Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 10.3 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2017-1081
In FreeBSD prior to 11.0-STABLE, 11.0-RELEASE-p10, 10.3-STABLE, and 10.3-RELEASE-p19, ipfilter using "keep state" or "keep frags" options can cause a kernel panic when fed specially crafted packet fragments due to incorrect memory handling.
Freebsd Freebsd 10.3
Freebsd Freebsd 11.0
Freebsd Freebsd
9.8
CVSSv3
CVE-2018-6916
In FreeBSD prior to 11.1-STABLE, 11.1-RELEASE-p7, 10.4-STABLE, 10.4-RELEASE-p7, and 10.3-RELEASE-p28, the kernel does not properly validate IPsec packets coming from a trusted host. Additionally, a use-after-free vulnerability exists in the IPsec AH handling code. This issue coul...
Freebsd Freebsd 10.4
Freebsd Freebsd 10.3
Freebsd Freebsd
7.8
CVSSv3
CVE-2016-1887
Integer signedness error in the sockargs function in sys/kern/uipc_syscalls.c in FreeBSD 10.1 before p34, 10.2 before p17, and 10.3 before p3 allows local users to cause a denial of service (memory overwrite and kernel panic) or gain privileges via a negative buflen argument, whi...
Freebsd Freebsd 10.3
Freebsd Freebsd 10.2
Freebsd Freebsd 10.1
1 EDB exploit
7.8
CVSSv3
CVE-2016-1886
Integer signedness error in the genkbd_commonioctl function in sys/dev/kbd/kbd.c in FreeBSD 9.3 before p42, 10.1 before p34, 10.2 before p17, and 10.3 before p3 allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory overwrite and ...
Freebsd Freebsd 10.3
Freebsd Freebsd 10.2
Freebsd Freebsd 9.3
Freebsd Freebsd 10.1
1 EDB exploit
7.8
CVSSv3
CVE-2016-1889
Integer overflow in the bhyve hypervisor in FreeBSD 10.1, 10.2, 10.3, and 11.0 when configured with a large amount of guest memory, allows local users to gain privilege via a crafted device descriptor.
Freebsd Freebsd 11.0
Freebsd Freebsd 10.3
Freebsd Freebsd 10.2
Freebsd Freebsd 10.1
9.8
CVSSv3
CVE-2016-6559
Improper bounds checking of the obuf variable in the link_ntoa() function in linkaddr.c of the BSD libc library may allow an malicious user to read or write from memory. The full impact and severity depends on the method of exploit and how the library is used by applications. Acc...
Freebsd Freebsd 11.0
Freebsd Freebsd 10.3
Freebsd Freebsd 10.2
Freebsd Freebsd 9.3
Freebsd Freebsd 10.1
7.5
CVSSv3
CVE-2016-1888
The telnetd service in FreeBSD 9.3, 10.1, 10.2, 10.3, and 11.0 allows remote malicious users to inject arguments to login and bypass authentication via vectors involving a "sequence of memory allocation failures."
Freebsd Freebsd 11.0
Freebsd Freebsd 10.3
Freebsd Freebsd 10.2
Freebsd Freebsd 9.3
Freebsd Freebsd 10.1
9.8
CVSSv3
CVE-2018-7183
Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 up to and including 4.2.8p10 allows remote malicious users to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.
Ntp Ntp 4.2.8
Freebsd Freebsd 10.3
Freebsd Freebsd 11.1
Freebsd Freebsd 10.4
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 18.04
Netapp Element Software -
1 Article
7.5
CVSSv3
CVE-2018-6919
In FreeBSD prior to 11.1-STABLE, 11.1-RELEASE-p9, 10.4-STABLE, 10.4-RELEASE-p8 and 10.3-RELEASE-p28, due to insufficient initialization of memory copied to userland, small amounts of kernel memory may be disclosed to userland processes. Unprivileged users may be able to access sm...
Freebsd Freebsd
7.5
CVSSv3
CVE-2018-6917
In FreeBSD prior to 11.1-STABLE, 11.1-RELEASE-p9, 10.4-STABLE, 10.4-RELEASE-p8 and 10.3-RELEASE-p28, insufficient validation of user-provided font parameters can result in an integer overflow, leading to the use of arbitrary kernel memory as glyph data. Unprivileged users may be ...
Freebsd Freebsd
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »