FreeBSD Monitor - Feeds::ports_audit http://fbsdmon.org/feed/ports_audit 2015-07-03T23:59:59Z FreeBSD Monitor cups-filters < 1.0.71 http://fbsdmon.org/feed/ports_audit/e88a5ed2ef51a48ea5a4 2015-07-03T23:59:59Z cups-filters -- texttopdf integer overflow wesnoth < 1.12.4,1 http://fbsdmon.org/feed/ports_audit/d3401cff3759fe09dd8a 2015-07-01T23:59:59Z wesnoth -- disclosure of .pbl files with lowercase, uppercase, and mixed-case extension libxml2 < 2.9.2_3 http://fbsdmon.org/feed/ports_audit/f0063e27fdde66aebc88 2015-07-01T23:59:59Z libxml2 -- Enforce the reader to run in constant memory ntp < 4.2.8p3 http://fbsdmon.org/feed/ports_audit/79f28b5304782e30f02c 2015-06-30T23:59:59Z ntp -- control message remote Deinal of Service vulnerability cups-filters < 1.0.70 http://fbsdmon.org/feed/ports_audit/5cbfdfcd1f89a2e2fd2d 2015-06-29T23:59:59Z cups-filters -- buffer overflow in texttopdf size allocation qemu-devel < 0.11.1_20, >= 0.12 < 2.3.0_2 http://fbsdmon.org/feed/ports_audit/a8a3003e4ea390ea4b41 2015-06-26T23:59:59Z qemu -- Heap overflow in QEMU PCNET controller, allowing guest to host escape (CVE-2015-3209) elasticsearch < 1.2.0 http://fbsdmon.org/feed/ports_audit/7822320d6f92df1ad8c3 2015-06-26T23:59:59Z elasticsearch and logstash -- remote OS command execution via dynamic scripting elasticsearch >= 1.0.0 < 1.6.0 http://fbsdmon.org/feed/ports_audit/2bb3c23d78cbee6fa554 2015-06-26T23:59:59Z elasticsearch -- security fix for shared file-system repositories elasticsearch >= 1.3.0 < 1.3.8, >= 1.4.0 < 1.4.3 http://fbsdmon.org/feed/ports_audit/c723303834e062dae499 2015-06-26T23:59:59Z elasticsearch -- remote OS command execution via Groovy scripting engine elasticsearch < 1.4.5, >= 1.5.0 < 1.5.2 http://fbsdmon.org/feed/ports_audit/30605da5d1cb97df860e 2015-06-26T23:59:59Z elasticsearch -- directory traversal attack with site plugins elasticsearch < 1.4.0 http://fbsdmon.org/feed/ports_audit/eaba9693741185f665cd 2015-06-26T23:59:59Z elasticsearch -- cross site scripting vulnerability in the CORS functionality logstash-forwarder < 0.4.0.20150507 http://fbsdmon.org/feed/ports_audit/23030880a703ac7dbe83 2015-06-24T23:59:59Z logstash-forwarder and logstash -- susceptibility to POODLE vulnerability logstash < 1.4.2 http://fbsdmon.org/feed/ports_audit/f4db06e3e44240e93175 2015-06-24T23:59:59Z logstash -- Remote command execution in Logstash zabbix and nagios_nsca outputs logstash < 1.4.3 http://fbsdmon.org/feed/ports_audit/cbdadd095bbffc98b214 2015-06-24T23:59:59Z logstash -- Directory traversal vulnerability in the file output plugin linux-c6-flashplugin11 < 11.2r202.466 http://fbsdmon.org/feed/ports_audit/054c737fa7355fe530ca 2015-06-24T23:59:59Z Adobe Flash Player -- critical vulnerabilities rubygem-bson < 3.0.4 http://fbsdmon.org/feed/ports_audit/50a8f94f6b966026bd4f 2015-06-23T23:59:59Z rubygem-bson -- DoS and possible injection php5-pgsql < 5.4.42 http://fbsdmon.org/feed/ports_audit/5e0b35ee3323d8f57c9d 2015-06-23T23:59:59Z php5 -- multiple vulnerabilities chromium < 43.0.2357.130 http://fbsdmon.org/feed/ports_audit/b8b3a9cb5f6ee2e02ae7 2015-06-22T23:59:59Z www/chromium -- mulitple vulnerabilities rubygem-paperclip < 4.2.2 http://fbsdmon.org/feed/ports_audit/ecbea99af1cb651063dd 2015-06-22T23:59:59Z rubygem-paperclip -- validation bypass vulnerabilitiy ipython < 3.2.0 http://fbsdmon.org/feed/ports_audit/dc4e649cd7a7918f9212 2015-06-22T23:59:59Z devel/ipython -- remote execution