This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-03-27 18:04:16 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
02274fd9-6bc5-11d9-8edb-000a95bc6fae | realplayer -- arbitrary file deletion and other vulnerabilities An NGSSoftware Insight Security Research Advisory reports:
Discovery 2004-10-06 Entry 2005-01-21 linux-realplayer < 10.0.2 http://www.ngssoftware.com/advisories/real-02full.txt http://www.ngssoftware.com/advisories/real-03full.txt http://service.real.com/help/faq/security/040928_player/EN/ |
fe4c84fc-bdb5-11da-b7d4-00123ffe8333 | linux-realplayer -- heap overflow iDefense Reports:
Discovery 2006-03-23 Entry 2006-03-27 linux-realplayer ge 10.0.1 lt 10.0.6 CVE-2005-2922 http://service.real.com/realplayer/security/03162006_player/en/ http://www.idefense.com/intelligence/vulnerabilities/display.php?id=404 http://secunia.com/advisories/19358/ |
c73305ae-8cd7-11d9-9873-000a95bc6fae | realplayer -- remote heap overflow Two exploits have been identified in the Linux RealPlayer client. RealNetworks states:
Discovery 2005-03-01 Entry 2005-03-04 linux-realplayer le 10.0.2 CVE-2005-0611 http://marc.theaimsgroup.com/?l=vulnwatch&m=110977858619314 http://service.real.com/help/faq/security/050224_player/EN/ |
25858c37-bdab-11da-b7d4-00123ffe8333 | linux-realplayer -- buffer overrun Secunia Advisories Reports:
Discovery 2006-03-23 Entry 2006-03-27 linux-realplayer ge 10.0.1 lt 10.0.7.785.20060201 CVE-2006-0323 http://service.real.com/realplayer/security/03162006_player/en/ http://secunia.com/advisories/19358/ |
95ee96f2-e488-11d9-bf22-080020c11455 | linux-realplayer -- RealText parsing heap overflow An iDEFENSE Security Advisory reports:
Discovery 2005-06-23 Entry 2005-06-24 linux-realplayer le 10.0.4_1 CVE-2005-1277 http://www.idefense.com/application/poi/display?id=250&type=vulnerabilities&flashstatus=false http://service.real.com/help/faq/security/050623_player/EN/ |