Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 6.3 vulnerabilities and exploits
(subscribe to this query)
614
VMScore
CVE-2008-5162
The arc4random function in the kernel in FreeBSD 6.3 up to and including 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for malicious users to predict the function's return values and conduct certain attacks ag...
Freebsd Freebsd 7.1
Freebsd Freebsd 6.3
Freebsd Freebsd 7.0
Freebsd Freebsd
632
VMScore
CVE-2008-3530
sys/netinet6/icmp6.c in the kernel in FreeBSD 6.3 up to and including 7.1, NetBSD 3.0 up to and including 4.0, and possibly other operating systems does not properly check the proposed new MTU in an ICMPv6 Packet Too Big Message, which allows remote malicious users to cause a den...
Freebsd Freebsd 6.3
Freebsd Freebsd 7.0
Freebsd Freebsd 7.1
695
VMScore
CVE-2009-3527
Race condition in the Pipe (IPC) close function in FreeBSD 6.3 and 6.4 allows local users to cause a denial of service (crash) or gain privileges via vectors related to kqueues, which triggers a use after free, leading to a NULL pointer dereference or memory corruption.
Freebsd Freebsd 6.3
Freebsd Freebsd 6.4
1 EDB exploit
641
VMScore
CVE-2008-3890
The kernel in FreeBSD 6.3 up to and including 7.0 on amd64 platforms can make an extra swapgs call after a General Protection Fault (GPF), which allows local users to gain privileges by triggering a GPF during the kernel's return from (1) an interrupt, (2) a trap, or (3) a s...
Freebsd Freebsd 6.3
Freebsd Freebsd 7.0
436
VMScore
CVE-2008-0777
The sendfile system call in FreeBSD 5.5 up to and including 7.0 does not check the access flags of the file descriptor used for sending a file, which allows local users to read the contents of write-only files.
Freebsd Freebsd 7.0
Freebsd Freebsd 6.2
Freebsd Freebsd 5.5
Freebsd Freebsd 6.3
495
VMScore
CVE-2009-1436
The db interface in libc in FreeBSD 6.3, 6.4, 7.0, 7.1, and 7.2-PRERELEASE does not properly initialize memory for Berkeley DB 1.85 database structures, which allows local users to obtain sensitive information by reading a database file.
Freebsd Freebsd 7.2
Freebsd Freebsd 7.1
Freebsd Freebsd 7.0
Freebsd Freebsd 6.3
Freebsd Freebsd 6.4
1 EDB exploit
1 Article
436
VMScore
CVE-2009-1935
Integer overflow in the pipe_build_write_buffer function (sys/kern/sys_pipe.c) in the direct write optimization feature in the pipe implementation in FreeBSD 7.1 up to and including 7.2 and 6.3 up to and including 6.4 allows local users to bypass virtual-to-physical address looku...
Freebsd Freebsd 7.1
Freebsd Freebsd 7.2
Freebsd Freebsd 6.4
Freebsd Freebsd 6.3
Freebsd Freebsd 6.3 Releng
320
VMScore
CVE-2009-2208
FreeBSD 6.3, 6.4, 7.1, and 7.2 does not enforce permissions on the SIOCSIFINFO_IN6 IOCTL, which allows local users to modify or disable IPv6 network interfaces, as demonstrated by modifying the MTU.
Freebsd Freebsd 6.3
Freebsd Freebsd 7.1
Freebsd Freebsd 6.4
Freebsd Freebsd 6.3 Releng
Freebsd Freebsd 7.2
725
VMScore
CVE-2008-5736
Multiple unspecified vulnerabilities in FreeBSD 6 prior to 6.4-STABLE, 6.3 prior to 6.3-RELEASE-p7, 6.4 prior to 6.4-RELEASE-p1, 7.0 prior to 7.0-RELEASE-p7, 7.1 prior to 7.1-RC2, and 7 prior to 7.1-PRERELEASE allow local users to gain privileges via unknown attack vectors relate...
Freebsd Freebsd 6.0
Freebsd Freebsd 6.3
Freebsd Freebsd 7.0
Freebsd Freebsd 7.1
Freebsd Freebsd 6.4
1 EDB exploit
187
VMScore
CVE-2008-0216
The ptsname function in FreeBSD 6.0 up to and including 7.0-PRERELEASE does not properly verify that a certain portion of a device name is associated with a pty of a user who is calling the pt_chown function, which might allow local users to read data from the pty from another us...
Freebsd Freebsd 6.1
Freebsd Freebsd 7.0
Freebsd Freebsd 6.0
Freebsd Freebsd 6.2
Freebsd Freebsd 6.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »