FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  371418
Date:      2014-10-24
Time:      01:58:13Z
Committer: zi

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
169f422f-bd88-11d9-a281-02e018374e71groff -- groffer uses temporary files unsafely

The groffer script in the groff package 1.18 and later versions allows local users to overwrite files via a symlink attack on temporary files.


Discovery 2004-09-30
Entry 2005-05-09
ja-groff
ge 1.18 lt 1.18.1_8

ports/80671
11287
CVE-2004-0969
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278265
01bb84e2-bd88-11d9-a281-02e018374e71groff -- pic2graph and eqn2graph are vulnerable to symlink attack through temporary files

The eqn2graph and pic2graph scripts in groff 1.18.1 allow local users to overwrite arbitrary files via a symlink attack on temporary files.


Discovery 2004-12-20
Entry 2005-05-09
ja-groff
ge 1.18.1 lt 1.18.1_8

ports/80671
12058
CVE-2004-1296
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286371
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286372
169f422f-bd88-11d9-a281-02e018374e71groff -- groffer uses temporary files unsafely

The groffer script in the groff package 1.18 and later versions allows local users to overwrite files via a symlink attack on temporary files.


Discovery 2004-09-30
Entry 2005-05-09
ja-groff
ge 1.18 lt 1.18.1_8

ports/80671
11287
CVE-2004-0969
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278265
01bb84e2-bd88-11d9-a281-02e018374e71groff -- pic2graph and eqn2graph are vulnerable to symlink attack through temporary files

The eqn2graph and pic2graph scripts in groff 1.18.1 allow local users to overwrite arbitrary files via a symlink attack on temporary files.


Discovery 2004-12-20
Entry 2005-05-09
ja-groff
ge 1.18.1 lt 1.18.1_8

ports/80671
12058
CVE-2004-1296
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286371
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286372