Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 4.7 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1646
The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in the Shoichi Sakane KAME Project racoon, as used by NetBSD 1.6, 2.x prior to 20060119, certain FreeBSD releases, and possibly other distributions of BSD or Linux operating systems, when running in aggress...
Internet Key Exchange Internet Key Exchange 1
NA
CVE-2006-1283
opiepasswd in One-Time Passwords in Everything (OPIE) in FreeBSD 4.10-RELEASE-p22 up to and including 6.1-STABLE prior to 20060322 uses the getlogin function to determine the invoking user account, which might allow local users to configure OPIE access to the root account and pos...
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.2.1
Freebsd Freebsd 2.2.2
Freebsd Freebsd 3.0
Freebsd Freebsd 3.5.1
Freebsd Freebsd 3.5
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.10
Freebsd Freebsd 4.2
Freebsd Freebsd 4.4
Freebsd Freebsd 4.6.2
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Freebsd Freebsd 5.0
Freebsd Freebsd 5.1
Freebsd Freebsd 5.2
Freebsd Freebsd 5.4
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.1
Freebsd Freebsd 2.2
NA
CVE-2005-2068
FreeBSD 4.x up to and including 4.11 and 5.x up to and including 5.4 allows remote malicious users to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
Freebsd Freebsd 4.5
Freebsd Freebsd 4.6
Freebsd Freebsd 4.6.2
Freebsd Freebsd 4.7
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.10
Freebsd Freebsd 5.2
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.3
Freebsd Freebsd 5.4
Freebsd Freebsd 4.2
Freebsd Freebsd 4.4
Freebsd Freebsd 4.8
Freebsd Freebsd 5.0
Freebsd Freebsd 4.11
Freebsd Freebsd 4.3
Freebsd Freebsd 4.9
Freebsd Freebsd 5.1
NA
CVE-2005-0356
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote malicious users to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard late...
Cisco Interactive Voice Response
Cisco Ip Contact Center Enterprise
Cisco Personal Assistant 1.4\\(2\\)
Cisco Emergency Responder 1.1
Cisco Intelligent Contact Manager 5.0
Cisco Personal Assistant 1.3\\(3\\)
Cisco Personal Assistant 1.3\\(4\\)
Cisco Personal Assistant 1.4\\(1\\)
Cisco Secure Access Control Server 2.3
Cisco Secure Access Control Server 2.6
Cisco Secure Access Control Server 3.0
Cisco Secure Access Control Server 3.2\\(1.20\\)
Cisco Secure Access Control Server 3.2\\(2\\)
Cisco Agent Desktop
Cisco E-mail Manager
Cisco Personal Assistant 1.3\\(1\\)
Cisco Personal Assistant 1.3\\(2\\)
Cisco Secure Access Control Server 2.3.5.1
Cisco Secure Access Control Server 2.3.6.1
Cisco Secure Access Control Server 2.6.3
Cisco Secure Access Control Server 2.6.4
Cisco Secure Access Control Server 3.1.1
1 EDB exploit
NA
CVE-2005-1399
FreeBSD 4.6 to 4.11 and 5.x to 5.4 uses insecure default permissions for the /dev/iir device, which allows local users to execute restricted ioctl calls to read or modify data on hardware that is controlled by the iir driver.
Freebsd Freebsd 4.8
Freebsd Freebsd 4.9
Freebsd Freebsd 5.1
Freebsd Freebsd 5.2
Freebsd Freebsd 4.10
Freebsd Freebsd 4.6
Freebsd Freebsd 5.4
Freebsd Freebsd 4.11
Freebsd Freebsd 4.7
Freebsd Freebsd 5.3
NA
CVE-2005-1400
The i386_get_ldt system call in FreeBSD 4.7 to 4.11 and 5.x to 5.4 allows local users to access sensitive kernel memory via arguments with negative or very large values.
Freebsd Freebsd 4.11
Freebsd Freebsd 4.7
Freebsd Freebsd 4.8
Freebsd Freebsd 4.9
Freebsd Freebsd 4.10
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Freebsd Freebsd 5.2
Freebsd Freebsd 5.4
NA
CVE-2005-1406
The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.
Freebsd Freebsd 4.10
Freebsd Freebsd 4.11
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Freebsd Freebsd 5.1
Freebsd Freebsd 5.2
Freebsd Freebsd 4.4
Freebsd Freebsd 4.5
Freebsd Freebsd 5.3
Freebsd Freebsd 5.4
Freebsd Freebsd 4.8
Freebsd Freebsd 4.9
Freebsd Freebsd 4.1
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
NA
CVE-2005-0708
The sendfile system call in FreeBSD 4.8 up to and including 4.11 and 5 up to and including 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote malicious users to obtain sensitive information.
Dragonflybsd Dragonflybsd 1.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.10
Freebsd Freebsd 4.3
Freebsd Freebsd 4.5
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Freebsd Freebsd 4.8
Freebsd Freebsd 4.9
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Dragonflybsd Dragonflybsd 1.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 5.0
Freebsd Freebsd 5.2.1
Freebsd Freebsd 4.11
Freebsd Freebsd 4.2
Freebsd Freebsd 4.4
Freebsd Freebsd 5.4
Freebsd Freebsd 4.1
Freebsd Freebsd 4.6.2
Freebsd Freebsd 5.2
NA
CVE-2005-0988
Race condition in gzip 1.2.4, 1.3.3, and previous versions, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompressio...
Gnu Gzip 1.2.4
Gnu Gzip 1.2.4a
Gnu Gzip 1.3.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.11
Freebsd Freebsd 4.4
Freebsd Freebsd 4.5
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Freebsd Freebsd 4.9
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 3.0
Turbolinux Turbolinux Appliance Server 1.0 Hosting
Turbolinux Turbolinux Appliance Server 1.0 Workgroup
Ubuntu Ubuntu Linux 4.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.10
Freebsd Freebsd 4.3
Freebsd Freebsd 4.8
NA
CVE-2005-1126
The SIOCGIFCONF ioctl (ifconf function) in FreeBSD 4.x up to and including 4.11 and 5.x up to and including 5.4 does not properly clear a buffer before using it, which allows local users to obtain portions of sensitive kernel memory.
Freebsd Freebsd 4.0
Freebsd Freebsd 4.10
Freebsd Freebsd 4.3
Freebsd Freebsd 4.4
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Freebsd Freebsd 4.9
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.2
Freebsd Freebsd 4.6
Freebsd Freebsd 4.8
Freebsd Freebsd 5.0
Freebsd Freebsd 5.2
Freebsd Freebsd 5.2.1
Freebsd Freebsd 4.1
Freebsd Freebsd 4.11
Freebsd Freebsd 4.6.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »