This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-05-21 14:03:59 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
9b60bba1-cf18-11ed-bd44-080027f5fec9 | rubygem-uri -- ReDoS vulnerability Dominic Couture reports:
Discovery 2023-03-28 Entry 2023-03-30 ruby ge 2.7.0,1 lt 2.7.8,1 ge 3.0.0,1 lt 3.0.6,1 ge 3.1.0,1 lt 3.1.4,1 ge 3.2.0.p1,1 lt 3.2.2,1 ruby27 ge 2.7.0,1 lt 2.7.8,1 ruby30 ge 3.0.0,1 lt 3.0.6,1 ruby31 ge 3.1.0,1 lt 3.1.4,1 ruby32 ge 3.2.0.p1,1 lt 3.2.2,1 rubygem-uri < 0.12.1 CVE-2023-28755 https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ |
6bd2773c-cf1a-11ed-bd44-080027f5fec9 | rubygem-time -- ReDoS vulnerability ooooooo_q reports:
Discovery 2023-03-30 Entry 2023-03-30 ruby ge 2.7.0,1 lt 2.7.8,1 ge 3.0.0,1 lt 3.0.6,1 ge 3.1.0,1 lt 3.1.4,1 ge 3.2.0.p1,1 lt 3.2.2,1 ruby27 ge 2.7.0,1 lt 2.7.8,1 ruby30 ge 3.0.0,1 lt 3.0.6,1 ruby31 ge 3.1.0,1 lt 3.1.4,1 ruby32 ge 3.2.0.p1,1 lt 3.2.2,1 rubygem-time < 0.2.2 CVE-2023-28756 https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ |
f22144d7-bad1-11ec-9cfe-0800270512f4 | Ruby -- Double free in Regexp compilation piao reports:
Discovery 2022-04-12 Entry 2022-04-13 ruby ge 3.0.0,1 lt 3.0.4,1 ge 3.1.0,1 lt 3.1.2,1 ge 3.2.0.p1,1 lt 3.2.0.p1_1,1 ruby30 ge 3.0.0,1 lt 3.0.4,1 ruby31 ge 3.1.0,1 lt 3.1.2,1 ruby32 ge 3.2.0.p1,1 lt 3.2.0.p1_1,1 CVE-2022-28738 https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/ |
06ed6a49-bad4-11ec-9cfe-0800270512f4 | Ruby -- Buffer overrun in String-to-Float conversion piao reports:
Discovery 2022-04-12 Entry 2022-04-13 ruby ge 2.7.0,1 lt 2.7.6,1 ge 3.0.0,1 lt 3.0.4,1 ge 3.1.0,1 lt 3.1.2,1 ge 3.2.0.p1,1 lt 3.2.0.p1_1,1 ruby27 ge 2.7.0,1 lt 2.7.6,1 ruby30 ge 3.0.0,1 lt 3.0.4,1 ruby31 ge 3.1.0,1 lt 3.1.2,1 ruby32 ge 3.2.0.p1,1 lt 3.2.0.p1_1,1 CVE-2022-28739 https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/ |
2ce1a2f1-0177-11ef-a45e-08002784c58d | ruby -- Arbitrary memory address read vulnerability with Regex search sp2ip reports:
Discovery 2024-04-23 Entry 2024-04-23 ruby ge 3.1.0,1 lt 3.1.5,1 ge 3.2.0,1 lt 3.2.4,1 ge 3.3.0,1 lt 3.3.1,1 ruby31 ge 3.1.0,1 lt 3.1.5,1 ruby32 ge 3.2.0,1 lt 3.2.4,1 ruby33 ge 3.3.0,1 lt 3.3.1,1 CVE-2024-27282 https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/ |
84ab03b6-6c20-11ed-b519-080027f5fec9 | rubygem-cgi -- HTTP response splitting vulnerability Hiroshi Tokumaru reports:
Discovery 2022-11-22 Entry 2022-11-24 rubygem-cgi < 0.3.4 ruby ge 2.7.0,1 lt 2.7.7,1 ge 3.0.0,1 lt 3.0.5,1 ge 3.1.0,1 lt 3.1.3,1 ge 3.2.0.p1,1 lt 3.2.0.r1,1 ruby27 ge 2.7.0,1 lt 2.7.7,1 ruby30 ge 3.0.0,1 lt 3.0.5,1 ruby31 ge 3.1.0,1 lt 3.1.3,1 ruby32 ge 3.2.0.p1,1 lt 3.2.0.r1,1 CVE-2021-33621 https://www.ruby-lang.org/en/news/2022/11/22/http-response-splitting-in-cgi-cve-2021-33621/ |