This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-05-02 10:37:19 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
09d418db-70fd-11d8-873f-0020ed76ef5a | Apache 1.3 IP address access control failure on some 64-bit platforms Henning Brauer discovered a programming error in Apache 1.3's mod_access that results in the netmasks in IP address access control rules being interpreted incorrectly on 64-bit, big-endian platforms. In some cases, this could cause a `deny from' IP address access control rule including a netmask to fail. Discovery 2004-03-07 Entry 2004-03-08 Modified 2004-03-12 apache < 1.3.29_2 apache+mod_ssl < 1.3.29+2.8.16_1 apache+ssl < 1.3.29.1.53_1 ru-apache < 1.3.29+30.19_1 ru-apache+mod_ssl < 1.3.29+30.19+2.8.16_1 CVE-2003-0993 http://cvs.apache.org/viewcvs.cgi/apache-1.3/src/modules/standard/mod_access.c?r1=1.46&r2=1.47 http://www.apacheweek.com/features/security-13 http://nagoya.apache.org/bugzilla/show_bug.cgi?id=23850 http://marc.theaimsgroup.com/?l=apache-cvs&m=107869603013722 9829 |
6e6a6b8a-2fde-11d9-b3a2-0050fc56d258 | apache mod_include buffer overflow vulnerability There is a buffer overflow in a function used by mod_include that may enable a local user to gain privileges of a httpd child. Only users that are able to create SSI documents can take advantage of that vulnerability. Discovery 2004-10-22 Entry 2004-11-06 apache < 1.3.33 apache+mod_ssl < 1.3.32+2.8.21_1 apache+mod_ssl+ipv6 < 1.3.32+2.8.21_1 apache+mod_perl le 1.3.31 apache+ipv6 < 1.3.33 apache+ssl le 1.3.29.1.55 ru-apache < 1.3.33+30.21 ru-apache+mod_ssl < 1.3.33+30.21+2.8.22 CVE-2004-0940 http://www.securitylab.ru/48807.html |
9fff8dc8-7aa7-11da-bf72-00123f589060 | apache -- mod_imap cross-site scripting flaw The Apache HTTP Server Project reports:
Discovery 2005-11-01 Entry 2006-01-01 Modified 2009-01-23 apache ge 1.3 lt 1.3.34_3 ge 2.0.35 lt 2.0.55_2 ge 2.1 lt 2.1.9_3 ge 2.2 lt 2.2.0_3 apache+mod_perl < 1.3.34_1 apache_fp ge 0 apache+ipv6 < 1.3.37 ru-apache < 1.3.34+30.22_1 ru-apache+mod_ssl < 1.3.34+30.22+2.8.25_1 apache+ssl ge 1.3.0 lt 1.3.33.1.55_2 apache+mod_ssl apache+mod_ssl+ipv6 apache+mod_ssl+mod_accel apache+mod_ssl+mod_accel+ipv6 apache+mod_ssl+mod_accel+mod_deflate apache+mod_ssl+mod_accel+mod_deflate+ipv6 apache+mod_ssl+mod_deflate apache+mod_ssl+mod_deflate+ipv6 apache+mod_ssl+mod_snmp apache+mod_ssl+mod_snmp+mod_accel apache+mod_ssl+mod_snmp+mod_accel+ipv6 apache+mod_ssl+mod_snmp+mod_deflate apache+mod_ssl+mod_snmp+mod_deflate+ipv6 apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6 < 1.3.34+2.8.25_1 CVE-2005-3352 15834 http://www.apacheweek.com/features/security-13 http://www.apacheweek.com/features/security-20 |
cae01d7b-110d-11df-955a-00219b0fc4d8 | apache -- Prevent chunk-size integer overflow on platforms where sizeof(int) < sizeof(long) Apache ChangeLog reports:
Discovery 2009-06-30 Entry 2010-02-03 Modified 2010-02-03 apache < 1.3.42 apache+mod_perl < 1.3.42 apache+ipv6 < 1.3.42 apache_fp ge 0 ru-apache < 1.3.42+30.23 ru-apache+mod_ssl < 1.3.42 apache+ssl < 1.3.42.1.57_2 apache+mod_ssl apache+mod_ssl+ipv6 apache+mod_ssl+mod_accel apache+mod_ssl+mod_accel+ipv6 apache+mod_ssl+mod_accel+mod_deflate apache+mod_ssl+mod_accel+mod_deflate+ipv6 apache+mod_ssl+mod_deflate apache+mod_ssl+mod_deflate+ipv6 apache+mod_ssl+mod_snmp apache+mod_ssl+mod_snmp+mod_accel apache+mod_ssl+mod_snmp+mod_accel+ipv6 apache+mod_ssl+mod_snmp+mod_deflate apache+mod_ssl+mod_snmp+mod_deflate+ipv6 apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6 < 1.3.41+2.8.27_2 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0010 http://www.security-database.com/detail.php?alert=CVE-2010-0010 http://security-tracker.debian.org/tracker/CVE-2010-0010 http://www.vupen.com/english/Reference-CVE-2010-0010.php |
651996e0-fe07-11d9-8329-000e0c2e438a | apache -- http request smuggling A Watchfire whitepaper reports an vulnerability in the Apache webserver. The vulnerability can be exploited by malicious people causing cross site scripting, web cache poisoining, session hijacking and most importantly the ability to bypass web application firewall protection. Exploiting this vulnerability requires multiple carefully crafted HTTP requests, taking advantage of an caching server, proxy server, web application firewall etc. This only affects installations where Apache is used as HTTP proxy in combination with the following web servers:
Discovery 2005-07-25 Entry 2005-07-26 Modified 2009-01-23 apache < 1.3.33_2 gt 2.* lt 2.0.54_1 gt 2.1.0 lt 2.1.6_1 apache+ssl < 1.3.33.1.55_1 apache+mod_perl < 1.3.33_3 apache+mod_ssl apache+mod_ssl+ipv6 apache+mod_ssl+mod_accel apache+mod_ssl+mod_accel+ipv6 apache+mod_ssl+mod_accel+mod_deflate apache+mod_ssl+mod_accel+mod_deflate+ipv6 apache+mod_ssl+mod_deflate apache+mod_ssl+mod_deflate+ipv6 apache+mod_ssl+mod_snmp apache+mod_ssl+mod_snmp+mod_accel apache+mod_ssl+mod_snmp+mod_accel+ipv6 apache+mod_ssl+mod_snmp+mod_deflate apache+mod_ssl+mod_snmp+mod_deflate+ipv6 apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6 < 1.3.33+2.8.22_1 apache_fp gt 0 apache+ipv6 < 1.3.37 ru-apache < 1.3.34+30.22 ru-apache+mod_ssl < 1.3.34+30.22+2.8.25 14106 CVE-2005-2088 http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf |
d8c901ff-0f0f-11e1-902b-20cf30e32f6d | Apache 1.3 -- mod_proxy reverse proxy exposure Apache HTTP server project reports:
Discovery 2011-10-05 Entry 2011-11-14 apache < 1.3.43 apache+ssl < 1.3.43.1.59_2 apache+ipv6 < 1.3.43 apache+mod_perl < 1.3.43 apache+mod_ssl < 1.3.41+2.8.31_4 apache+mod_ssl+ipv6 < 1.3.41+2.8.31_4 ru-apache-1.3 < 1.3.43+30.23_1 ru-apache+mod_ssl < 1.3.43+30.23_1 CVE-2011-3368 http://httpd.apache.org/security/vulnerabilities_13.html http://seclists.org/fulldisclosure/2011/Oct/232 |
de2bc01f-dc44-11e1-9f4d-002354ed89bc | Apache -- Insecure LD_LIBRARY_PATH handling Apache reports:
Discovery 2012-03-02 Entry 2012-08-01 apache le 2.2.22_5 apache-event le 2.2.22_5 apache-itk le 2.2.22_5 apache-peruser le 2.2.22_5 apache-worker le 2.2.22_5 CVE-2012-0883 http://httpd.apache.org/security/vulnerabilities_24.html http://www.apache.org/dist/httpd/CHANGES_2.4.2 |
ca6c8f35-0a5f-11d9-ad6f-00061bc2ad93 | apache -- heap overflow in mod_proxy A buffer overflow exists in mod_proxy which may allow an attacker to launch local DoS attacks and possibly execute arbitrary code. Discovery 2004-06-10 Entry 2004-09-19 Modified 2004-10-05 apache < 1.3.31_1 apache13-ssl le 1.3.29.1.53_2 apache13-modssl < 1.3.31+2.8.18_4 apache13+ipv6 le 1.3.29_2 apache13-modperl le 1.3.31 CVE-2004-0492 http://www.guninski.com/modproxy1.html |