Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0916
FreeBSD 4.1.1 and previous versions, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote malicious users to spoof TCP connections.
Freebsd Freebsd 2.0
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.0
1 EDB exploit
NA
CVE-2000-1167
ppp utility in FreeBSD 4.1.1 and previous versions does not properly restrict access as specified by the "nat deny_incoming" command, which allows remote malicious users to connect to the target system.
Freebsd Freebsd 3.5
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
NA
CVE-2000-1184
telnetd in FreeBSD 4.2 and previous versions, and possibly other operating systems, allows remote malicious users to cause a denial of service by specifying an arbitrary large file in the TERMCAP environmental variable, which consumes resources as the server processes the file.
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.0
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
NA
CVE-2008-5736
Multiple unspecified vulnerabilities in FreeBSD 6 prior to 6.4-STABLE, 6.3 prior to 6.3-RELEASE-p7, 6.4 prior to 6.4-RELEASE-p1, 7.0 prior to 7.0-RELEASE-p7, 7.1 prior to 7.1-RC2, and 7 prior to 7.1-PRERELEASE allow local users to gain privileges via unknown attack vectors relate...
Freebsd Freebsd 6.0
Freebsd Freebsd 6.3
Freebsd Freebsd 7.0
Freebsd Freebsd 7.1
Freebsd Freebsd 6.4
1 EDB exploit
NA
CVE-2009-4358
freebsd-update in FreeBSD 8.0, 7.2, 7.1, 6.4, and 6.3 uses insecure permissions in its working directory (/var/db/freebsd-update by default), which allows local users to read copies of sensitive files after a (1) freebsd-update fetch (fetch) or (2) freebsd-update upgrade (upgrade...
Freebsd Freebsd 8.0
Freebsd Freebsd 7.2
Freebsd Freebsd 7.1
Freebsd Freebsd 6.4
Freebsd Freebsd 6.3
NA
CVE-2002-1125
FreeBSD port programs that use libkvm for FreeBSD 4.6.2-RELEASE and previous versions, including (1) asmon, (2) ascpu, (3) bubblemon, (4) wmmon, and (5) wmnet2, leave open file descriptors for /dev/mem and /dev/kmem, which allows local users to read kernel memory.
Freebsd Freebsd 4.5
Freebsd Freebsd 4.6
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Freebsd Freebsd 4.4
4 EDB exploits
NA
CVE-2014-3711
namei in FreeBSD 9.1 up to and including 10.1-RC2 allows remote malicious users to cause a denial of service (memory exhaustion) via vectors that trigger a sandboxed process to look up a large number of nonexistent path names.
Freebsd Freebsd 9.2
Freebsd Freebsd 10.1
Freebsd Freebsd 9.1
Freebsd Freebsd 9.3
Freebsd Freebsd 10.0
NA
CVE-2014-3954
Stack-based buffer overflow in rtsold in FreeBSD 9.1 up to and including 10.1-RC2 allows remote malicious users to cause a denial of service (crash) or possibly execute arbitrary code via crafted DNS parameters in a router advertisement message.
Freebsd Freebsd 9.2
Freebsd Freebsd 10.1
Freebsd Freebsd 9.1
Freebsd Freebsd 9.3
Freebsd Freebsd 10.0
NA
CVE-2009-2208
FreeBSD 6.3, 6.4, 7.1, and 7.2 does not enforce permissions on the SIOCSIFINFO_IN6 IOCTL, which allows local users to modify or disable IPv6 network interfaces, as demonstrated by modifying the MTU.
Freebsd Freebsd 6.3
Freebsd Freebsd 7.1
Freebsd Freebsd 6.4
Freebsd Freebsd 6.3 Releng
Freebsd Freebsd 7.2
NA
CVE-2010-2693
FreeBSD 7.1 up to and including 8.1-PRERELEASE does not copy the read-only flag when creating a duplicate mbuf buffer reference, which allows local users to cause a denial of service (system file corruption) and gain privileges via the sendfile system call.
Freebsd Freebsd 7.1
Freebsd Freebsd 7.2
Freebsd Freebsd 7.3
Freebsd Freebsd 8.0
Freebsd Freebsd 8.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »