This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-04-25 21:13:12 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
4d1d2f6d-ec94-11e1-8bd8-0022156e8794 | jabberd -- domain spoofing in server dialback protocol XMPP Standards Foundation reports:
Discovery 2012-08-21 Entry 2012-08-23 jabberd < 2.2.16_2 CVE-2012-3525 http://xmpp.org/resources/security-notices/server-dialback/ |
55041d37-ff62-11d9-a9a5-000ae4641456 | jabberd -- 3 buffer overflows There are 3 buffer overflows in jid.c that are triggered during parsing of JID strings when components (user, host or resource) are too long.
These overflows can be used to perform a DoS attack on the server (sm process segfaults) and can possible be used for arbitrary code execution. Discovery 2005-07-25 Entry 2005-07-30 jabberd < 2.0.9 http://j2.openaether.org/bugzilla/show_bug.cgi?id=99 |
553224e7-4325-11d9-a3d5-000c6e8f12ef | jabberd -- remote buffer overflow vulnerability Caused by improper bounds-checking of username and password in the C2S module, it is possible for an attacker to cause a remote buffer overflow. The server directly handles the userinput with SQL backend functions - malicious input may lead to buffer overflow. Discovery 2004-11-24 Entry 2004-11-30 jabberd ge 2.* le 2.0.4 http://marc.theaimsgroup.com/?l=bugtraq&m=110144303826709 |
76d80b33-7211-11e7-998a-08606e47f965 | jabberd -- authentication bypass vulnerability SecurityFocus reports:
Discovery 2017-07-03 Entry 2017-07-26 jabberd < 2.6.1 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867032 http://www.securityfocus.com/bid/99511 CVE-2017-10807 |
f4af098d-d921-11da-ad4a-00123ffe8333 | jabberd -- SASL Negotiation Denial of Service Vulnerability Secunia reports:
Discovery 2006-03-20 Entry 2006-05-01 jabberd < 2.0.11 CVE-2006-1329 http://article.gmane.org/gmane.network.jabber.admin/27372 http://jabberstudio.org/projects/jabberd2/releases/view.php?id=826 http://secunia.com/advisories/19281/ |