Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 7.0 vulnerabilities and exploits
(subscribe to this query)
6.9
CVSSv2
CVE-2008-3531
Stack-based buffer overflow in sys/kern/vfs_mount.c in the kernel in FreeBSD 7.0 and 7.1, when vfs.usermount is enabled, allows local users to gain privileges via a crafted (1) mount or (2) nmount system call, related to copying of "user defined data" in "certain e...
Freebsd Freebsd 7.1
Freebsd Freebsd 7.0
1 EDB exploit
6.9
CVSSv2
CVE-2008-0217
The script program in FreeBSD 5.0 up to and including 7.0-PRERELEASE invokes openpty, which creates a pseudo-terminal with world-readable and world-writable permissions when it is not run as root, which allows local users to read data from the terminal of the user running script.
Freebsd Freebsd 6.0
Freebsd Freebsd 6.1
Freebsd Freebsd 6.2
Freebsd Freebsd 7.0
Freebsd Freebsd 5.0
Freebsd Freebsd 5.5
6.8
CVSSv2
CVE-2008-1147
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka "Algorithm X2"), as used in OpenBSD 2.6 up to and including 3.4, Mac OS X 10 up to and including 10.5.1, FreeBSD 4.4 up to and including 7.0, and DragonFlyBSD 1.0 up to an...
Cosmicperl Directory Pro 10.0.3
Darwin Darwin 1.0
Darwin Darwin 9.1
Navision Financials Server 3.0
5.8
CVSSv2
CVE-2020-25705
A flaw in ICMP packets in the Linux kernel may allow an malicious user to quickly scan open UDP ports. This flaw allows an off-path remote malicious user to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affe...
Linux Linux Kernel
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
1 Github repository
5.8
CVSSv2
CVE-2019-6111
An issue exists in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are...
Openbsd Openssh
Winscp Winscp
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.1
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Eus 8.4
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux Server Aus 8.6
Redhat Enterprise Linux Server Tus 8.6
Redhat Enterprise Linux Eus 8.6
Fedoraproject Fedora 30
Apache Mina Sshd 2.2.0
2 EDB exploits
3 Github repositories
1 Article
5.4
CVSSv2
CVE-2017-13084
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 16.04
Freebsd Freebsd 10
Freebsd Freebsd 10.4
Opensuse Leap 42.3
Opensuse Leap 42.2
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 14.04
Redhat Enterprise Linux Server 7
W1.fi Hostapd 2.3
W1.fi Hostapd 2.2
W1.fi Hostapd 0.6.9
W1.fi Hostapd 0.6.8
W1.fi Hostapd 0.4.10
W1.fi Hostapd 0.4.9
W1.fi Hostapd 0.4.8
W1.fi Hostapd 0.2.6
1 Article
5
CVSSv2
CVE-2019-11478
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fi...
Linux Linux Kernel
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Advanced Firewall Manager 15.0.0
F5 Big-ip Access Policy Manager
F5 Big-ip Access Policy Manager 15.0.0
F5 Big-ip Application Acceleration Manager
F5 Big-ip Application Acceleration Manager 15.0.0
F5 Big-ip Link Controller
F5 Big-ip Link Controller 15.0.0
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Policy Enforcement Manager 15.0.0
F5 Big-ip Webaccelerator
F5 Big-ip Webaccelerator 15.0.0
F5 Big-ip Application Security Manager
F5 Big-ip Application Security Manager 15.0.0
F5 Big-ip Local Traffic Manager
F5 Big-ip Local Traffic Manager 15.0.0
F5 Big-ip Fraud Protection Service
F5 Big-ip Fraud Protection Service 15.0.0
F5 Big-ip Global Traffic Manager
F5 Big-ip Global Traffic Manager 15.0.0
F5 Big-ip Analytics
4 Github repositories
1 Article
5
CVSSv2
CVE-2019-11479
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixe...
Linux Linux Kernel
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Access Policy Manager
F5 Big-ip Application Acceleration Manager
F5 Big-ip Link Controller
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Webaccelerator
F5 Big-ip Application Security Manager
F5 Big-ip Local Traffic Manager
F5 Big-ip Fraud Protection Service
F5 Big-ip Global Traffic Manager
F5 Big-ip Analytics
F5 Big-ip Edge Gateway
F5 Big-ip Domain Name System
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Redhat Enterprise Linux 7.0
F5 Enterprise Manager 3.1.1
F5 Traffix Signaling Delivery Controller
4 Github repositories
1 Article
4.9
CVSSv2
CVE-2013-6832
The nand_ioctl function in sys/dev/nand/nand_geom.c in the nand driver in the kernel in FreeBSD 10 and previous versions does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted ioctl call.
Freebsd Freebsd 8.3
Freebsd Freebsd 8.2
Freebsd Freebsd 6.4
Freebsd Freebsd 6.3
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.2
Freebsd Freebsd 4.6
Freebsd Freebsd 4.5
Freebsd Freebsd 4.0
Freebsd Freebsd 3.5.1
Freebsd Freebsd 2.2.8
Freebsd Freebsd 2.2.7
Freebsd Freebsd 2.2
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0
Freebsd Freebsd 1.0
Freebsd Freebsd 0.4 1
Freebsd Freebsd 9.0
Freebsd Freebsd 8.4
Freebsd Freebsd 7.2
Freebsd Freebsd 7.1
4.9
CVSSv2
CVE-2013-6833
The qls_eioctl function in sys/dev/qlxge/qls_ioctl.c in the kernel in FreeBSD 10 and previous versions does not validate a certain size parameter, which allows local users to obtain sensitive information from kernel memory via a crafted ioctl call.
Freebsd Freebsd 8.4
Freebsd Freebsd 8.3
Freebsd Freebsd 7.1
Freebsd Freebsd 7.0
Freebsd Freebsd 6.4
Freebsd Freebsd 5.3
Freebsd Freebsd 5.2.1
Freebsd Freebsd 4.6.2
Freebsd Freebsd 4.6
Freebsd Freebsd 4.1
Freebsd Freebsd 9.1
Freebsd Freebsd 9.0
Freebsd Freebsd 7.3
Freebsd Freebsd 7.2
Freebsd Freebsd 5.5
Freebsd Freebsd 5.4
Freebsd Freebsd 4.8
Freebsd Freebsd 4.7
Freebsd Freebsd 4.11
Freebsd Freebsd 4.10
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »