Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 3.5 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2001-0196
inetd ident server in FreeBSD 4.x and previous versions does not properly set group permissions, which allows remote malicious users to read the first 16 bytes of files that are accessible by the wheel group.
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.2
Freebsd Freebsd 3.5
7.2
CVSSv2
CVE-2000-0752
Buffer overflows in brouted in FreeBSD and possibly other OSes allows local users to gain root privileges via long command line arguments.
Freebsd Freebsd 4.0
Freebsd Freebsd 5.0
Freebsd Freebsd 3.5
Freebsd Freebsd 4.1
7.5
CVSSv2
CVE-2000-1167
ppp utility in FreeBSD 4.1.1 and previous versions does not properly restrict access as specified by the "nat deny_incoming" command, which allows remote malicious users to connect to the target system.
Freebsd Freebsd 3.5
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
7.2
CVSSv2
CVE-2000-0998
Format string vulnerability in top program allows local malicious users to gain root privileges via the "kill" or "renice" function.
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.5.1
Freebsd Freebsd 3.5
2 EDB exploits
1 Github repository
2.1
CVSSv2
CVE-2000-0729
FreeBSD 5.x, 4.x, and 3.x allows local users to cause a denial of service by executing a program with a malformed ELF image header.
Freebsd Freebsd 3.0
Freebsd Freebsd 3.1
Freebsd Freebsd 4.1
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 3.2
Freebsd Freebsd 3.3
Freebsd Freebsd 5.0
Freebsd Freebsd 4.0
7.2
CVSSv2
CVE-2000-0749
Buffer overflow in the Linux binary compatibility module in FreeBSD 3.x up to and including 5.x allows local users to gain root privileges via long filenames in the linux shadow file system.
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 3.2
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 3.0
Freebsd Freebsd 3.1
Freebsd Freebsd 5.0
7.5
CVSSv2
CVE-2001-0183
ipfw and ip6fw in FreeBSD 4.2 and previous versions allows remote malicious users to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection.
Freebsd Freebsd 3.5
Freebsd Freebsd 3.5.1
Freebsd Freebsd 3.0
Freebsd Freebsd 3.1
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.3
Freebsd Freebsd 3.4
Freebsd Freebsd 4.2
Freebsd Freebsd 4.0
1 EDB exploit
7.2
CVSSv2
CVE-2000-1011
Buffer overflow in catopen() function in FreeBSD 5.0 and previous versions, and possibly other OSes, allows local users to gain root privileges via a long environmental variable.
Freebsd Freebsd 3.0
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 3.1
Freebsd Freebsd 3.2
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.2
Freebsd Freebsd 3.3
Freebsd Freebsd 3.4
Freebsd Freebsd 5.0
Freebsd Freebsd 3.5
Freebsd Freebsd 3.5.1
7.2
CVSSv2
CVE-2000-1012
The catopen function in FreeBSD 5.0 and previous versions, and possibly other OSes, allows local users to read arbitrary files via the LANG environmental variable.
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.2
Freebsd Freebsd 3.3
Freebsd Freebsd 3.5
Freebsd Freebsd 3.0
Freebsd Freebsd 3.1
Freebsd Freebsd 3.2
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5.1
Freebsd Freebsd 5.0
7.2
CVSSv2
CVE-2000-1013
The setlocale function in FreeBSD 5.0 and previous versions, and possibly other OSes, allows local users to read arbitrary files via the LANG environmental variable.
Freebsd Freebsd 4.2
Freebsd Freebsd 5.0
Freebsd Freebsd 3.1
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.1
Freebsd Freebsd 3.2
Freebsd Freebsd 3.3
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 3.0
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »