38802 | FreeBSD : mod_perl -- XSS (4a638895-41b7-11de-b1cc-00219b0fc4d8) | low |
38801 | FreeBSD : libxine -- multiple vulnerabilities (48e14d86-42f1-11de-ad22-000e35248ad7) | high |
38800 | FreeBSD : libwmf -- integer overflow vulnerability (48aab1d0-4252-11de-b67a-0030843d3802) | high |
38799 | FreeBSD : php -- ini database truncation inside dba_replace() function (1e8031be-4258-11de-b67a-0030843d3802) | medium |
38779 | FreeBSD : cyrus-sasl -- buffer overflow vulnerability (14ab174c-40ef-11de-9fd5-001bd3385381) | high |
38764 | FreeBSD : moinmoin -- multiple XSS vulnerabilities (fc4d0ae8-3fa3-11de-a3fd-0030843d3802) | medium |
38763 | FreeBSD : ghostscript -- buffer overflow vulnerability (f0f97b94-3f95-11de-a3fd-0030843d3802) | medium |
38751 | FreeBSD : pango -- integer overflow (4b172278-3f46-11de-becb-001cc0377035) | medium |
38728 | FreeBSD : wireshark -- multiple vulnerabilities (defce068-39aa-11de-a493-001b77d09812) | critical |
38706 | FreeBSD : FreeBSD -- remotely exploitable crash in OpenSSL (2539) | medium |
38705 | FreeBSD : cups -- remote code execution and DNS rebinding (736e55bc-39bb-11de-a493-001b77d09812) | medium |
38697 | FreeBSD : quagga -- Denial of Service (2748fdde-3a3c-11de-bbc5-00e0815b8da8) | medium |
38678 | FreeBSD : openfire -- Openfire No Password Changes Security Bypass (e3e30d99-58a8-4a3f-8059-a8b7cd59b881) | medium |
38657 | FreeBSD : drupal -- XSS (7a1ab8d4-35c1-11de-9672-0030843d3802) | medium |
38151 | FreeBSD : multiple vulnerabilities in ethereal (cdf18ed9-7f4a-11d8-9645-0020ed76ef5a) | medium |
38140 | FreeBSD : Gallery 1.4.3 and ealier user authentication bypass (253ea131-bd12-11d8-b071-00e08110b673) | critical |
38135 | FreeBSD : moinmoin -- ACL group bypass (1ecf4ca1-f7ad-11d8-96c9-00061bc2ad93) | critical |
38133 | FreeBSD : XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0 (ff00f2ce-c54c-11d8-b708-00061bc2ad93) | high |
38114 | FreeBSD : seti@home remotely exploitable buffer overflow (0e154a9c-5d7a-11d8-80e3-0020ed76ef5a) | high |
38113 | FreeBSD : ruby -- CGI DoS (d656296b-33ff-11d9-a9e7-0001020eed82) | medium |
38112 | FreeBSD : rsync path traversal issue (73ea0706-9c57-11d8-9366-0020ed76ef5a) | medium |
38086 | FreeBSD : Arbitrary code execution via a format string vulnerability in jftpgw (65a17a3f-ed6e-11d8-aff1-00061bc2ad93) | critical |
38061 | FreeBSD : libxml -- remote buffer overflows (9ff4c91e-328c-11d9-a9e7-0001020eed82) | critical |
38058 | FreeBSD : p5-Archive-Zip -- virus detection evasion (a5742055-300a-11d9-a9e7-0001020eed82) | high |
38031 | FreeBSD : zebra/quagga denial of service vulnerability (cad045c0-81a5-11d8-9645-0020ed76ef5a) | low |
38021 | FreeBSD : squid ACL bypass due to URL decoding bug (705e003a-7f36-11d8-9645-0020ed76ef5a) | high |
38015 | FreeBSD : neon date parsing vulnerability (8d075001-a9ce-11d8-9c6d-0020ed76ef5a) | high |
38002 | FreeBSD : racoon security association deletion vulnerability (739bb51d-7e82-11d8-9645-0020ed76ef5a) | medium |
37996 | FreeBSD : mod_dav -- lock related denial-of-service (013fa252-0724-11d9-b45d-000c41e2cdad) | medium |
37951 | FreeBSD : a2ps -- insecure command line argument handling (8091fcea-f35e-11d8-81b0-000347a4fa7d) | critical |
37934 | FreeBSD : mailman denial-of-service vulnerability in MailCommandHandler (b0e76877-67a8-11d8-80e3-0020ed76ef5a) | medium |
37933 | FreeBSD : CCE contains exploitable buffer overflows (a736deab-5d7d-11d8-80e3-0020ed76ef5a) | high |
37929 | FreeBSD : tiff -- multiple integer overflows (3897a2f8-1d57-11d9-bc4a-000c41e2cdad) | medium |
37923 | FreeBSD : racoon fails to verify signature during Phase 1 (d8769838-8814-11d8-90d1-0020ed76ef5a) | high |
37913 | FreeBSD : Remote code injection in phpMyAdmin (0d4c31ac-cb91-11d8-8898-000d6111a684) | high |
37892 | FreeBSD : pound remotely exploitable vulnerability (fb521119-9bc4-11d8-9366-0020ed76ef5a) | high |
37850 | FreeBSD : URI handler vulnerabilities in several browsers (df333ede-a8ce-11d8-9c6d-0020ed76ef5a) | high |
37848 | FreeBSD : wordpress -- XSS in administration panel (12b7b4cf-1d53-11d9-814e-0001020eed82) | high |
37846 | FreeBSD : mod_ssl -- SSLCipherSuite bypass (4238151d-207a-11d9-bfe2-0090962cff2a) | high |
37841 | FreeBSD : apache mod_include buffer overflow vulnerability (6e6a6b8a-2fde-11d9-b3a2-0050fc56d258) | medium |
37822 | FreeBSD : squirrelmail -- XSS vulnerability (7fbfe159-3438-11d9-a9e7-0001020eed82) | high |
37817 | FreeBSD : xv -- exploitable buffer overflows (fffacc93-16cb-11d9-bc4a-000c41e2cdad) | high |
37811 | FreeBSD : ezbounce remote format string vulnerability (c480eb5e-7f00-11d8-868e-000347dd607f) | high |
37800 | FreeBSD : OpenSSL ChangeCipherSpec denial-of-service vulnerability (68233cba-7774-11d8-89ed-0020ed76ef5a) | medium |
37799 | FreeBSD : libpng denial-of-service (3a408f6f-9c52-11d8-9366-0020ed76ef5a) | medium |
37792 | FreeBSD : webmin -- insecure temporary file creation at installation time (ae7b7f65-05c7-11d9-b45d-000c41e2cdad) | low |
37781 | FreeBSD : ProZilla -- server response buffer overflow vulnerabilities (1a32e8ee-3edb-11d9-8699-00065be4b5b6) | critical |
37777 | FreeBSD : cyrus-sasl -- dynamic library loading and set-user-ID applications (92268205-1947-11d9-bc4a-000c41e2cdad) | high |
37724 | FreeBSD : mysql -- mysqlhotcopy insecure temporary file creation (0c4d5973-f2ab-11d8-9837-000c41e2cdad) | medium |
37723 | FreeBSD : mailman XSS in user options page (00263aa3-67a8-11d8-80e3-0020ed76ef5a) | medium |