This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-05-09 22:37:04 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
e7bb3885-da40-11e3-9ecb-2c4138874f7d | libxml2 -- lack of end-of-document check DoS CVE MITRE reports:
Discovery 2013-04-11 Entry 2013-07-10 Modified 2015-07-15 libxml2 < 2.9.1 linux-c6-libxml2 < 2.7.6_2 linux-f10-libxml2 ge * CVE-2013-2877 https://git.gnome.org/browse/libxml2/tag/?id=CVE-2013-2877 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2877 |
efdd0edc-da3d-11e3-9ecb-2c4138874f7d | libxml2 -- entity substitution DoS Stefan Cornelius reports:
Discovery 2013-12-03 Entry 2014-05-06 Modified 2015-07-15 libxml2 < 2.9.1 linux-c6-libxml2 < 2.7.6_2 linux-f10-libxml2 ge * CVE-2014-0191 http://www.openwall.com/lists/oss-security/2014/05/06/4 https://git.gnome.org/browse/libxml2/tag/?id=CVE-2014-0191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191 |
57f1a624-6197-11e1-b98c-bcaec565249c | libxml2 -- heap buffer overflow Google chrome team reports:
Discovery 2012-01-05 Entry 2012-02-27 libxml2 linux-f10-libxml2 < 2.7.8_2 CVE-2011-3919 http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html |
0642b064-56c4-11e4-8b87-bcaec565249c | libxml2 -- Denial of service RedHat reports:
Discovery 2014-10-16 Entry 2014-10-18 Modified 2015-07-15 libxml2 < 2.9.2 linux-c6-libxml2 < 2.7.6_2 linux-f10-libxml2 ge * CVE-2014-3660 https://rhn.redhat.com/errata/RHSA-2014-1655.html |
b8ae4659-a0da-11e1-a294-bcaec565249c | libxml2 -- An off-by-one out-of-bounds write by XPointer Google chrome team reports:
Discovery 2012-05-15 Entry 2012-05-18 Modified 2014-04-30 libxml2 < 2.7.8_3 linux-f10-libxml2 < 2.7.8_3 CVE-2011-3202 http://googlechromereleases.blogspot.com/2012/05/stable-channel-update.html https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3102 |
7be92050-a450-11e2-9898-001060e06fd4 | libxml -- Integer overflow Integer overflow in xpath.c, allows context-dependent attackers to to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. Discovery 2011-09-02 Entry 2011-11-10 Modified 2011-11-12 libxml < 1.8.17_5 libxml2 linux-f10-libxml2 < 2.7.8 CVE-2011-1944 |
9c7177ff-1fe1-11e5-9a01-bcaec565249c | libxml2 -- Enforce the reader to run in constant memory Daniel Veilland reports:
Discovery 2015-04-14 Entry 2015-07-01 Modified 2016-01-31 libxml2 < 2.9.2_3 linux-c6-libxml2 < 2.7.6_5 linux-f10-libxml2 ge * CVE-2015-1819 https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9 |