FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  371119
Date:      2014-10-18
Time:      12:52:26Z
Committer: kwm

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
14ad2a28-66d2-11dc-b25f-02e0185f8d72konquerer -- address bar spoofing

The KDE development team reports:

The Konqueror address bar is vulnerable to spoofing attacks that are based on embedding white spaces in the url. In addition the address bar could be tricked to show an URL which it is intending to visit for a short amount of time instead of the current URL.


Discovery 2007-09-14
Entry 2007-09-19
kdebase
lt 3.5.7_3

kdelibs
lt 3.5.7_2

CVE-2007-3820
CVE-2007-4224
CVE-2007-4225
http://www.kde.org/info/security/advisory-20070914-1.txt
3987c5d1-47a9-11df-a0d5-0016d32f24fbKDM -- local privilege escalation vulnerability

KDE Security Advisory reports:

KDM contains a race condition that allows local attackers to make arbitrary files on the system world-writeable. This can happen while KDM tries to create its control socket during user login. A local attacker with a valid local account can under certain circumstances make use of this vulnerability to execute arbitrary code as root.


Discovery 2010-04-13
Entry 2010-04-14
Modified 2010-04-14
kdebase
le 3.5.10_6

kdebase-workspace
le 4.3.5_1

CVE-2010-0436
http://www.kde.org/info/security/advisory-20100413-1.txt
2e116ba5-f7c3-11d9-928e-000b5d7e6dd5kdebase -- Kate backup file permission leak

A KDE Security Advisory explains:

Kate / Kwrite create a file backup before saving a modified file. These backup files are created with default permissions, even if the original file had more strict permissions set.

Depending on the system security settings, backup files might be readable by other users. Kate / Kwrite are network transparent applications and therefore this vulnerability might not be restricted to local users.


Discovery 2005-07-18
Entry 2005-07-18
Modified 2005-10-09
kdebase
ge 3.2.0 lt 3.4.1

linux_base-suse
ge 9.3 lt 9.3_2

CVE-2005-1920
https://bugs.kde.org/show_bug.cgi?id=103331
http://www.kde.org/info/security/advisory-20050718-1.txt
14ad2a28-66d2-11dc-b25f-02e0185f8d72konquerer -- address bar spoofing

The KDE development team reports:

The Konqueror address bar is vulnerable to spoofing attacks that are based on embedding white spaces in the url. In addition the address bar could be tricked to show an URL which it is intending to visit for a short amount of time instead of the current URL.


Discovery 2007-09-14
Entry 2007-09-19
kdebase
lt 3.5.7_3

kdelibs
lt 3.5.7_2

CVE-2007-3820
CVE-2007-4224
CVE-2007-4225
http://www.kde.org/info/security/advisory-20070914-1.txt
2e116ba5-f7c3-11d9-928e-000b5d7e6dd5kdebase -- Kate backup file permission leak

A KDE Security Advisory explains:

Kate / Kwrite create a file backup before saving a modified file. These backup files are created with default permissions, even if the original file had more strict permissions set.

Depending on the system security settings, backup files might be readable by other users. Kate / Kwrite are network transparent applications and therefore this vulnerability might not be restricted to local users.


Discovery 2005-07-18
Entry 2005-07-18
Modified 2005-10-09
kdebase
ge 3.2.0 lt 3.4.1

linux_base-suse
ge 9.3 lt 9.3_2

CVE-2005-1920
https://bugs.kde.org/show_bug.cgi?id=103331
http://www.kde.org/info/security/advisory-20050718-1.txt
3987c5d1-47a9-11df-a0d5-0016d32f24fbKDM -- local privilege escalation vulnerability

KDE Security Advisory reports:

KDM contains a race condition that allows local attackers to make arbitrary files on the system world-writeable. This can happen while KDM tries to create its control socket during user login. A local attacker with a valid local account can under certain circumstances make use of this vulnerability to execute arbitrary code as root.


Discovery 2010-04-13
Entry 2010-04-14
Modified 2010-04-14
kdebase
le 3.5.10_6

kdebase-workspace
le 4.3.5_1

CVE-2010-0436
http://www.kde.org/info/security/advisory-20100413-1.txt