This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-10-31 10:54:49 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
84237895-8f39-11d8-8b29-0020ed76ef5a | neon format string vulnerabilities Greuff reports that the neon WebDAV client library contains several format string bugs within error reporting code. A malicious server may exploit these bugs by sending specially crafted PROPFIND or PROPPATCH responses. Although several applications include neon, such as cadaver and subversion, the FreeBSD Ports of these applications are not impacted. They are specifically configured to NOT use the included neon. Only packages listed as affected in this notice are believed to be impacted. Discovery 2004-04-14 Entry 2004-04-15 Modified 2004-06-25 neon < 0.24.5 tla < 1.2_1 sitecopy <= 0.13.4_1 CVE-2004-0179 http://www.webdav.org/neon/ http://secunia.com/advisories/11785 |
8d075001-a9ce-11d8-9c6d-0020ed76ef5a | neon date parsing vulnerability Stefan Esser reports:
The vulnerability is in the function ne_rfc1036_parse, which is in turn used by the function ne_httpdate_parse. Applications using either of these neon functions may be vulnerable. Discovery 2004-05-19 Entry 2004-05-19 Modified 2004-06-25 neon < 0.24.5_1 sitecopy <= 0.13.4_1 CVE-2004-0398 http://security.e-matters.de/advisories/062004.html http://secunia.com/advisories/11785 |