Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 5.3 vulnerabilities and exploits
(subscribe to this query)
6.6
CVSSv2
CVE-2007-0166
The jail rc.d script in FreeBSD 5.3 up to 6.2 does not verify pathnames when writing to /var/log/console.log during a jail start-up, or when file systems are mounted or unmounted, which allows local root users to overwrite arbitrary files, or mount/unmount files, outside of the j...
Freebsd Freebsd 5.3
Freebsd Freebsd
5
CVSSv2
CVE-2006-0381
A logic error in the IP fragment cache functionality in pf in FreeBSD 5.3, 5.4, and 6.0, and OpenBSD, when a 'scrub fragment crop' or 'scrub fragment drop-ovl' rule is being used, allows remote malicious users to cause a denial of service (crash) via crafted p...
Freebsd Freebsd 5.3
Freebsd Freebsd 6.0
Freebsd Freebsd 5.4
5
CVSSv2
CVE-2006-0433
Selective Acknowledgement (SACK) in FreeBSD 5.3 and 5.4 does not properly handle an incoming selective acknowledgement when there is insufficient memory, which might allow remote malicious users to cause a denial of service (infinite loop).
Freebsd Freebsd 5.3
Freebsd Freebsd 5.4
5
CVSSv2
CVE-2005-2359
The AES-XCBC-MAC algorithm in IPsec in FreeBSD 5.3 and 5.4, when used for authentication without other encryption, uses a constant key instead of the one that was assigned by the system administrator, which can allow remote malicious users to spoof packets to establish an IPsec s...
Freebsd Freebsd 5.3
Freebsd Freebsd 5.4
6.4
CVSSv2
CVE-2006-2655
The build process for ypserv in FreeBSD 5.3 up to 6.1 accidentally disables access restrictions when using the /var/yp/securenets file, which allows remote malicious users to bypass intended access restrictions.
Freebsd Freebsd 5.4
Freebsd Freebsd 6.1
Freebsd Freebsd 5.3
Freebsd Freebsd 6.0
7.2
CVSSv2
CVE-2006-4172
Integer overflow vulnerability in the i386_set_ldt call in FreeBSD 5.5, and possibly earlier versions down to 5.2, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2006-4178.
Freebsd Freebsd 5.2
Freebsd Freebsd 5.4
Freebsd Freebsd
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.3
1 Github repository
4.9
CVSSv2
CVE-2006-4178
Integer signedness error in the i386_set_ldt call in FreeBSD 5.5, and possibly earlier versions down to 5.2, allows local users to cause a denial of service (crash) via unspecified arguments that use negative signed integers to cause the bzero function to be called with a large l...
Freebsd Freebsd 5.4
Freebsd Freebsd
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.3
Freebsd Freebsd 5.2
1 EDB exploit
1 Github repository
7.2
CVSSv2
CVE-2005-2218
The device file system (devfs) in FreeBSD 5.x does not properly check parameters of the node type when creating a device node, which makes hidden devices available to attackers, who can then bypass restrictions on a jailed process.
Freebsd Freebsd 5.1
Freebsd Freebsd 5.0
Freebsd Freebsd 5.2
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
6.4
CVSSv2
CVE-2006-2654
Directory traversal vulnerability in smbfs smbfs on FreeBSD 4.10 up to 6.1 allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences. NOTE: this is similar to CVE-2006-1864, but this is a different implementation of smbfs, so it...
Freebsd Freebsd 5.0
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Freebsd Freebsd 6.0
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.4
Freebsd Freebsd 5.2
5
CVSSv2
CVE-2006-0883
OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote malicious users to cause a denial of service (client connection refusal) by connecting multiple times to the SSH ...
Openbsd Openssh 3.8.1p1
Freebsd Freebsd 5.3
Freebsd Freebsd 5.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »