This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-03-28 15:43:32 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
5914705c-ab03-11e9-a4f9-080027ac955c | PuTTY 0.72 -- buffer overflow in SSH-1 and integer overflow in SSH client Simon Tatham reports:
Discovery 2019-07-14 Entry 2019-07-20 putty < 0.72 putty-gtk2 < 0.72 putty-nogtk < 0.72 https://lists.tartarus.org/pipermail/putty-announce/2019/000028.html |
46e1ece5-48bd-11e9-9c40-080027ac955c | PuTTY -- security fixes in new release The PuTTY team reports:
Discovery 2019-03-16 Entry 2019-03-17 putty < 0.71 putty-gtk2 < 0.71 putty-nogtk < 0.71 https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html |
6190c0cd-b945-11ea-9401-2dcf562daa69 | PuTTY -- Release 0.74 fixes two security vulnerabilities Simon Tatham reports:
Discovery 2020-06-27 Entry 2020-06-28 putty < 0.74 putty-gtk2 < 0.74 putty-nogtk < 0.74 https://lists.tartarus.org/pipermail/putty-announce/2020/000030.html https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-dynamic-hostkey-info-leak.html https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ CVE-2020-14002 https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-keylist-used-after-free.html |