Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 12.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-6534
In versions of FreeBSD 14.0-RELEASE prior to 14-RELEASE-p2, FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. This could allow a malicious actor to execute a denial-...
Freebsd Freebsd 12.4
Freebsd Freebsd 13.2
Freebsd Freebsd 14.0
NA
CVE-2023-5941
In versions of FreeBSD 12.4-RELEASE before 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE before 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write(2) system call returns an er...
Freebsd Freebsd 12.4
Freebsd Freebsd
Freebsd Freebsd 13.2
NA
CVE-2023-5368
On an msdosfs filesystem, the 'truncate' or 'ftruncate' system calls under certain circumstances populate the additional space in the file with unallocated data from the underlying disk device, rather than zero bytes. This may permit a user with write access t...
Freebsd Freebsd 12.4
Freebsd Freebsd
Freebsd Freebsd 13.2
NA
CVE-2023-4809
In pf packet processing with a 'scrub fragment reassemble' rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recognized as the correct ul...
Freebsd Freebsd 12.4
Freebsd Freebsd
Freebsd Freebsd 13.2
NA
CVE-2023-3107
A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an malicious user to trigger a kernel panic, resulting in a denial of service.
Freebsd Freebsd 12.4
Freebsd Freebsd 13.1
Freebsd Freebsd 13.2
Netapp Clustered Data Ontap 9.0
NA
CVE-2023-3326
pam_krb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. However, if a keytab is not provisioned on the system, pam_krb5 ...
Freebsd Freebsd 12.4
Freebsd Freebsd 13.1
Freebsd Freebsd
Freebsd Freebsd 13.2
NA
CVE-2023-0751
When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the mas...
Freebsd Freebsd 12.4
Freebsd Freebsd 13.1
Freebsd Freebsd 12.3
632
VMScore
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0\\(16\\)sc3
Cisco Ios 12.2\\(3.4\\)bp
Cisco Ios 11.2xa
Cisco Ios 12.4\\(2\\)t2
Cisco Ios 12.3ym
Cisco Ios 11.3\\(11b\\)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0\\(21\\)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1\\(2\\)e1
Cisco Ios 12.1xg
Cisco Ios 12.1\\(19\\)ew
Cisco Ios 12.3\\(14\\)ym4
Cisco Ios 12.0\\(8\\)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2\\(7b\\)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3\\(10\\)
1 Github repository
445
VMScore
CVE-2006-1646
The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in the Shoichi Sakane KAME Project racoon, as used by NetBSD 1.6, 2.x prior to 20060119, certain FreeBSD releases, and possibly other distributions of BSD or Linux operating systems, when running in aggress...
Internet Key Exchange Internet Key Exchange 1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started