84814 | FreeBSD : groovy -- remote execution of untrusted code (67b3fef2-2bea-11e5-86ff-14dae9d210b8) | critical |
84813 | FreeBSD : zenphoto -- multiple vulnerabilities (5c399624-2bef-11e5-86ff-14dae9d210b8) | high |
84783 | FreeBSD : PolarSSL -- Security Fix Backports (d3216606-2b47-11e5-a668-080027ef73ec) | high |
84782 | FreeBSD : libwmf -- multiple vulnerabilities (ca139c7f-2a8c-11e5-a4a5-002590263bf5) | critical |
84781 | FreeBSD : apache24 -- multiple vulnerabilities (a12494c1-2af4-11e5-86ff-14dae9d210b8) | medium |
84780 | FreeBSD : mozilla -- multiple vulnerabilities (44d9daee-940c-4179-86bb-6e3ffd617869) (Logjam) | low |
84717 | FreeBSD : xen-tools -- xl command line config handling stack overflow (f1deed23-27ec-11e5-a4a5-002590263bf5) | medium |
84716 | FreeBSD : xen-kernel -- Information leak through version information hypercall (ef9d041e-27e2-11e5-a4a5-002590263bf5) | low |
84715 | FreeBSD : xen-kernel and xen-tools -- Long latency MMIO mapping operations are not preemptible (d40c66cb-27e4-11e5-a4a5-002590263bf5) | medium |
84714 | FreeBSD : xen-kernel -- Information leak through XEN_DOMCTL_gettscinfo (ce658051-27ea-11e5-a4a5-002590263bf5) | low |
84713 | FreeBSD : xen-tools -- Guest triggerable qemu MSI-X pass-through error messages (cbe1a0f9-27e9-11e5-a4a5-002590263bf5) | medium |
84712 | FreeBSD : php -- use-after-free vulnerability (af7fbd91-29a1-11e5-86ff-14dae9d210b8) | high |
84711 | FreeBSD : xen-tools -- Potential unintended writes to host MSI message data field via qemu (af38cfec-27e7-11e5-a4a5-002590263bf5) | medium |
84710 | FreeBSD : xen-kernel -- arm: vgic: incorrect rate limiting of guest triggered logging (912cb7f7-27df-11e5-a4a5-002590263bf5) | low |
84709 | FreeBSD : xen-kernel -- vulnerability in the iret hypercall handler (8c31b288-27ec-11e5-a4a5-002590263bf5) | medium |
84708 | FreeBSD : xen-kernel -- Hypervisor memory corruption due to x86 emulator flaw (83a28417-27e3-11e5-a4a5-002590263bf5) | high |
84707 | FreeBSD : devel/ipython -- CSRF possible remote execution vulnerability (81326883-2905-11e5-a4a5-002590263bf5) | high |
84706 | FreeBSD : xen-kernel -- GNTTABOP_swap_grant_ref operation misbehavior (80e846ff-27eb-11e5-a4a5-002590263bf5) | medium |
84705 | FreeBSD : xen-tools -- Unmediated PCI command register access in qemu (79f401cd-27e6-11e5-a4a5-002590263bf5) | medium |
84704 | FreeBSD : xen-kernel -- arm: vgic-v2: GICD_SGIR is not properly emulated (785c86b1-27d6-11e5-a4a5-002590263bf5) | medium |
84703 | FreeBSD : pivotx -- Multiple unrestricted file upload vulnerabilities (7313b0e3-27b4-11e5-a15a-50af736ef1c0) | low |
84702 | FreeBSD : php -- arbitrary code execution (5a1d5d74-29a0-11e5-86ff-14dae9d210b8) | high |
84701 | FreeBSD : xen-kernel -- Information leak via internal x86 system device emulation (5023f559-27e2-11e5-a4a5-002590263bf5) | low |
84700 | FreeBSD : xen-tools -- PCI MSI mask bits inadvertently exposed to guests (4db8a0f4-27e9-11e5-a4a5-002590263bf5) | high |
84699 | FreeBSD : xen-tools -- Unmediated PCI register access in qemu (3d657340-27ea-11e5-a4a5-002590263bf5) | medium |
84698 | FreeBSD : php -- use-after-free vulnerability (3d39e927-29a2-11e5-86ff-14dae9d210b8) | high |
84697 | FreeBSD : freeradius -- insufficient CRL application vulnerability (379788f3-2900-11e5-a4a5-002590263bf5) | high |
84696 | FreeBSD : mysql -- SSL Downgrade (36bd352d-299b-11e5-86ff-14dae9d210b8) (BACKRONYM) | medium |
84695 | FreeBSD : pivotx -- XSS (XSS) vulnerability (14d846d6-27b3-11e5-a15a-50af736ef1c0) | low |
84694 | FreeBSD : xen-kernel -- Certain domctl operations may be abused to lock up the host (103a47d5-27e7-11e5-a4a5-002590263bf5) | high |
84693 | FreeBSD : xen-tools -- HVM qemu unexpectedly enabling emulated VGA graphics backends (0d732fd1-27e0-11e5-a4a5-002590263bf5) | low |
84653 | FreeBSD : wpa_supplicant -- WPS_NFC option payload length validation vulnerability (c93c9395-25e1-11e5-a4a5-002590263bf5) | medium |
84652 | FreeBSD : django -- multiple vulnerabilities (37ed8e9c-2651-11e5-86ff-14dae9d210b8) | high |
84651 | FreeBSD : openssl -- alternate chains certificate forgery vulnerability (075952fe-267e-11e5-9d03-3c970e169bc2) | medium |
84628 | FreeBSD : Adobe Flash Player -- critical vulnerabilities (348bfa69-25a2-11e5-ade1-0011d823eebd) (Underminer) | critical |
84601 | FreeBSD : haproxy -- information leak vulnerability (cbfa8bd7-24b6-11e5-86ff-14dae9d210b8) | medium |
84600 | FreeBSD : roundcube -- multiple vulnerabilities (038a5808-24b3-11e5-b0c8-bf4d8935d4fa) | high |
84555 | FreeBSD : squid -- client-first SSL-bump does not correctly validate X509 server certificate (b6da24da-23f7-11e5-a4a5-002590263bf5) | low |
84554 | FreeBSD : turnserver -- SQL injection vulnerability (543b5939-2067-11e5-a4a5-002590263bf5) | high |
84553 | FreeBSD : squid -- Improper Protection of Alternate Path with CONNECT requests (150d1538-23fa-11e5-a4a5-002590263bf5) | medium |
84530 | FreeBSD : ansible -- multiple vulnerabilities (e308c61a-2060-11e5-a4a5-002590263bf5) | high |
84529 | FreeBSD : bitcoin -- denial of service (d7b9a28d-238c-11e5-86ff-14dae9d210b8) | high |
84528 | FreeBSD : cups-filters -- texttopdf integer overflow (bf1d9331-21b6-11e5-86ff-14dae9d210b8) | high |
84527 | FreeBSD : ansible -- local symlink exploits (a6a9f9d5-205c-11e5-a4a5-002590263bf5) | low |
84526 | FreeBSD : ansible -- enable host key checking in paramiko connection type (a478421e-2059-11e5-a4a5-002590263bf5) | high |
84525 | FreeBSD : ansible -- code execution from compromised remote host data or untrusted local data (9dae9d62-205f-11e5-a4a5-002590263bf5) | critical |
84524 | FreeBSD : node, iojs, and v8 -- denial of service (864e6f75-2372-11e5-86ff-14dae9d210b8) | high |
84523 | FreeBSD : ansible -- multiple vulnerabilities (72fccfdf-2061-11e5-a4a5-002590263bf5) | high |
84522 | FreeBSD : ansible -- remote code execution vulnerability (2c493ac8-205e-11e5-a4a5-002590263bf5) | critical |
84496 | FreeBSD : libxml2 -- Enforce the reader to run in constant memory (9c7177ff-1fe1-11e5-9a01-bcaec565249c) | medium |