Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd - vulnerabilities and exploits
(subscribe to this query)
495
VMScore
CVE-2009-1436
The db interface in libc in FreeBSD 6.3, 6.4, 7.0, 7.1, and 7.2-PRERELEASE does not properly initialize memory for Berkeley DB 1.85 database structures, which allows local users to obtain sensitive information by reading a database file.
Freebsd Freebsd 7.2
Freebsd Freebsd 7.1
Freebsd Freebsd 7.0
Freebsd Freebsd 6.3
Freebsd Freebsd 6.4
1 EDB exploit
1 Article
445
VMScore
CVE-2014-3711
namei in FreeBSD 9.1 up to and including 10.1-RC2 allows remote malicious users to cause a denial of service (memory exhaustion) via vectors that trigger a sandboxed process to look up a large number of nonexistent path names.
Freebsd Freebsd 9.2
Freebsd Freebsd 10.1
Freebsd Freebsd 9.1
Freebsd Freebsd 9.3
Freebsd Freebsd 10.0
755
VMScore
CVE-2000-0916
FreeBSD 4.1.1 and previous versions, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote malicious users to spoof TCP connections.
Freebsd Freebsd 2.0
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.0
1 EDB exploit
445
VMScore
CVE-2016-1888
The telnetd service in FreeBSD 9.3, 10.1, 10.2, 10.3, and 11.0 allows remote malicious users to inject arguments to login and bypass authentication via vectors involving a "sequence of memory allocation failures."
Freebsd Freebsd 10.2
Freebsd Freebsd 9.3
Freebsd Freebsd 11.0
Freebsd Freebsd 10.1
Freebsd Freebsd 10.3
187
VMScore
CVE-2008-0216
The ptsname function in FreeBSD 6.0 up to and including 7.0-PRERELEASE does not properly verify that a certain portion of a device name is associated with a pty of a user who is calling the pt_chown function, which might allow local users to read data from the pty from another us...
Freebsd Freebsd 6.1
Freebsd Freebsd 7.0
Freebsd Freebsd 6.0
Freebsd Freebsd 6.2
Freebsd Freebsd 6.3
668
VMScore
CVE-2000-1167
ppp utility in FreeBSD 4.1.1 and previous versions does not properly restrict access as specified by the "nat deny_incoming" command, which allows remote malicious users to connect to the target system.
Freebsd Freebsd 3.5
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
445
VMScore
CVE-2000-1184
telnetd in FreeBSD 4.2 and previous versions, and possibly other operating systems, allows remote malicious users to cause a denial of service by specifying an arbitrary large file in the TERMCAP environmental variable, which consumes resources as the server processes the file.
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.0
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
668
VMScore
CVE-2016-6559
Improper bounds checking of the obuf variable in the link_ntoa() function in linkaddr.c of the BSD libc library may allow an malicious user to read or write from memory. The full impact and severity depends on the method of exploit and how the library is used by applications. Acc...
Freebsd Freebsd 10.1
Freebsd Freebsd 10.3
Freebsd Freebsd 11.0
Freebsd Freebsd 9.3
Freebsd Freebsd 10.2
436
VMScore
CVE-2009-1935
Integer overflow in the pipe_build_write_buffer function (sys/kern/sys_pipe.c) in the direct write optimization feature in the pipe implementation in FreeBSD 7.1 up to and including 7.2 and 6.3 up to and including 6.4 allows local users to bypass virtual-to-physical address looku...
Freebsd Freebsd 7.1
Freebsd Freebsd 7.2
Freebsd Freebsd 6.4
Freebsd Freebsd 6.3
Freebsd Freebsd 6.3 Releng
641
VMScore
CVE-2000-0235
Buffer overflow in the huh program in the orville-write package allows local users to gain root privileges.
Freebsd Freebsd 3.0
Freebsd Freebsd 3.3
Freebsd Freebsd 3.4
Freebsd Freebsd 3.1
Freebsd Freebsd 3.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »