FreeBSD Local Security Checks Family for Nessus

IDNameSeverity
56773FreeBSD : libxml -- Multiple use-after-free vulnerabilities (ce4b3af8-0b7c-11e1-846b-00235409fd3e)
medium
56772FreeBSD : libxml -- Stack consumption vulnerability (5a7d4110-0b7a-11e1-846b-00235409fd3e)
medium
56763FreeBSD : gnutls -- client session resumption vulnerability (bdec8dc2-0b3b-11e1-b722-001cc0476564)
medium
56762FreeBSD : mozilla -- multiple vulnerabilities (6c8ad3e8-0a30-11e1-9580-4061862b8c22)
critical
56723FreeBSD : caml-light -- insecure use of temporary files (9dde9dac-08f4-11e1-af36-003067b2972c)
high
56685FreeBSD : freetype -- Some type 1 fonts handling vulnerabilities (54075e39-04ac-11e1-a94e-bcaec565249c)
medium
56674FreeBSD : cacti -- Multiple vulnerabilities (f08e2c15-ffc9-11e0-b0f3-bcaec565249c)
high
56657FreeBSD : phpmyfaq -- Remote PHP Code Injection Vulnerability (395e0faa-ffa7-11e0-8ac4-6c626dd55a41)
high
56588FreeBSD : phpLDAPadmin -- Remote PHP code injection vulnerability (edf47177-fe3f-11e0-a207-0014a5e3cda6)
high
56587FreeBSD : kdelibs4, rekonq -- input validation failure (6d21a287-fce0-11e0-a828-00235a5f2c9a)
medium
56576FreeBSD : piwik -- unknown critical vulnerabilities (411ecb79-f9bc-11e0-a7e6-6c626dd55a41)
high
56548FreeBSD : Xorg server -- two vulnerabilities in X server lock handling code (8441957c-f9b4-11e0-a78a-bcaec565249c)
low
56528FreeBSD : PivotX -- Remote File Inclusion Vulnerability of TimThumb (e454ca2f-f88d-11e0-b566-00163e01a509)
high
56527FreeBSD : asterisk -- remote crash vulnerability in SIP channel driver (a95092a6-f8f1-11e0-a7ea-00215c6a37bb)
medium
56523FreeBSD : OpenTTD -- Denial of service via improperly validated commands (e77befb5-f3f9-11e0-8b5c-b482fe3f522d)
high
56522FreeBSD : OpenTTD -- Multiple buffer overflows in validation of external data (9bad5ab1-f3f6-11e0-8b5c-b482fe3f522d)
medium
56521FreeBSD : OpenTTD -- Buffer overflows in savegame loading (78c25ed7-f3f9-11e0-8b5c-b482fe3f522d)
high
56500FreeBSD : openoffice -- arbitrary command execution vulnerability (e595e170-6771-11dc-8be8-02e0185f8d72)
high
56499FreeBSD : pecl-phar -- format string vulnerability (da3d381b-0ee6-11e0-becc-0022156e8794)
medium
56498FreeBSD : gforge -- XSS and email flood vulnerabilities (d7cd5015-08c9-11da-bc08-0001020eed82)
medium
56497FreeBSD : xpcd -- buffer overflow (d337b206-200f-11dc-a197-0011098b2f36)
high
56496FreeBSD : nwclient -- multiple vulnerabilities (d177d9f9-e317-11d9-8088-00123f0f7307)
high
56495FreeBSD : amaya -- multiple buffer overflow vulnerabilities (a89b76a7-f6bd-11dd-94d9-0030843d3802)
critical
56494FreeBSD : alsaplayer -- multiple vulnerabilities (9855ac8e-2aec-11db-a6e2-000e0c2e438a)
medium
56493FreeBSD : ppxp -- local root exploit (641e8609-cab5-11d9-9aed-000e0c2e438a)
high
56492FreeBSD : tptest -- pwd Remote Stack Buffer Overflow (5486669e-ea9f-11de-bd9c-00215c6a37bb)
critical
56491FreeBSD : ChiTeX/ChiLaTeX unsafe set-user-id root (49ad1bf8-5d7e-11d8-80e3-0020ed76ef5a)
high
56490FreeBSD : peercast -- arbitrary code execution (402ae710-26a2-11dd-ae05-825f4c35000a)
high
56478FreeBSD : sircd -- remote operator privilege escalation vulnerability (e92d8f6b-a1c0-11db-9ddc-0011098b2f36)
high
56477FreeBSD : torrentflux -- User-Agent XSS Vulnerability (72f21372-55e4-11db-a5ae-00508d6a62df)
medium
56476FreeBSD : Mutiple browser frame injection vulnerability (641859e8-eca1-11d8-b913-000c41e2cdad)
high
56400FreeBSD : pyblosxom -- atom flavor multiple XML injection vulnerabilities (b07f3254-f83a-11dd-85a4-ea653f0746ab)
medium
56399FreeBSD : quagga -- multiple vulnerabilities (ab9be2c8-ef91-11e0-ad5a-00215c6a37bb)
high
56323FreeBSD : Mozilla -- multiple vulnerabilities (1fade8a3-e9e8-11e0-9580-4061862b8c22)
critical
56277FreeBSD : linux-flashplugin -- multiple vulnerabilities (53e531a7-e559-11e0-b481-001b2134ef46)
high
56204FreeBSD : phpMyAdmin -- multiple XSS vulnerabilities (e44fe906-df27-11e0-a333-001cc0a36e12)
high
56187FreeBSD : django -- multiple vulnerabilities (d01d10c7-de2d-11e0-b215-00215c6a37bb)
high
56169FreeBSD : libsndfile -- PAF file processing integer overflow (b9f3ffa3-dd6c-11e0-b7fc-000a5e1e33c6)
medium
56168FreeBSD : roundcube -- XSS vulnerability (4ae68e7c-dda4-11e0-a906-00215c6a37bb)
medium
56117FreeBSD : OpenSSL -- multiple vulnerabilities (2ecb7b20-d97e-11e0-b2e2-00215c6a37bb)
medium
56082FreeBSD : security/cfs -- buffer overflow (e55f948f-d729-11e0-abd1-0017f22d6707)
high
56081FreeBSD : nss/ca_root_nss -- fraudulent certificates issued by DigiNotar.nl (aa5bc971-d635-11e0-b3cf-080027ef73ec)
high
56080FreeBSD : XSS issue in MantisBT (a83f25df-d775-11e0-8bf1-003067b2972c)
medium
56079FreeBSD : plone -- Remote Security Bypass (7c492ea2-3566-11e0-8e81-0022190034c0)
high
56078FreeBSD : ca_root_nss -- extraction of explicitly-untrusted certificates into trust bundle (1b27af46-d6f6-11e0-89a6-080027ef73ec)
high
56077FreeBSD : hlstats -- multiple XSS vulnerabilities (09639ccc-3abb-11db-81e1-000e0c2e438a)
high
56017FreeBSD : apache -- Range header DoS vulnerability (7f6108d2-cea8-11e0-9d58-0800279895ea)
high
55991FreeBSD : stunnel -- heap corruption vulnerability (cdeb34e6-d00d-11e0-987e-00215c6a37bb)
high
55970FreeBSD : phpMyAdmin -- multiple XSS vulnerabilities (75e26236-ce9e-11e0-b26a-00215c6a37bb)
medium
55956FreeBSD : PHP -- crypt() returns only the salt for MD5 (3f1df2f9-cd22-11e0-9bb2-00215c6a37bb)
high