This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-05-15 02:04:10 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
d9f99491-1656-11e6-94fa-002590263bf5 | perl5 -- taint mechanism bypass vulnerability MITRE reports:
Discovery 2016-04-08 Entry 2016-05-10 Modified 2016-08-22 perl5 < 5.18.4_21 ge 5.20.0 lt 5.20.3_12 ge 5.22.0 lt 5.22.1_8 perl5.18 ge 5.18.0 lt 5.18.4_21 perl5.20 ge 5.20.0 lt 5.20.3_12 perl5.22 ge 5.22.0 lt 5.22.1_8 perl ge 0 CVE-2016-2381 ports/208879 |
5b47c279-8cb5-11dc-8878-0016179b2dd5 | perl -- regular expressions unicode data buffer overflow Red Hat reports:
Discovery 2007-11-05 Entry 2007-11-06 Modified 2007-11-07 perl perl-threaded gt 5.8.* lt 5.8.8_1 CVE-2007-5116 http://secunia.com/advisories/27546/ |
a5eb760a-753c-11d9-a36f-000a95bc6fae | perl -- vulnerabilities in PERLIO_DEBUG handling Kevin Finisterre discovered bugs in perl's I/O debug support:
Note: By default, no set-user-ID perl
binary is installed. An administrator must enable it
manually at build time with the Discovery 2005-02-02 Entry 2005-02-02 Modified 2007-11-07 perl perl-threaded ge 5.8 lt 5.8.6_2 CVE-2005-0155 CVE-2005-0156 |
7fe7df75-6568-11e6-a590-14dae9d210b8 | End of Life Ports These packages have reached End of Life status and/or have been removed from the Ports Tree. They may contain undocumented security issues. Please take caution and find alternative software as soon as possible. Discovery 2016-08-18 Entry 2016-08-18 Modified 2016-10-18 python32 python31 python30 python26 python25 python24 python23 python22 python21 python20 python15 ge 0 php54 php53 php52 php5 php4 ge 0 perl5 < 5.18 perl5.16 perl5.14 perl5.12 perl ge 0 ruby ruby_static < 2.1,1 unifi2 unifi3 ge 0 apache21 apache20 apache13 ge 0 tomcat55 tomcat41 ge 0 mysql51-client mysql51-server mysql50-client mysql50-server mysql41-client mysql41-server mysql40-client mysql40-server ge 0 postgresql90-client postgresql90-server postgresql84-client postgresql84-server postgresql83-client postgresql83-server postgresql82-client postgresql82-server postgresql81-client postgresql81-server postgresql80-client postgresql80-server postgresql74-client postgresql74-server postgresql73-client postgresql73-server postgresql72-client postgresql72-server postgresql71-client postgresql71-server postgresql7-client postgresql7-server ge 0 ports/211975 |
3e08047f-5a6c-11e6-a6c3-14dae9d210b8 | p5-XSLoader -- local arbitrary code execution Jakub Wilk reports:
Discovery 2016-06-30 Entry 2016-08-04 Modified 2016-08-22 p5-XSLoader < 0.22 perl5 perl5.18 perl5.20 perl5.22 perl5.24 perl5-devel < 5.18.4_24 ge 5.20 lt 5.20.3_15 ge 5.21 lt 5.22.3.r2 ge 5.23 lt 5.24.1.r2 ge 5.25 lt 5.25.2.87 perl ge 0 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829578 CVE-2016-6185 |
4a99d61c-f23a-11dd-9f55-0030843d3802 | perl -- Directory Permissions Race Condition Secunia reports:
Discovery 2005-03-09 Entry 2009-02-03 perl ge 5.8.0 lt 5.8.9 CVE-2005-0448 http://www.ubuntulinux.org/usn/usn-94-1 http://secunia.com/advisories/14531/ |
bb33981a-7ac6-11da-bf72-00123f589060 | perl, webmin, usermin -- perl format string integer wrap vulnerability The Perl Development page reports:
Discovery 2005-09-23 Entry 2006-02-15 perl ge 5.6.0 lt 5.6.2 ge 5.8.0 lt 5.8.7_1 webmin < 1.250 usermin < 1.180 15629 CVE-2005-3912 CVE-2005-3962 http://dev.perl.org/perl5/news/2005/perl_patches_fix_sprintf_buffer.html http://www.dyadsecurity.com/perl-0002.html http://www.dyadsecurity.com/webmin-0001.html http://www.webmin.com/security.html |
c418d472-6bd1-11d9-93ca-000a95bc6fae | perl -- File::Path insecure file/directory permissions Jeroen van Wolffelaar reports that the Perl module File::Path contains a race condition wherein traversed directories and files are temporarily made world-readable/writable. Discovery 2004-12-30 Entry 2005-01-21 Modified 2007-11-07 perl perl-threaded ge 0 lt 5.6.2 ge 5.8.0 lt 5.8.6 CVE-2004-0452 http://www.debian.org/security/2004/dsa-620 http://xforce.iss.net/xforce/xfdb/18650 |
72bfbb09-5a6a-11e6-a6c3-14dae9d210b8 | perl -- local arbitrary code execution Sawyer X reports:
Discovery 2016-07-21 Entry 2016-08-04 Modified 2016-08-22 perl5 perl5.18 perl5.20 perl5.22 perl5.24 perl5-devel < 5.18.4_23 ge 5.20 lt 5.20.3_14 ge 5.21 lt 5.22.3.r2 ge 5.23 lt 5.24.1.r2 ge 5.25 lt 5.25.3.18 perl ge 0 http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html CVE-2016-1238 |
68c1f75b-8824-11e2-9996-c48508086173 | perl -- denial of service via algorithmic complexity attack on hashing routines Perl developers report:
Discovery 2013-03-04 Entry 2013-03-10 Modified 2016-08-22 perl perl-threaded < 5.12.4_5 ge 5.14.0 lt 5.14.2_3 ge 5.16.0 lt 5.16.2_1 CVE-2013-1667 http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html |