This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-11-23 05:42:14 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
98bd69c3-834b-11d8-a41f-0020ed76ef5a | Courier mail services: remotely exploitable buffer overflows The Courier set of mail services use a common Unicode library. This library contains buffer overflows in the converters for two popular Japanese character encodings. These overflows may be remotely exploitable, triggered by a maliciously formatted email message that is later processed by one of the Courier mail services. From the release notes for the corrected versions of the Courier set of mail services:
Discovery 2004-02-01 Entry 2004-03-31 Modified 2004-07-16 courier < 0.45 courier-imap < 3.0,1 sqwebmail < 4.0 CVE-2004-0224 http://cvs.sourceforge.net/viewcvs.py/courier/libs/unicode/iso2022jp.c?rev=1.10&view=markup http://cvs.sourceforge.net/viewcvs.py/courier/libs/unicode/shiftjis.c?rev=1.6&view=markup 9845 http://secunia.com/advisories/11087 http://www.osvdb.org/4194 http://www.osvdb.org/6927 |
616cf823-f48b-11d8-9837-000c41e2cdad | courier-imap -- format string vulnerability in debug mode An iDEFENSE security advisory describes a format string vulnerability that could be exploited when Courier-IMAP is run in debug mode (DEBUG_LOGIN set). Discovery 2004-08-18 Entry 2004-08-22 Modified 2013-06-19 courier-imap < 3.0.7,1 CVE-2004-0777 http://lists.netsys.com/pipermail/full-disclosure/2004-August/025478.html http://www.idefense.com/application/poi/display?id=131&type=vulnerabilities&flashstatus=false 10976 |