Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 4.11 vulnerabilities and exploits
(subscribe to this query)
898
VMScore
CVE-2006-4304
Buffer overflow in the sppp driver in FreeBSD 4.11 up to and including 6.1, NetBSD 2.0 up to and including 4.0 beta prior to 20060823, and OpenBSD 3.8 and 3.9 prior to 20060902 allows remote malicious users to cause a denial of service (panic), obtain sensitive information, and p...
Freebsd Freebsd 6.1
Openbsd Openbsd 3.8
Freebsd Freebsd 5.5
Freebsd Freebsd 5.4
Netbsd Netbsd 4.0
Freebsd Freebsd 5.3
Freebsd Freebsd 4.11
Openbsd Openbsd 3.9
Freebsd Freebsd 6.0
Netbsd Netbsd 3.0
Netbsd Netbsd 2.0
25 Github repositories
890
VMScore
CVE-2005-0708
The sendfile system call in FreeBSD 4.8 up to and including 4.11 and 5 up to and including 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote malicious users to obtain sensitive information.
Freebsd Freebsd 4.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.6
Freebsd Freebsd 5.3
Freebsd Freebsd 5.1
Freebsd Freebsd 4.4
Freebsd Freebsd 4.8
Freebsd Freebsd 4.7
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.0
Freebsd Freebsd 4.5
Freebsd Freebsd 4.10
Freebsd Freebsd 4.2
Freebsd Freebsd 4.1
Dragonflybsd Dragonflybsd 1.0
Freebsd Freebsd 4.9
Freebsd Freebsd 5.2
Freebsd Freebsd 5.4
Freebsd Freebsd 4.0
Dragonflybsd Dragonflybsd 1.1
Freebsd Freebsd 4.6.2
Freebsd Freebsd 4.11
694
VMScore
CVE-2018-6923
In FreeBSD prior to 11.1-STABLE, 11.2-RELEASE-p2, 11.1-RELEASE-p13, ip fragment reassembly code is vulnerable to a denial of service due to excessive system resource consumption. This issue can allow a remote attacker who is able to send an arbitrary ip fragments to cause the mac...
Freebsd Freebsd 10.0
Freebsd Freebsd 7.4
Freebsd Freebsd 6.1
Freebsd Freebsd 11.0
Freebsd Freebsd 6.4
Freebsd Freebsd 6.3
Freebsd Freebsd 5.5
Freebsd Freebsd 8.2
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 4.11
Freebsd Freebsd 8.0
Freebsd Freebsd 9.0
Freebsd Freebsd 9.1
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Freebsd Freebsd 7.0
Freebsd Freebsd 9.2
Freebsd Freebsd 9.3
Freebsd Freebsd 6.0
Freebsd Freebsd 4.4
Freebsd Freebsd 5.1
668
VMScore
CVE-2006-0905
A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE up to and including 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows remote ma...
Freebsd Freebsd 4.8
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 5.1
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.0
Freebsd Freebsd 4.10
Freebsd Freebsd 4.11
Freebsd Freebsd 4.9
Freebsd Freebsd 5.2
Freebsd Freebsd 6.0
Netbsd Netbsd 3.0
Netbsd Netbsd 2.0
641
VMScore
CVE-2006-1283
opiepasswd in One-Time Passwords in Everything (OPIE) in FreeBSD 4.10-RELEASE-p22 up to and including 6.1-STABLE prior to 20060322 uses the getlogin function to determine the invoking user account, which might allow local users to configure OPIE access to the root account and pos...
Freebsd Freebsd 4.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.6
Freebsd Freebsd 4.8
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 3.1
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Freebsd Freebsd 5.1
Freebsd Freebsd 4.4
Freebsd Freebsd 2.2.2
Freebsd Freebsd 4.7
Freebsd Freebsd 5.2.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 5.0
Freebsd Freebsd 3.5
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.0.5
Freebsd Freebsd 4.5
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 4.10
641
VMScore
CVE-2005-0610
Multiple symlink vulnerabilities in portupgrade prior to 20041226_2 in FreeBSD allow local users to (1) overwrite arbitrary files and possibly replace packages to execute arbitrary code via pkg_fetch, (2) overwrite arbitrary files via temporary files when portupgrade upgrades a p...
Freebsd Freebsd 4.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.6
Freebsd Freebsd 5.3
Freebsd Freebsd 5.1
Freebsd Freebsd 4.4
Freebsd Freebsd 4.8
Freebsd Freebsd 4.7
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.0
Freebsd Freebsd 4.5
Freebsd Freebsd 4.10
Freebsd Freebsd 4.2
Freebsd Freebsd 4.1
Freebsd Freebsd 4.9
Freebsd Freebsd 5.2
Freebsd Freebsd 5.4
Freebsd Freebsd 4.0
Freebsd Freebsd 4.6.2
Freebsd Freebsd 4.11
632
VMScore
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0(16)sc3
Cisco Ios 12.2(3.4)bp
Cisco Ios 11.2xa
Cisco Ios 12.4(2)t2
Cisco Ios 12.3ym
Cisco Ios 11.3(11b)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0(21)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1(2)e1
Cisco Ios 12.1xg
Cisco Ios 12.1(19)ew
Cisco Ios 12.3(14)ym4
Cisco Ios 12.0(8)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2(7b)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3(10)
1 Github repository
505
VMScore
CVE-2005-0356
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote malicious users to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard late...
Cisco Secure Access Control Server 3.2
Cisco Mgx 8230 1.2.11
Cisco Mgx 8250 1.2.10
Cisco Secure Access Control Server 3.2.2
Cisco Personal Assistant 1.3(2)
Cisco Unity Server 2.2
Cisco Secure Access Control Server 2.4
Cisco Secure Access Control Server 3.1.1
Cisco Personal Assistant 1.3(4)
Cisco Unity Server 3.0
Cisco Secure Access Control Server 2.6.3
Cisco Interactive Voice Response
Cisco Secure Access Control Server 2.42
Cisco Call Manager 3.0
Cisco Call Manager 3.1(3a)
Cisco Secure Access Control Server 3.3.2
Cisco Unity Server 3.1
Cisco Call Manager 1.0
Cisco Unity Server 3.3
Cisco Personal Assistant 1.3(3)
Cisco Secure Access Control Server 2.1
Cisco Secure Access Control Server 3.3(1)
1 EDB exploit
445
VMScore
CVE-2005-2068
FreeBSD 4.x up to and including 4.11 and 5.x up to and including 5.4 allows remote malicious users to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 4.11
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Freebsd Freebsd 4.1
Freebsd Freebsd 4.4
Freebsd Freebsd 5.1
Freebsd Freebsd 5.2
Freebsd Freebsd 4.8
Freebsd Freebsd 4.2
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.6
Freebsd Freebsd 4.3
Freebsd Freebsd 4.10
Freebsd Freebsd 5.0
Freebsd Freebsd 4.9
Freebsd Freebsd 4.6.2
436
VMScore
CVE-2013-6834
The ql_eioctl function in sys/dev/qlxgbe/ql_ioctl.c in the kernel in FreeBSD 10 and previous versions does not validate a certain size parameter, which allows local users to obtain sensitive information from kernel memory via a crafted ioctl call.
Freebsd Freebsd 5.2.1
Freebsd Freebsd 7.4
Freebsd Freebsd 6.1
Freebsd Freebsd 3.1
Freebsd Freebsd 6.4
Freebsd Freebsd 6.3
Freebsd Freebsd 2.2.5
Freebsd Freebsd 5.5
Freebsd Freebsd 8.2
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 2.2.2
Freebsd Freebsd 2.1.7
Freebsd Freebsd 4.11
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.0.5
Freebsd Freebsd 8.0
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 9.0
Freebsd Freebsd 9.1
Freebsd Freebsd 4.5
Freebsd Freebsd 3.5.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »