Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 5.3 vulnerabilities and exploits
(subscribe to this query)
570
VMScore
CVE-2006-2654
Directory traversal vulnerability in smbfs smbfs on FreeBSD 4.10 up to 6.1 allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences. NOTE: this is similar to CVE-2006-1864, but this is a different implementation of smbfs, so it...
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 5.0
Freebsd Freebsd 5.1
Freebsd Freebsd 6.0
Freebsd Freebsd 5.2
570
VMScore
CVE-2006-2655
The build process for ypserv in FreeBSD 5.3 up to 6.1 accidentally disables access restrictions when using the /var/yp/securenets file, which allows remote malicious users to bypass intended access restrictions.
Freebsd Freebsd 5.4
Freebsd Freebsd 6.1
Freebsd Freebsd 5.3
Freebsd Freebsd 6.0
505
VMScore
CVE-2005-0356
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote malicious users to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard late...
Cisco Secure Access Control Server 3.2
Cisco Mgx 8230 1.2.11
Cisco Mgx 8250 1.2.10
Cisco Secure Access Control Server 3.2.2
Cisco Personal Assistant 1.3(2)
Cisco Unity Server 2.2
Cisco Secure Access Control Server 2.4
Cisco Secure Access Control Server 3.1.1
Cisco Personal Assistant 1.3(4)
Cisco Unity Server 3.0
Cisco Secure Access Control Server 2.6.3
Cisco Interactive Voice Response
Cisco Secure Access Control Server 2.42
Cisco Call Manager 3.0
Cisco Call Manager 3.1(3a)
Cisco Secure Access Control Server 3.3.2
Cisco Unity Server 3.1
Cisco Call Manager 1.0
Cisco Unity Server 3.3
Cisco Personal Assistant 1.3(3)
Cisco Secure Access Control Server 2.1
Cisco Secure Access Control Server 3.3(1)
1 EDB exploit
495
VMScore
CVE-2006-4178
Integer signedness error in the i386_set_ldt call in FreeBSD 5.5, and possibly earlier versions down to 5.2, allows local users to cause a denial of service (crash) via unspecified arguments that use negative signed integers to cause the bzero function to be called with a large l...
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 5.2
Freebsd Freebsd
1 EDB exploit
1 Github repository
465
VMScore
CVE-2002-1192
Multiple buffer overflows in rogue on NetBSD 1.6 and previous versions, FreeBSD 4.6, and possibly other operating systems, allows local users to gain "games" group privileges via malformed entries in a game save file.
Rogue Rogue 5.3
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
1 EDB exploit
445
VMScore
CVE-2006-0883
OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote malicious users to cause a denial of service (client connection refusal) by connecting multiple times to the SSH ...
Openbsd Openssh 3.8.1p1
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
445
VMScore
CVE-2006-0433
Selective Acknowledgement (SACK) in FreeBSD 5.3 and 5.4 does not properly handle an incoming selective acknowledgement when there is insufficient memory, which might allow remote malicious users to cause a denial of service (infinite loop).
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
445
VMScore
CVE-2006-0381
A logic error in the IP fragment cache functionality in pf in FreeBSD 5.3, 5.4, and 6.0, and OpenBSD, when a 'scrub fragment crop' or 'scrub fragment drop-ovl' rule is being used, allows remote malicious users to cause a denial of service (crash) via crafted p...
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 6.0
445
VMScore
CVE-2005-2359
The AES-XCBC-MAC algorithm in IPsec in FreeBSD 5.3 and 5.4, when used for authentication without other encryption, uses a constant key instead of the one that was assigned by the system administrator, which can allow remote malicious users to spoof packets to establish an IPsec s...
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
445
VMScore
CVE-2005-2068
FreeBSD 4.x up to and including 4.11 and 5.x up to and including 5.4 allows remote malicious users to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 4.11
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Freebsd Freebsd 4.1
Freebsd Freebsd 4.4
Freebsd Freebsd 5.1
Freebsd Freebsd 5.2
Freebsd Freebsd 4.8
Freebsd Freebsd 4.2
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.6
Freebsd Freebsd 4.3
Freebsd Freebsd 4.10
Freebsd Freebsd 5.0
Freebsd Freebsd 4.9
Freebsd Freebsd 4.6.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-0044
client side
CVE-2021-47601
deserialization
CVE-2024-34994
encryption
CVE-2021-47609
CVE-2024-37079
CVE-2024-38608
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »