Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 8.0 vulnerabilities and exploits
(subscribe to this query)
3.3
CVSSv2
CVE-2010-2022
jail.c in jail in FreeBSD 8.0 and 8.1-PRERELEASE, when the "-l -U root" options are omitted, does not properly restrict access to the current working directory, which might allow local users to read, modify, or create arbitrary files via standard filesystem operations.
Freebsd Freebsd 8.0
Freebsd Freebsd 8.1-prerelease
2.1
CVSSv2
CVE-2010-0119
Bournal prior to 1.4.1 on FreeBSD 8.0, when the -K option is used, places a ccrypt key on the command line, which allows local users to obtain sensitive information by listing the process and its arguments, related to "echoing."
Becauseinter Bournal 0.3
Becauseinter Bournal 0.1
Becauseinter Bournal 0.8
Becauseinter Bournal 1.3
Becauseinter Bournal 0.6
Becauseinter Bournal 0.7
Becauseinter Bournal 1.2
Becauseinter Bournal 0.2
Becauseinter Bournal 1.0
Becauseinter Bournal 0.9
Becauseinter Bournal
Becauseinter Bournal 0.4.5
Becauseinter Bournal 0.4
Becauseinter Bournal 1.1
6.9
CVSSv2
CVE-2010-0318
The replay functionality for ZFS Intent Log (ZIL) in FreeBSD 7.1, 7.2, and 8.0, when creating files during replay of a setattr transaction, uses 7777 permissions instead of the original permissions, which might allow local users to read or modify unauthorized files in opportunist...
Freebsd Freebsd 7.2
Freebsd Freebsd 7.1
Freebsd Freebsd 8.0
4.7
CVSSv2
CVE-2009-4358
freebsd-update in FreeBSD 8.0, 7.2, 7.1, 6.4, and 6.3 uses insecure permissions in its working directory (/var/db/freebsd-update by default), which allows local users to read copies of sensitive files after a (1) freebsd-update fetch (fetch) or (2) freebsd-update upgrade (upgrade...
Freebsd Freebsd 8.0
Freebsd Freebsd 7.2
Freebsd Freebsd 7.1
Freebsd Freebsd 6.4
Freebsd Freebsd 6.3
7.2
CVSSv2
CVE-2009-4147
The _rtld function in the Run-Time Link-Editor (rtld) in libexec/rtld-elf/rtld.c in FreeBSD 7.1 and 8.0 does not clear the (1) LD_LIBMAP, (2) LD_LIBRARY_PATH, (3) LD_LIBMAP_DISABLE, (4) LD_DEBUG, and (5) LD_ELF_HINTS_PATH environment variables, which allows local users to gain pr...
Freebsd Freebsd 7.1
Freebsd Freebsd 8.0
1 EDB exploit
7.2
CVSSv2
CVE-2009-4146
The _rtld function in the Run-Time Link-Editor (rtld) in libexec/rtld-elf/rtld.c in FreeBSD 7.1, 7.2, and 8.0 does not clear the LD_PRELOAD environment variable, which allows local users to gain privileges by executing a setuid or setguid program with a modified LD_PRELOAD variab...
Freebsd Freebsd 7.1
Freebsd Freebsd 7.2
Freebsd Freebsd 8.0
1 EDB exploit
4.3
CVSSv2
CVE-2009-3048
Opera prior to 10.00 on Linux, Solaris, and FreeBSD does not properly implement the "INPUT TYPE=file" functionality, which allows remote malicious users to trick a user into uploading an unintended file via vectors involving a "dropped file."
Opera Opera Browser 9.60
Opera Opera Browser 9.50
Opera Opera Browser 9.27
Opera Opera Browser 9.24
Opera Opera Browser 9.63
Opera Opera Browser 9.51
Opera Opera Browser 10.00
Opera Opera Browser
Opera Opera Browser 9.20
Opera Opera Browser 9.0
Opera Opera Browser 9.22
Opera Opera Browser 8.54
Opera Opera Browser 8.01
Opera Opera Browser 7.54
Opera Opera Browser 7.52
Opera Opera Browser 7.53
Opera Opera Browser 7.03
Opera Opera Browser 7.0
Opera Opera Browser 6.0
Opera Opera Browser 6.03
Opera Opera Browser 6.02
Opera Opera Browser 5.0
4.7
CVSSv2
CVE-2009-2649
The IATA (ata) driver in FreeBSD 6.0 and 8.0, when read access to /dev is available, allows local users to cause a denial of service (kernel panic) via a certain IOCTL request with a large count, which triggers a malloc call with a large value.
Freebsd Freebsd 6.0
Freebsd Freebsd 8.0
1 EDB exploit
10
CVSSv2
CVE-2009-1784
The AVG parsing engine 8.5 323, as used in multiple AVG anti-virus products including Anti-Virus Network Edition, Internet Security Netzwerk Edition, Server Edition für Linux/FreeBSD, Anti-Virus SBS Edition, and others allows remote malicious users to bypass malware detectio...
Avg Avg Anti-virus 7.1.308
Avg Avg Anti-virus 7.0.323
Avg Avg Anti-virus 7.5.51
Avg Avg Anti-virus 7.0.251
Avg Avg Anti-virus 7.0
Avg Avg Anti-virus 7.5.448
Avg Avg Anti-virus 7.1.407
Avg Avg Anti-virus 8.0
Avg Avg Anti-virus 7.5.476
Avg Avg Anti-virus 6.0.710
Avg Avg Anti-virus
7.1
CVSSv2
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0\\(16\\)sc3
Cisco Ios 12.2\\(3.4\\)bp
Cisco Ios 11.2xa
Cisco Ios 12.4\\(2\\)t2
Cisco Ios 12.3ym
Cisco Ios 11.3\\(11b\\)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0\\(21\\)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1\\(2\\)e1
Cisco Ios 12.1xg
Cisco Ios 12.1\\(19\\)ew
Cisco Ios 12.3\\(14\\)ym4
Cisco Ios 12.0\\(8\\)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2\\(7b\\)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3\\(10\\)
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »