FreeBSD Monitor - Feeds::ports_audit http://www.fbsdmon.org/feed/ports_audit 2014-08-26T23:59:59Z FreeBSD Monitor chromium < 37.0.2062.94 http://www.fbsdmon.org/feed/ports_audit/dad46c4edeaa2f589fb6 2014-08-26T23:59:59Z chromium -- multiple vulnerabilities file < 5.19 http://www.fbsdmon.org/feed/ports_audit/da3f30112e378422ee5b 2014-08-21T23:59:59Z file -- buffer overruns and missing buffer size tests py27-django >= 1.6 < 1.6.6 http://www.fbsdmon.org/feed/ports_audit/c84115210aa58f3b345b 2014-08-21T23:59:59Z django -- multiple vulnerabilities php53 < 5.3.29 http://www.fbsdmon.org/feed/ports_audit/5c615f8d0e45845b8c06 2014-08-18T23:59:59Z PHP multiple vulnerabilities phpMyAdmin >= 4.2.0 < 4.2.7.1 http://www.fbsdmon.org/feed/ports_audit/78145e97fb0c318c9ab9 2014-08-17T23:59:59Z phpMyAdmin -- XSS vulnerabilities chromium < 36.0.1985.143 http://www.fbsdmon.org/feed/ports_audit/106fe2b758e19a89b6e1 2014-08-13T23:59:59Z chromium -- multiple vulnerabilities subversion17 >= 1.7.0 < 1.7.18 http://www.fbsdmon.org/feed/ports_audit/d451f8a3c40fff527186 2014-08-11T23:59:59Z subversion -- several vulnerabilities serf < 1.3.7 http://www.fbsdmon.org/feed/ports_audit/56435805c85f9f58ef2f 2014-08-11T23:59:59Z serf -- SSL Certificate Null Byte Poisoning nginx >= 1.6.0,2 < 1.6.4,2 http://www.fbsdmon.org/feed/ports_audit/cf83e6baeb7b3714f35f 2014-08-09T23:59:59Z nginx -- inject commands into SSL session vulnerability nginx >= 1.6.0,2 < 1.6.1,2 http://www.fbsdmon.org/feed/ports_audit/f452ef521ab099e33808 2014-08-09T23:59:59Z nginx -- inject commands into SSL session vulnerability openssl >= 1.0.1 < 1.0.1_14 http://www.fbsdmon.org/feed/ports_audit/14d97717b2b9c27bde07 2014-08-06T23:59:59Z OpenSSL -- multiple vulnerabilities krfb < 4.12.5_1 http://www.fbsdmon.org/feed/ports_audit/8f374f25f6cffc2e29c7 2014-08-03T23:59:59Z krfb -- Possible Denial of Service or code execution via integer overflow gpgme < 1.5.0 http://www.fbsdmon.org/feed/ports_audit/59720368e51ff091ff88 2014-08-02T23:59:59Z gpgme -- heap-based buffer overflow in gpgsm status handler samba4 >= 4.0.0 < 4.0.21 http://www.fbsdmon.org/feed/ports_audit/b9accef17786c1deae18 2014-08-02T23:59:59Z samba -- remote code execution kdelibs < 4.12.5_3 http://www.fbsdmon.org/feed/ports_audit/13988edcdc8cee860a3e 2014-07-31T23:59:59Z kdelibs -- KAuth PID Reuse Flaw tor < 0.2.4.23 http://www.fbsdmon.org/feed/ports_audit/2f73a8bed38e84f4097b 2014-07-30T23:59:59Z tor -- traffic confirmation attack i2p < 0.9.14 http://www.fbsdmon.org/feed/ports_audit/c45be8c04b6756cbbc38 2014-07-28T23:59:59Z i2p -- Multiple Vulnerabilities bugzilla44 < 4.4.5 http://www.fbsdmon.org/feed/ports_audit/ac00ac61a3d5dc51f251 2014-07-25T23:59:59Z bugzilla -- Cross Site Request Forgery apache22 > 2.2.0 < 2.2.27_6 http://www.fbsdmon.org/feed/ports_audit/ba9ff5e1f83104475279 2014-07-24T23:59:59Z apache22 -- several vulnerabilities firefox < 31.0,1 http://www.fbsdmon.org/feed/ports_audit/0305a86a498b515d4663 2014-07-23T23:59:59Z mozilla -- multiple vulnerabilities