Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 5.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-0381
A logic error in the IP fragment cache functionality in pf in FreeBSD 5.3, 5.4, and 6.0, and OpenBSD, when a 'scrub fragment crop' or 'scrub fragment drop-ovl' rule is being used, allows remote malicious users to cause a denial of service (crash) via crafted p...
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 6.0
NA
CVE-2006-0055
The ispell_op function in ee on FreeBSD 4.10 to 6.0 uses predictable filenames and does not confirm which file is being written, which allows local users to overwrite arbitrary files via a symlink attack when ee invokes ispell.
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 5.1
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.0
Freebsd Freebsd 4.10
Freebsd Freebsd 4.11
Freebsd Freebsd 5.2
Freebsd Freebsd 6.0
NA
CVE-2005-2359
The AES-XCBC-MAC algorithm in IPsec in FreeBSD 5.3 and 5.4, when used for authentication without other encryption, uses a constant key instead of the one that was assigned by the system administrator, which can allow remote malicious users to spoof packets to establish an IPsec s...
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
NA
CVE-2005-2218
The device file system (devfs) in FreeBSD 5.x does not properly check parameters of the node type when creating a device node, which makes hidden devices available to attackers, who can then bypass restrictions on a jailed process.
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 5.1
Freebsd Freebsd 5.0
Freebsd Freebsd 5.2
NA
CVE-2005-2068
FreeBSD 4.x up to and including 4.11 and 5.x up to and including 5.4 allows remote malicious users to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 4.11
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Freebsd Freebsd 4.1
Freebsd Freebsd 4.4
Freebsd Freebsd 5.1
Freebsd Freebsd 5.2
Freebsd Freebsd 4.8
Freebsd Freebsd 4.2
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.6
Freebsd Freebsd 4.3
Freebsd Freebsd 4.10
Freebsd Freebsd 5.0
Freebsd Freebsd 4.9
Freebsd Freebsd 4.6.2
NA
CVE-2005-0356
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote malicious users to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard late...
Cisco Secure Access Control Server 3.2
Cisco Mgx 8230 1.2.11
Cisco Mgx 8250 1.2.10
Cisco Secure Access Control Server 3.2.2
Cisco Personal Assistant 1.3(2)
Cisco Unity Server 2.2
Cisco Secure Access Control Server 2.4
Cisco Secure Access Control Server 3.1.1
Cisco Personal Assistant 1.3(4)
Cisco Unity Server 3.0
Cisco Secure Access Control Server 2.6.3
Cisco Interactive Voice Response
Cisco Secure Access Control Server 2.42
Cisco Call Manager 3.0
Cisco Call Manager 3.1(3a)
Cisco Secure Access Control Server 3.3.2
Cisco Unity Server 3.1
Cisco Call Manager 1.0
Cisco Unity Server 3.3
Cisco Personal Assistant 1.3(3)
Cisco Secure Access Control Server 2.1
Cisco Secure Access Control Server 3.3(1)
1 EDB exploit
NA
CVE-2005-1400
The i386_get_ldt system call in FreeBSD 4.7 to 4.11 and 5.x to 5.4 allows local users to access sensitive kernel memory via arguments with negative or very large values.
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 4.11
Freebsd Freebsd 4.7
Freebsd Freebsd 5.1
Freebsd Freebsd 5.2
Freebsd Freebsd 4.8
Freebsd Freebsd 4.10
Freebsd Freebsd 4.9
NA
CVE-2005-1399
FreeBSD 4.6 to 4.11 and 5.x to 5.4 uses insecure default permissions for the /dev/iir device, which allows local users to execute restricted ioctl calls to read or modify data on hardware that is controlled by the iir driver.
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 4.11
Freebsd Freebsd 4.7
Freebsd Freebsd 5.1
Freebsd Freebsd 5.2
Freebsd Freebsd 4.8
Freebsd Freebsd 4.6
Freebsd Freebsd 4.10
Freebsd Freebsd 4.9
NA
CVE-2005-1406
The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 4.11
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Freebsd Freebsd 4.1
Freebsd Freebsd 4.4
Freebsd Freebsd 5.1
Freebsd Freebsd 5.2
Freebsd Freebsd 4.8
Freebsd Freebsd 4.2
Freebsd Freebsd 4.6
Freebsd Freebsd 4.3
Freebsd Freebsd 4.10
Freebsd Freebsd 4.9
NA
CVE-2005-0708
The sendfile system call in FreeBSD 4.8 up to and including 4.11 and 5 up to and including 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote malicious users to obtain sensitive information.
Freebsd Freebsd 4.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.6
Freebsd Freebsd 5.3
Freebsd Freebsd 5.1
Freebsd Freebsd 4.4
Freebsd Freebsd 4.8
Freebsd Freebsd 4.7
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.0
Freebsd Freebsd 4.5
Freebsd Freebsd 4.10
Freebsd Freebsd 4.2
Freebsd Freebsd 4.1
Dragonflybsd Dragonflybsd 1.0
Freebsd Freebsd 4.9
Freebsd Freebsd 5.2
Freebsd Freebsd 5.4
Freebsd Freebsd 4.0
Dragonflybsd Dragonflybsd 1.1
Freebsd Freebsd 4.6.2
Freebsd Freebsd 4.11
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »