This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Freebsd First view 1990-05-09
Product Freebsd Last view 2020-09-03
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:* 101
cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:* 99
cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:* 97
cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:* 95
cpe:2.3:o:freebsd:freebsd:4.3:-:*:*:*:*:*:* 91
cpe:2.3:o:freebsd:freebsd:4.4:-:*:*:*:*:*:* 88
cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:* 87
cpe:2.3:o:freebsd:freebsd:3.3:-:*:*:*:*:*:* 87
cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:* 86
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* 85
cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:* 84
cpe:2.3:o:freebsd:freebsd:5.0:-:*:*:*:*:*:* 84
cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:* 83
cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:* 82
cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:* 81
cpe:2.3:o:freebsd:freebsd:4.5:-:*:*:*:*:*:* 81
cpe:2.3:o:freebsd:freebsd:4.6:-:*:*:*:*:*:* 81
cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:* 80
cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:* 79
cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:* 78
cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:* 78
cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:* 78
cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:* 75
cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:* 75
cpe:2.3:o:freebsd:freebsd:4.7:-:*:*:*:*:*:* 75
cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:* 73
cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:* 73
cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:* 73
cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:* 73
cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:* 72
cpe:2.3:o:freebsd:freebsd:4.8:-:*:*:*:*:*:* 72
cpe:2.3:o:freebsd:freebsd:5.1:-:*:*:*:*:*:* 72
cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:* 71
cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:* 71
cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:* 71
cpe:2.3:o:freebsd:freebsd:5.2:-:*:*:*:*:*:* 71
cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:* 70
cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:* 70
cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:* 70
cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:* 70
cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:* 70
cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:* 69
cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:* 69
cpe:2.3:o:freebsd:freebsd:4.9:-:*:*:*:*:*:* 69
cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:* 68
cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:* 67
cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:* 66
cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:* 66
cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:* 66
cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:* 66

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.5 2020-09-03 CVE-2020-24863

A memory corruption vulnerability was found in the kernel function kern_getfsstat in MidnightBSD before 1.2.7 and 1.3 through 2020-08-19, and FreeBSD through 11.4, that allows an attacker to trigger an invalid free and crash the system via a crafted size value in conjunction with an invalid mode.

5.5 2020-09-03 CVE-2020-24385

In MidnightBSD before 1.2.6 and 1.3 before August 2020, and FreeBSD before 7, a NULL pointer dereference was found in the Linux emulation layer that allows attackers to crash the running kernel. During binary interaction, td->td_emuldata in sys/compat/linux/linux_emul.h is not getting initialized and returns NULL from em_find().

7 2020-08-06 CVE-2020-7460

In FreeBSD 12.1-STABLE before r363918, 12.1-RELEASE before p8, 11.4-STABLE before r363919, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, the sendmsg system call in the compat32 subsystem on 64-bit platforms has a time-of-check to time-of-use vulnerability allowing a mailcious userspace program to modify control message headers after they were validation.

6.8 2020-08-06 CVE-2020-7459

In FreeBSD 12.1-STABLE before r362166, 12.1-RELEASE before p8, 11.4-STABLE before r362167, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, missing length validation code common to mulitple USB network drivers allows a malicious USB device to write beyond the end of an allocated network packet buffer.

9.8 2020-07-09 CVE-2020-7458

In FreeBSD 12.1-STABLE before r362281, 11.4-STABLE before r362281, and 11.4-RELEASE before p1, long values in the user-controlled PATH environment variable cause posix_spawnp to write beyond the end of the heap allocated stack possibly leading to arbitrary code execution.

8.1 2020-07-09 CVE-2020-7457

In FreeBSD 12.1-STABLE before r359565, 12.1-RELEASE before p7, 11.4-STABLE before r362975, 11.4-RELEASE before p1, and 11.3-RELEASE before p11, missing synchronization in the IPV6_2292PKTOPTIONS socket option set handler contained a race condition allowing a malicious application to modify memory after being freed, possibly resulting in code execution.

6.8 2020-06-09 CVE-2020-7456

In FreeBSD 12.1-STABLE before r361918, 12.1-RELEASE before p6, 11.4-STABLE before r361919, 11.3-RELEASE before p10, and 11.4-RC2 before p1, an invalid memory location may be used for HID items if the push/pop level is not restored within the processing of that HID item allowing an attacker with physical access to a USB port to be able to use a specially crafted USB device to gain kernel or user-space code execution.

7.5 2020-05-13 CVE-2020-7455

In FreeBSD 12.1-STABLE before r360973, 12.1-RELEASE before p5, 11.4-STABLE before r360973, 11.4-BETA1 before p1 and 11.3-RELEASE before p9, the FTP packet handler in libalias incorrectly calculates some packet length allowing disclosure of small amounts of kernel (for kernel NAT) or natd process space (for userspace natd).

9.8 2020-05-13 CVE-2020-7454

In FreeBSD 12.1-STABLE before r360971, 12.1-RELEASE before p5, 11.4-STABLE before r360971, 11.4-BETA1 before p1 and 11.3-RELEASE before p9, libalias does not properly validate packet length resulting in modules causing an out of bounds read/write condition if no checking was built into the module.

9.8 2020-05-13 CVE-2019-15880

In FreeBSD 12.1-STABLE before r356911, and 12.1-RELEASE before p5, insufficient checking in the cryptodev module allocated the size of a kernel buffer based on a user-supplied length allowing an unprivileged process to trigger a kernel panic.

7.4 2020-05-13 CVE-2019-15879

In FreeBSD 12.1-STABLE before r356908, 12.1-RELEASE before p5, 11.3-STABLE before r356908, and 11.3-RELEASE before p9, a race condition in the cryptodev module permitted a data structure in the kernel to be used after it was freed, allowing an unprivileged process can overwrite arbitrary kernel memory.

7.8 2020-05-13 CVE-2019-15878

In FreeBSD 12.1-STABLE before r352509, 11.3-STABLE before r352509, and 11.3-RELEASE before p9, an unprivileged local user can trigger a use-after-free situation due to improper checking in SCTP when an application tries to update an SCTP-AUTH shared key.

6 2020-04-29 CVE-2020-7453

In FreeBSD 12.1-STABLE before r359021, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r359020, and 11.3-RELEASE before 11.3-RELEASE-p7, a missing null termination check in the jail_set configuration option "osrelease" may return more bytes with a subsequent jail_get system call allowing a malicious jail superuser with permission to create nested jails to read kernel memory.

9.1 2020-04-29 CVE-2020-7452

In FreeBSD 12.1-STABLE before r357490, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r357489, and 11.3-RELEASE before 11.3-RELEASE-p7, incorrect use of a user-controlled pointer in the epair virtual network module allowed vnet jailed privileged users to panic the host system and potentially execute arbitrary code in the kernel.

9.8 2020-04-29 CVE-2019-5614

In FreeBSD 12.1-STABLE before r356035, 12.1-RELEASE before 12.1-RELEASE-p4, 11.3-STABLE before r356036, and 11.3-RELEASE before 11.3-RELEASE-p8, incomplete packet data validation may result in accessing out-of-bounds memory leading to a kernel panic or other unpredictable results.

9.8 2020-04-29 CVE-2019-15874

In FreeBSD 12.1-STABLE before r356035, 12.1-RELEASE before 12.1-RELEASE-p4, 11.3-STABLE before r356036, and 11.3-RELEASE before 11.3-RELEASE-p8, incomplete packet data validation may result in memory access after it has been freed leading to a kernel panic or other unpredictable results.

5.3 2020-04-28 CVE-2020-7451

In FreeBSD 12.1-STABLE before r358739, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r358740, and 11.3-RELEASE before 11.3-RELEASE-p7, a TCP SYN-ACK or challenge TCP-ACK segment over IPv6 that is transmitted or retransmitted does not properly initialize the Traffic Class field disclosing one byte of kernel memory over the network.

5.5 2020-04-28 CVE-2019-15877

In FreeBSD 12.1-STABLE before r356606 and 12.1-RELEASE before 12.1-RELEASE-p3, driver specific ioctl command handlers in the ixl network driver failed to check whether the caller has sufficient privileges allowing unprivileged users to trigger updates to the device's non-volatile memory.

5.5 2020-04-28 CVE-2019-15876

In FreeBSD 12.1-STABLE before r356089, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r356090, and 11.3-RELEASE before 11.3-RELEASE-p7, driver specific ioctl command handlers in the oce network driver failed to check whether the caller has sufficient privileges allowing unprivileged users to send passthrough commands to the device firmware.

7.5 2020-04-21 CVE-2020-1967

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

7.8 2020-03-14 CVE-2020-10566

grub2-bhyve, as used in FreeBSD bhyve before revision 525916 2020-02-12, mishandles font loading by a guest through a grub2.cfg file, leading to a buffer overflow.

7.8 2020-03-14 CVE-2020-10565

grub2-bhyve, as used in FreeBSD bhyve before revision 525916 2020-02-12, does not validate the address provided as part of a memrw command (read_* or write_*) by a guest through a grub2.cfg file. This allows an untrusted guest to perform arbitrary read or write operations in the context of the grub-bhyve process, resulting in code execution as root on the host OS.

6.5 2020-02-20 CVE-2015-2923

The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in FreeBSD through 10.1 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.

7.5 2020-02-20 CVE-2012-5365

The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.

7.5 2020-02-20 CVE-2012-5363

The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2011-2393.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
13% (28) CWE-264 Permissions, Privileges, and Access Controls
12% (26) CWE-20 Improper Input Validation
11% (23) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
10% (22) CWE-200 Information Exposure
5% (12) CWE-399 Resource Management Errors
5% (12) CWE-189 Numeric Errors
4% (10) CWE-787 Out-of-bounds Write
4% (10) CWE-330 Use of Insufficiently Random Values
3% (7) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (6) CWE-362 Race Condition
2% (6) CWE-125 Out-of-bounds Read
2% (5) CWE-190 Integer Overflow or Wraparound
1% (4) CWE-476 NULL Pointer Dereference
1% (4) CWE-416 Use After Free
1% (3) CWE-310 Cryptographic Issues
0% (2) CWE-772 Missing Release of Resource after Effective Lifetime
0% (2) CWE-665 Improper Initialization
0% (2) CWE-404 Improper Resource Shutdown or Release
0% (2) CWE-345 Insufficient Verification of Data Authenticity
0% (2) CWE-287 Improper Authentication
0% (2) CWE-269 Improper Privilege Management
0% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
0% (2) CWE-16 Configuration
0% (1) CWE-770 Allocation of Resources Without Limits or Throttling
0% (1) CWE-754 Improper Check for Unusual or Exceptional Conditions

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-17 Accessing, Modifying or Executing Executable Files
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-25 Forced Deadlock
CAPEC-26 Leveraging Race Conditions
CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-39 Manipulating Opaque Client-based Data Tokens
CAPEC-42 MIME Conversion
CAPEC-44 Overflow Binary Resource File
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-51 Poison Web Service Registry
CAPEC-58 Restful Privilege Elevation
CAPEC-59 Session Credential Falsification through Prediction
CAPEC-60 Reusing Session IDs (aka Session Replay)
CAPEC-63 Simple Script Injection
CAPEC-67 String Format Overflow in syslog()
CAPEC-73 User-Controlled Filename

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:5931 The vacation program erroneously passes parameters to sendmail.
oval:org.mitre.oval:def:10888 cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating sys...
oval:org.mitre.oval:def:1828 Buffer Overflow in "in.telnetd"or "telnetd"Process
oval:org.mitre.oval:def:9 Solaris 8 RPC xdr_array Buffer Overflow
oval:org.mitre.oval:def:4728 SunRPC xdr_array Function Integer Overflow
oval:org.mitre.oval:def:42 Solaris 7 RPC xdr_array Buffer Overflow
oval:org.mitre.oval:def:2539 BIND SIG Resource Records Buffer Overflow
oval:org.mitre.oval:def:449 Bind OPT Resource Record DoS Vulnerability
oval:org.mitre.oval:def:2094 BIND DoS via SIG RR Elements
oval:org.mitre.oval:def:2665 Data Leak in NIC
oval:org.mitre.oval:def:28706 Critical Patch Update January 2015
oval:org.mitre.oval:def:230 xdrmem_bytes() Integer Overflow Vulnerability
oval:org.mitre.oval:def:1970 Off-by-one Error in fb_realpath()
oval:org.mitre.oval:def:597 Denial of Service in Sendmail via the enhdnsbl Feature
oval:org.mitre.oval:def:603 Sendmail BO in prescan Function
oval:org.mitre.oval:def:572 Sendmail BO in Prescan Function
oval:org.mitre.oval:def:2975 Sendmail prescan function Buffer Overflow
oval:org.mitre.oval:def:2011 ISC BIND Cache Poison Denial Of Service
oval:org.mitre.oval:def:9779 The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to...
oval:org.mitre.oval:def:975 Red Hat OpenSSL do_change_cipher_spec Function Denial of Service
oval:org.mitre.oval:def:870 Red Hat Enterprise 3 OpenSSL do_change_cipher_spec Function Denial of Service
oval:org.mitre.oval:def:5770 Multiple Vendor OpenSSL 0.9.6x, 0.9.7x Null-Pointer DoS Vulnerability
oval:org.mitre.oval:def:2621 OpenSSL Denial of Service Vulnerabilities
oval:org.mitre.oval:def:902 Red Hat OpenSSL Improper Unknown Message Handling Vulnerability
oval:org.mitre.oval:def:871 Red Hat Enterprise 3 OpenSSL Improper Unknown Message Handling Vulnerability

SAINT Exploits

Description Link
Telnetd Encryption Key ID Code Execution More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
78020 FreeBSD telnetd Multiple telnet/libtelnet/encrypt.c encrypt_keyid() Function ...
76945 OpenPAM Pam Services Traversal Local Privilege Escalation
75788 FreeBSD UNIX Domain Socket sys/kern/uipc_usrreq.c uipc_bind() Function Local ...
75249 OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
75248 OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
75010 crontab crontab.c realpath() Temporary File Symlink Directory Enumeration
75009 crontab crontab.c stat() Call Temporary File Symlink Arbitrary File Enumeration
75007 libc glob Expression Pathname Matching Remote DoS (2010-4754)
74934 KAME IPSEC Implementations Spoofed ESP Packet DoS
74927 X.Org libXfont src/fontfile/decompress.c BufCompressedFill() Function LZW Dec...
73388 Multiple Vendor libc Implentation fnmatch.c Memory Consumption DoS
73383 Apache HTTP Server Portable Runtime (APR) Library apr_fnmatch() Infinite Loop...
72130 FreeBSD mountd mountd.c makemask Function NFS Mount Request Access Restrictio...
68313 FreeBSD pseudofs pfs_getattr() Function NULL Dereference Local Privilege Esca...
68291 NetBSD Kernel netsmb Module smb_subr.c /dev/nsmb IOCTL Operation Integer Sign...
67346 Multiple Unix Vendor rpc.pcnfsd pr_init() Symlink Arbitrary File Permission M...
67330 Coda Filesystem Kernel Module IOCTL ViceIoctl Struct Local Memory Disclosure
66316 FreeBSD Read-only Flag Copy Weakness Duplicate mbuf Buffer Reference Sendfile...
65152 FreeBSD jail(8) Descendant Process CWD Escape Arbitrary File Access
65036 FreeBSD nfsclient nfs_vfsops.c nfs_mount() Function File Handle Buffer Mounti...
64949 OPIE readrec.c __opiereadrec() Off-by-One Remote Code Execution
63646 J Programming Language libc dtoa Implementation Floating Point Parsing Memory...
63641 Matlab libc dtoa Implementation Floating Point Parsing Memory Corruption
63639 Apple Mac OS X libc dtoa Implementation Floating Point Parsing Memory Corruption
62402 K-Meleon libc dtoa Implementation Floating Point Parsing Memory Corruption

ExploitDB Exploits

id Description
26454 FreeBSD 9 Address Space Manipulation Privilege Escalation
26076 Cisco ASA < 8.4.4.6|8.2.5.32 Ethernet Information Leak
22131 Linux Kernel 2.0.x/2.2.x/2.4.x,FreeBSD 4.x Network Device Driver Frame Paddin...
16951 FreeBSD <= 6.4 Netgraph Local Privledge Escalation Exploit
12762 FreeBSD 8.0 ftpd off-by one PoC (FreeBSD-SA-10:05)
10380 Sunbird 0.9 Array Overrun (code execution) 0day
10187 Opera 10.01 Remote Array Overrun
10186 K-Meleon 1.5.3 Remote Array Overrun
10185 SeaMonkey 1.1.8 Remote Array Overrun
10184 KDE KDELibs 4.3.3 Remote Array Overrun
9082 FreeBSD 7.0/7.1 vfs.usermount Local Privilege Escalation Exploit
3555 Ethernet Device Drivers Frame Padding - Info Leakage Exploit (Etherleak)

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-12-18 Name : Fedora Update for xen FEDORA-2012-19828
File : nvt/gb_fedora_2012_19828_xen_fc16.nasl
2012-12-14 Name : Fedora Update for xen FEDORA-2012-19717
File : nvt/gb_fedora_2012_19717_xen_fc17.nasl
2012-12-13 Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen)
File : nvt/gb_suse_2012_0886_1.nasl
2012-11-26 Name : FreeBSD Ports: FreeBSD
File : nvt/freebsd_FreeBSD20.nasl
2012-11-23 Name : Fedora Update for xen FEDORA-2012-18242
File : nvt/gb_fedora_2012_18242_xen_fc17.nasl
2012-11-23 Name : Fedora Update for xen FEDORA-2012-18249
File : nvt/gb_fedora_2012_18249_xen_fc16.nasl
2012-11-15 Name : Fedora Update for xen FEDORA-2012-17204
File : nvt/gb_fedora_2012_17204_xen_fc17.nasl
2012-11-15 Name : Fedora Update for xen FEDORA-2012-17408
File : nvt/gb_fedora_2012_17408_xen_fc16.nasl
2012-10-03 Name : Gentoo Security Advisory GLSA 201209-24 (PostgreSQL)
File : nvt/glsa_201209_24.nasl
2012-09-26 Name : Gentoo Security Advisory GLSA 201209-03 (php)
File : nvt/glsa_201209_03.nasl
2012-09-25 Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2012-004)
File : nvt/gb_macosx_su12-004.nasl
2012-09-22 Name : Fedora Update for xen FEDORA-2012-13434
File : nvt/gb_fedora_2012_13434_xen_fc17.nasl
2012-09-22 Name : Fedora Update for xen FEDORA-2012-13443
File : nvt/gb_fedora_2012_13443_xen_fc16.nasl
2012-09-10 Name : Slackware Advisory SSA:2011-133-01 apr/apr-util
File : nvt/esoft_slk_ssa_2011_133_01.nasl
2012-08-30 Name : Fedora Update for php FEDORA-2012-10936
File : nvt/gb_fedora_2012_10936_php_fc17.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-11182
File : nvt/gb_fedora_2012_11182_xen_fc17.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-11755
File : nvt/gb_fedora_2012_11755_xen_fc17.nasl
2012-08-30 Name : Fedora Update for postgresql FEDORA-2012-12156
File : nvt/gb_fedora_2012_12156_postgresql_fc16.nasl
2012-08-30 Name : Fedora Update for postgresql FEDORA-2012-12165
File : nvt/gb_fedora_2012_12165_postgresql_fc17.nasl
2012-08-30 Name : Fedora Update for postgresql FEDORA-2012-8924
File : nvt/gb_fedora_2012_8924_postgresql_fc17.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-9386
File : nvt/gb_fedora_2012_9386_xen_fc17.nasl
2012-08-30 Name : Fedora Update for maniadrive FEDORA-2012-9490
File : nvt/gb_fedora_2012_9490_maniadrive_fc17.nasl
2012-08-30 Name : Fedora Update for php FEDORA-2012-9490
File : nvt/gb_fedora_2012_9490_php_fc17.nasl
2012-08-24 Name : Fedora Update for xen FEDORA-2012-11785
File : nvt/gb_fedora_2012_11785_xen_fc16.nasl
2012-08-10 Name : Debian Security Advisory DSA 2491-1 (postgresql-8.4)
File : nvt/deb_2491_1.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0222 Multiple Security Vulnerabilities in Apple iOS
Severity: Category I - VMSKEY: V0061471
2013-A-0151 ISC BIND 9 Remote Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0039823
2012-A-0056 Multiple Vulnerabilities in VMWare ESX 4.0 and ESXi 4.0
Severity: Category I - VMSKEY: V0031979
2008-B-0070 Multiple Vendors IPv6 Neighbor Discovery Protocol Spoofing Vulnerability
Severity: Category II - VMSKEY: V0017557

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 record route rr denial of service attempt
RuleID : 8730 - Type : PROTOCOL-ICMP - Revision : 6
2014-01-10 vrfy decode
RuleID : 672-community - Type : SERVER-MAIL - Revision : 17
2014-01-10 vrfy decode
RuleID : 672 - Type : SERVER-MAIL - Revision : 17
2014-01-10 Sendmail expn decode
RuleID : 659-community - Type : SERVER-MAIL - Revision : 18
2014-01-10 Sendmail expn decode
RuleID : 659 - Type : SERVER-MAIL - Revision : 18
2014-01-10 RCPT TO overflow
RuleID : 654-community - Type : SERVER-MAIL - Revision : 28
2014-01-10 RCPT TO overflow
RuleID : 654 - Type : SERVER-MAIL - Revision : 28
2014-01-10 portmap pcnfsd request UDP
RuleID : 581-community - Type : PROTOCOL-RPC - Revision : 18
2014-01-10 portmap pcnfsd request UDP
RuleID : 581 - Type : PROTOCOL-RPC - Revision : 18
2014-01-10 portmap amountd request UDP
RuleID : 576-community - Type : PROTOCOL-RPC - Revision : 17
2014-01-10 portmap amountd request UDP
RuleID : 576 - Type : PROTOCOL-RPC - Revision : 17
2014-01-10 AMD Overflow
RuleID : 573 - Type : RPC - Revision : 9
2019-08-31 Apple DMG ffs_mountfs integer overflow exploit attempt
RuleID : 50853 - Type : FILE-OTHER - Revision : 1
2019-08-31 Apple DMG ffs_mountfs integer overflow exploit attempt
RuleID : 50852 - Type : FILE-OTHER - Revision : 1
2018-09-19 ntpq decode array buffer overflow attempt
RuleID : 47585 - Type : SERVER-OTHER - Revision : 4
2018-07-10 Microsoft Windows Interrupt Service Routine stack rollback attempt
RuleID : 46910 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows Interrupt Service Routine stack rollback attempt
RuleID : 46909 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows processor modification return to user-mode attempt
RuleID : 46908 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows processor modification return to user-mode attempt
RuleID : 46907 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows malicious CONTEXT structure creation attempt
RuleID : 46906 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows malicious CONTEXT structure creation attempt
RuleID : 46905 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows SYSTEM token stealing attempt
RuleID : 46904 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows SYSTEM token stealing attempt
RuleID : 46903 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-03 Microsoft Windows kernel privilege escalation attempt
RuleID : 46835 - Type : OS-WINDOWS - Revision : 1
2018-07-03 Microsoft Windows kernel privilege escalation attempt
RuleID : 46834 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-a7ac26523d.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-d3cb6f113c.nasl - Type: ACT_GATHER_INFO
2018-12-11 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_32498c8ffc8411e8be12a4badb2f4699.nasl - Type: ACT_GATHER_INFO
2018-11-30 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_sa-18-13_nfs.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-2911.nasl - Type: ACT_GATHER_INFO
2018-11-21 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1378.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote Debian host is missing a security update.
File: debian_DLA-1573.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote Debian host is missing a security update.
File: debian_DLA-1577.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_791841a3d4844878890992ef9ce424f4.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09618.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09619.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09620.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09621.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09622.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09623.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09624.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09625.nasl - Type: ACT_GATHER_INFO
2018-11-02 Name: The remote Debian host is missing a security update.
File: debian_DLA-1564.nasl - Type: ACT_GATHER_INFO
2018-11-02 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL17403481.nasl - Type: ACT_GATHER_INFO
2018-11-02 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL21344224.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1263.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1270.nasl - Type: ACT_GATHER_INFO
2018-09-13 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_a67c122ab69311e8ac58a4badb2f4699.nasl - Type: ACT_GATHER_INFO
2018-08-23 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_359e1548a65211e8805ba4badb2f4699.nasl - Type: ACT_GATHER_INFO