Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 10.2 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2016-6559
Improper bounds checking of the obuf variable in the link_ntoa() function in linkaddr.c of the BSD libc library may allow an malicious user to read or write from memory. The full impact and severity depends on the method of exploit and how the library is used by applications. Acc...
Freebsd Freebsd 10.1
Freebsd Freebsd 10.3
Freebsd Freebsd 11.0
Freebsd Freebsd 9.3
Freebsd Freebsd 10.2
4
CVSSv2
CVE-2015-5674
The routed daemon in FreeBSD 9.3 prior to 9.3-RELEASE-p22, 10.2-RC2 prior to 10.2-RC2-p1, 10.2-RC1 prior to 10.2-RC1-p2, 10.2 prior to 10.2-BETA2-p3, and 10.1 prior to 10.1-RELEASE-p17 allows remote authenticated users to cause a denial of service (assertion failure and daemon ex...
Freebsd Freebsd 9.3
Freebsd Freebsd 10.2
Freebsd Freebsd 10.1
9.3
CVSSv2
CVE-2015-1416
Larry Wall's patch; patch in FreeBSD 10.2-RC1 prior to 10.2-RC1-p1, 10.2 prior to 10.2-BETA2-p2, and 10.1 prior to 10.1-RELEASE-p16; Bitrig; GNU patch prior to 2.2.5; and possibly other patch variants allow remote malicious users to execute arbitrary shell commands via a cra...
Freebsd Freebsd 10.1
Freebsd Freebsd 10.0
Freebsd Freebsd 10.2
9.3
CVSSv2
CVE-2015-1418
The do_ed_script function in pch.c in GNU patch up to and including 2.7.6, and patch in FreeBSD 10.1 prior to 10.1-RELEASE-p17, 10.2 prior to 10.2-BETA2-p3, 10.2-RC1 prior to 10.2-RC1-p2, and 0.2-RC2 prior to 10.2-RC2-p1, allows remote malicious users to execute arbitrary command...
Freebsd Freebsd 10.1
Freebsd Freebsd 10.2
5
CVSSv2
CVE-2015-1417
The inet module in FreeBSD 10.2x prior to 10.2-PRERELEASE, 10.2-BETA2-p2, 10.2-RC1-p1, 10.1x prior to 10.1-RELEASE-p16, 9.x prior to 9.3-STABLE, 9.3-RELEASE-p21, and 8.x prior to 8.4-STABLE, 8.4-RELEASE-p35 on systems with VNET enabled and at least 16 VNET instances allows remote...
Freebsd Freebsd 8.4
Freebsd Freebsd 9.3
Freebsd Freebsd 10.1
Freebsd Freebsd 10.2
7.2
CVSSv2
CVE-2016-1880
The Linux compatibility layer in the kernel in FreeBSD 9.3, 10.1, and 10.2 allows local users to read portions of kernel memory and potentially gain privilege via unspecified vectors, related to "handling of Linux futex robust lists."
Freebsd Freebsd 10.2
Freebsd Freebsd 10.1
Freebsd Freebsd 9.3
7.2
CVSSv2
CVE-2016-1883
The issetugid system call in the Linux compatibility layer in FreeBSD 9.3, 10.1, and 10.2 allows local users to gain privilege via unspecified vectors.
Freebsd Freebsd 10.2
Freebsd Freebsd 10.1
Freebsd Freebsd 9.3
5
CVSSv2
CVE-2016-1888
The telnetd service in FreeBSD 9.3, 10.1, 10.2, 10.3, and 11.0 allows remote malicious users to inject arguments to login and bypass authentication via vectors involving a "sequence of memory allocation failures."
Freebsd Freebsd 10.2
Freebsd Freebsd 9.3
Freebsd Freebsd 11.0
Freebsd Freebsd 10.1
Freebsd Freebsd 10.3
7.2
CVSSv2
CVE-2016-1889
Integer overflow in the bhyve hypervisor in FreeBSD 10.1, 10.2, 10.3, and 11.0 when configured with a large amount of guest memory, allows local users to gain privilege via a crafted device descriptor.
Freebsd Freebsd 10.3
Freebsd Freebsd 11.0
Freebsd Freebsd 10.1
Freebsd Freebsd 10.2
7.2
CVSSv2
CVE-2016-1881
The kernel in FreeBSD 9.3, 10.1, and 10.2 allows local users to cause a denial of service (crash) or potentially gain privilege via a crafted Linux compatibility layer setgroups system call.
Freebsd Freebsd 10.2
Freebsd Freebsd 9.3
Freebsd Freebsd 10.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »