Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 5.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-0381
A logic error in the IP fragment cache functionality in pf in FreeBSD 5.3, 5.4, and 6.0, and OpenBSD, when a 'scrub fragment crop' or 'scrub fragment drop-ovl' rule is being used, allows remote malicious users to cause a denial of service (crash) via crafted p...
Freebsd Freebsd 5.3
Freebsd Freebsd 6.0
Freebsd Freebsd 5.4
NA
CVE-2006-0379
FreeBSD kernel 5.4-STABLE and 6.0 does not completely initialize a buffer before making it available to userland, which could allow local users to read portions of kernel memory.
Freebsd Freebsd 5.4
Freebsd Freebsd 6.0
NA
CVE-2006-0433
Selective Acknowledgement (SACK) in FreeBSD 5.3 and 5.4 does not properly handle an incoming selective acknowledgement when there is insufficient memory, which might allow remote malicious users to cause a denial of service (infinite loop).
Freebsd Freebsd 5.3
Freebsd Freebsd 5.4
NA
CVE-2006-0380
A logic error in FreeBSD kernel 5.4-STABLE and 6.0 causes the kernel to calculate an incorrect buffer length, which causes more data to be copied to userland than intended, which could allow local users to read portions of kernel memory.
Freebsd Freebsd 5.4
Freebsd Freebsd 6.0
NA
CVE-2005-2359
The AES-XCBC-MAC algorithm in IPsec in FreeBSD 5.3 and 5.4, when used for authentication without other encryption, uses a constant key instead of the one that was assigned by the system administrator, which can allow remote malicious users to spoof packets to establish an IPsec s...
Freebsd Freebsd 5.3
Freebsd Freebsd 5.4
NA
CVE-2006-2655
The build process for ypserv in FreeBSD 5.3 up to 6.1 accidentally disables access restrictions when using the /var/yp/securenets file, which allows remote malicious users to bypass intended access restrictions.
Freebsd Freebsd 5.4
Freebsd Freebsd 6.1
Freebsd Freebsd 5.3
Freebsd Freebsd 6.0
NA
CVE-2006-4172
Integer overflow vulnerability in the i386_set_ldt call in FreeBSD 5.5, and possibly earlier versions down to 5.2, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2006-4178.
Freebsd Freebsd 5.2
Freebsd Freebsd 5.4
Freebsd Freebsd
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.3
1 Github repository
NA
CVE-2006-4178
Integer signedness error in the i386_set_ldt call in FreeBSD 5.5, and possibly earlier versions down to 5.2, allows local users to cause a denial of service (crash) via unspecified arguments that use negative signed integers to cause the bzero function to be called with a large l...
Freebsd Freebsd 5.4
Freebsd Freebsd
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.3
Freebsd Freebsd 5.2
1 EDB exploit
1 Github repository
NA
CVE-2005-2218
The device file system (devfs) in FreeBSD 5.x does not properly check parameters of the node type when creating a device node, which makes hidden devices available to attackers, who can then bypass restrictions on a jailed process.
Freebsd Freebsd 5.1
Freebsd Freebsd 5.0
Freebsd Freebsd 5.2
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
NA
CVE-2005-2019
ipfw in FreeBSD 5.4, when running on Symmetric Multi-Processor (SMP) or Uni Processor (UP) systems with the PREEMPTION kernel option enabled, does not sufficiently lock certain resources while performing table lookups, which can cause the cache results to be corrupted during mult...
Freebsd Freebsd 5.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »