226-11e0-813a-6c626dd55a41) | high |
53523 | FreeBSD : Asterisk -- multiple vulnerabilities (3c7d565a-6c64-11e0-813a-6c626dd55a41) | medium |
53470 | FreeBSD : rt -- multiple vulnerabilities (bf171509-68dd-11e0-afe6-0003ba02bf30) | medium |
53469 | FreeBSD : VLC -- Heap corruption in MP4 demultiplexer (6a4bfe75-692a-11e0-bce7-001eecdd401a) | high |
53468 | FreeBSD : linux-flashplugin -- remote code execution vulnerability (32b05547-6913-11e0-bdc4-001b2134ef46) | high |
53443 | FreeBSD : krb5 -- MITKRB5-SA-2011-003, KDC vulnerable to double-free when PKINIT enabled (7edac52a-66cd-11e0-9398-5d45f3aa24f0) | high |
53442 | FreeBSD : krb5 -- MITKRB5-SA-2011-004, kadmind invalid pointer free() [CVE-2011-0285] (6a3c3e5c-66cb-11e0-a116-c535f3aa24f0) | critical |
53441 | FreeBSD : krb5 -- MITKRB5-SA-2011-001, kpropd denial of service (64f24a1e-66cf-11e0-9deb-f345f3aa24f0) | medium |
53440 | FreeBSD : krb5 -- MITKRB5-SA-2011-002, KDC vulnerable to hang when using LDAP back end (4ab413ea-66ce-11e0-bf05-d445f3aa24f0) | medium |
53439 | FreeBSD : xrdb -- root hole via rogue hostname (2eccb24f-61c0-11e0-b199-0015f2db7bde) | high |