Summary
Detail | |||
---|---|---|---|
Vendor | Freebsd | First view | 1990-05-09 |
Product | Freebsd | Last view | 2023-12-24 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.3 | 2023-12-24 | CVE-2023-51765 | sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports |
5.9 | 2023-12-18 | CVE-2023-48795 | The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust. |
6.5 | 2023-12-13 | CVE-2023-6660 | When a program running on an affected system appends data to a file via an NFS client mount, the bug can cause the NFS client to fail to copy in the data to be written but proceed as though the copy operation had succeeded. This means that the data to be written is instead replaced with whatever data had been in the packet buffer previously. Thus, an unprivileged user with access to an affected system may abuse the bug to trigger disclosure of sensitive information. In particular, the leak is limited to data previously stored in mbufs, which are used for network transmission and reception, and for certain types of inter-process communication. The bug can also be triggered unintentionally by system applications, in which case the data written by the application to an NFS mount may be corrupted. Corrupted data is written over the network to the NFS server, and thus also susceptible to being snooped by other hosts on the network. Note that the bug exists only in the NFS client; the version and implementation of the server has no effect on whether a given system is affected by the problem. |
7.5 | 2023-12-13 | CVE-2023-6534 | In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. Ā This could allow a malicious actor to execute a denial-of-service attack against hosts behind the firewall. |
7.5 | 2023-11-08 | CVE-2023-5978 | In versions of FreeBSD 13-RELEASE before 13-RELEASE-p5, under certain circumstances the cap_net libcasper(3) service incorrectly validates that updated constraints are strictly subsets of the active constraints. Ā When only a listĀ of resolvable domain names was specified without setting any other limitations, an application could submit a new list of domains including include entries not previously listed. Ā This could permit the application to resolve domain names that were previously restricted. |
9.8 | 2023-11-08 | CVE-2023-5941 | In versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write(2) system call returns an error. Ā Depending on the nature of an application that calls libc's stdio functions and the presence of errors returned from the write(2) system call (or an overridden stdio write routine) a heap buffer overflow may occur. Such overflows may lead to data corruption or the execution of arbitrary code at the privilege level of the calling program. |
5.5 | 2023-10-04 | CVE-2023-5370 | On CPU 0 the check for the SMCCC workaround is called before SMCCC support has been initialized. This resulted in no speculative execution workarounds being installed on CPU 0. |
7.1 | 2023-10-04 | CVE-2023-5369 | Before correction, theĀ copy_file_rangeĀ system call checked only for the CAP_READ and CAP_WRITE capabilities on the input and output file descriptors, respectively. Using an offset is logically equivalent to seeking, and the system call must additionally require the CAP_SEEK capability. This incorrect privilege check enabled sandboxed processes with only read or write but no seek capability on a file descriptor to read data from or write data to an arbitrary location within the file corresponding to that file descriptor. |
6.5 | 2023-10-04 | CVE-2023-5368 | On an msdosfs filesystem, the 'truncate' or 'ftruncate' system calls under certain circumstances populate the additional space in the file with unallocated data from the underlying disk device, rather than zero bytes. This may permit a user with write access to files on a msdosfs filesystem to read unintended data (e.g. from a previously deleted file). |
7.5 | 2023-09-06 | CVE-2023-4809 | In pf packet processing with a 'scrub fragment reassemble' rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recognized as the correct ultimate payload. Instead a packet with multiple IPv6 fragment headers would unexpectedly be interpreted as a fragmented packet, rather than as whatever the real payload is. As a result, IPv6 fragments may bypass pf firewall rules written on the assumption all fragments have been reassembled and, as a result, be forwarded or processed by the host. |
8.8 | 2023-08-01 | CVE-2023-3494 | The fwctl driver implements a state machine which is executed when a bhyve guest accesses certain x86 I/O ports. The interface lets the guest copy a string into a buffer resident in the bhyve process' memory. A bug in the state machine implementation can result in a buffer overflowing when copying this string. Malicious, privileged software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root, mitigated by the capabilities assigned through the Capsicum sandbox available to the bhyve process. |
7.5 | 2023-08-01 | CVE-2023-3107 | A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service. |
9.8 | 2023-06-22 | CVE-2023-3326 | pam_krb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. However, if a keytab is not provisioned on the system, pam_krb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. In a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned, an attacker that is able to control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system. |
6.5 | 2023-02-08 | CVE-2023-0751 | When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key. |
7.5 | 2022-09-06 | CVE-2022-32264 | sys/netinet/tcp_timer.h in FreeBSD before 7.0 contains a denial-of-service (DoS) vulnerability due to improper handling of TSopt on TCP connections. NOTE: This vulnerability only affects products that are no longer supported by the maintainer |
7.5 | 2022-01-18 | CVE-2021-29632 | In FreeBSD 13.0-STABLE before n247428-9352de39c3dc, 12.2-STABLE before r370674, 13.0-RELEASE before p6, and 12.2-RELEASE before p12, certain conditions involving use of the highlight buffer while text is scrolling on the console, console data may overwrite data structures associated with the system console or other kernel memory. |
3.7 | 2021-10-19 | CVE-2011-1075 | FreeBSD's crontab calculates the MD5 sum of the previous and new cronjob to determine if any changes have been made before copying the new version in. In particular, it uses the MD5File() function, which takes a pathname as an argument, and is called with euid 0. A race condition in this process may lead to an arbitrary MD5 comparison regardless of the read permissions. |
7.8 | 2021-08-30 | CVE-2021-29631 | In FreeBSD 13.0-STABLE before n246941-20f96f215562, 12.2-STABLE before r370400, 11.4-STABLE before r370399, 13.0-RELEASE before p4, 12.2-RELEASE before p10, and 11.4-RELEASE before p13, certain VirtIO-based device models in bhyve failed to handle errors when fetching I/O descriptors. A malicious guest may cause the device model to operate on uninitialized I/O vectors leading to memory corruption, crashing of the bhyve process, and possibly arbitrary code execution in the bhyve process. |
8.1 | 2021-08-30 | CVE-2021-29630 | In FreeBSD 13.0-STABLE before n246938-0729ba2f49c9, 12.2-STABLE before r370383, 11.4-STABLE before r370381, 13.0-RELEASE before p4, 12.2-RELEASE before p10, and 11.4-RELEASE before p13, the ggatec daemon does not validate the size of a response before writing it to a fixed-sized buffer allowing a malicious attacker in a privileged network position to overwrite the stack of ggatec and potentially execute arbitrary code. |
7.5 | 2021-06-04 | CVE-2020-7469 | In FreeBSD 12.2-STABLE before r367402, 11.4-STABLE before r368202, 12.2-RELEASE before p1, 12.1-RELEASE before p11 and 11.4-RELEASE before p5 the handler for a routing option caches a pointer into the packet buffer holding the ICMPv6 message. However, when processing subsequent options the packet buffer may be freed, rendering the cached pointer invalid. The network stack may later dereference the pointer, potentially triggering a use-after-free. |
7.5 | 2021-05-28 | CVE-2021-29629 | In FreeBSD 13.0-STABLE before n245765-bec0d2c9c841, 12.2-STABLE before r369859, 11.4-STABLE before r369866, 13.0-RELEASE before p1, 12.2-RELEASE before p7, and 11.4-RELEASE before p10, missing message validation in libradius(3) could allow malicious clients or servers to trigger denial of service in vulnerable servers or clients respectively. |
7.5 | 2021-05-28 | CVE-2021-29628 | In FreeBSD 13.0-STABLE before n245764-876ffe28796c, 12.2-STABLE before r369857, 13.0-RELEASE before p1, and 12.2-RELEASE before p7, a system call triggering a fault could cause SMAP protections to be disabled for the duration of the system call. This weakness could be combined with other kernel bugs to craft an exploit. |
7.8 | 2021-04-07 | CVE-2021-29627 | In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 before p0, and 12.2-RELEASE before p6, listening socket accept filters implementing the accf_create callback incorrectly freed a process supplied argument string. Additional operations on the socket can lead to a double free or use after free. |
5.5 | 2021-04-07 | CVE-2021-29626 | In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11.4-STABLE before r369559, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, copy-on-write logic failed to invalidate shared memory page mappings between multiple processes allowing an unprivileged process to maintain a mapping after it is freed, allowing the process to read private data belonging to other processes or the kernel. |
7.5 | 2021-04-07 | CVE-2020-25584 | In FreeBSD 13.0-STABLE before n245118, 12.2-STABLE before r369552, 11.4-STABLE before r369560, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, a superuser inside a FreeBSD jail configured with the non-default allow.mount permission could cause a race condition between the lookup of ".." and remounting a filesystem, allowing access to filesystem hierarchy outside of the jail. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
10% (28) | CWE-20 | Improper Input Validation |
10% (27) | CWE-264 | Permissions, Privileges, and Access Controls |
9% (25) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
8% (21) | CWE-200 | Information Exposure |
5% (15) | CWE-787 | Out-of-bounds Write |
4% (12) | CWE-189 | Numeric Errors |
4% (11) | CWE-399 | Resource Management Errors |
4% (11) | CWE-330 | Use of Insufficiently Random Values |
3% (10) | CWE-416 | Use After Free |
3% (10) | CWE-362 | Race Condition |
3% (8) | CWE-190 | Integer Overflow or Wraparound |
3% (8) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
2% (7) | CWE-476 | NULL Pointer Dereference |
2% (7) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (6) | CWE-125 | Out-of-bounds Read |
1% (5) | CWE-287 | Improper Authentication |
1% (4) | CWE-665 | Improper Initialization |
1% (3) | CWE-345 | Insufficient Verification of Data Authenticity |
1% (3) | CWE-203 | Information Exposure Through Discrepancy |
1% (3) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
0% (2) | CWE-772 | Missing Release of Resource after Effective Lifetime |
0% (2) | CWE-770 | Allocation of Resources Without Limits or Throttling |
0% (2) | CWE-667 | Insufficient Locking |
0% (2) | CWE-415 | Double Free |
0% (2) | CWE-404 | Improper Resource Shutdown or Release |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-1 | Accessing Functionality Not Properly Constrained by ACLs |
CAPEC-8 | Buffer Overflow in an API Call |
CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-14 | Client-side Injection-induced Buffer Overflow |
CAPEC-17 | Accessing, Modifying or Executing Executable Files |
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-24 | Filter Failure through Buffer Overflow |
CAPEC-25 | Forced Deadlock |
CAPEC-26 | Leveraging Race Conditions |
CAPEC-29 | Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions |
CAPEC-30 | Hijacking a Privileged Thread of Execution |
CAPEC-39 | Manipulating Opaque Client-based Data Tokens |
CAPEC-42 | MIME Conversion |
CAPEC-44 | Overflow Binary Resource File |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-46 | Overflow Variables and Tags |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-51 | Poison Web Service Registry |
CAPEC-58 | Restful Privilege Elevation |
CAPEC-59 | Session Credential Falsification through Prediction |
CAPEC-60 | Reusing Session IDs (aka Session Replay) |
CAPEC-63 | Simple Script Injection |
CAPEC-67 | String Format Overflow in syslog() |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:5931 | The vacation program erroneously passes parameters to sendmail. |
oval:org.mitre.oval:def:10888 | cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating sys... |
oval:org.mitre.oval:def:1828 | Buffer Overflow in "in.telnetd"or "telnetd"Process |
oval:org.mitre.oval:def:9 | Solaris 8 RPC xdr_array Buffer Overflow |
oval:org.mitre.oval:def:4728 | SunRPC xdr_array Function Integer Overflow |
oval:org.mitre.oval:def:42 | Solaris 7 RPC xdr_array Buffer Overflow |
oval:org.mitre.oval:def:2539 | BIND SIG Resource Records Buffer Overflow |
oval:org.mitre.oval:def:449 | Bind OPT Resource Record DoS Vulnerability |
oval:org.mitre.oval:def:2094 | BIND DoS via SIG RR Elements |
oval:org.mitre.oval:def:2665 | Data Leak in NIC |
oval:org.mitre.oval:def:28706 | Critical Patch Update January 2015 |
oval:org.mitre.oval:def:230 | xdrmem_bytes() Integer Overflow Vulnerability |
oval:org.mitre.oval:def:1970 | Off-by-one Error in fb_realpath() |
oval:org.mitre.oval:def:597 | Denial of Service in Sendmail via the enhdnsbl Feature |
oval:org.mitre.oval:def:603 | Sendmail BO in prescan Function |
oval:org.mitre.oval:def:572 | Sendmail BO in Prescan Function |
oval:org.mitre.oval:def:2975 | Sendmail prescan function Buffer Overflow |
oval:org.mitre.oval:def:2011 | ISC BIND Cache Poison Denial Of Service |
oval:org.mitre.oval:def:9779 | The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to... |
oval:org.mitre.oval:def:975 | Red Hat OpenSSL do_change_cipher_spec Function Denial of Service |
oval:org.mitre.oval:def:870 | Red Hat Enterprise 3 OpenSSL do_change_cipher_spec Function Denial of Service |
oval:org.mitre.oval:def:5770 | Multiple Vendor OpenSSL 0.9.6x, 0.9.7x Null-Pointer DoS Vulnerability |
oval:org.mitre.oval:def:2621 | OpenSSL Denial of Service Vulnerabilities |
oval:org.mitre.oval:def:902 | Red Hat OpenSSL Improper Unknown Message Handling Vulnerability |
oval:org.mitre.oval:def:871 | Red Hat Enterprise 3 OpenSSL Improper Unknown Message Handling Vulnerability |
SAINT Exploits
Description | Link |
---|---|
Telnetd Encryption Key ID Code Execution | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
78020 | FreeBSD telnetd Multiple telnet/libtelnet/encrypt.c encrypt_keyid() Function ... |
76945 | OpenPAM Pam Services Traversal Local Privilege Escalation |
75788 | FreeBSD UNIX Domain Socket sys/kern/uipc_usrreq.c uipc_bind() Function Local ... |
75249 | OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS |
75248 | OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS |
75011 | crontab crontab.c Temporary File Symlink Arbitrary MD5 Hash Comparison |
75010 | crontab crontab.c realpath() Temporary File Symlink Directory Enumeration |
75009 | crontab crontab.c stat() Call Temporary File Symlink Arbitrary File Enumeration |
75007 | libc glob Expression Pathname Matching Remote DoS (2010-4754) |
74934 | KAME IPSEC Implementations Spoofed ESP Packet DoS |
74927 | X.Org libXfont src/fontfile/decompress.c BufCompressedFill() Function LZW Dec... |
73388 | Multiple Vendor libc Implentation fnmatch.c Memory Consumption DoS |
73383 | Apache HTTP Server Portable Runtime (APR) Library apr_fnmatch() Infinite Loop... |
72130 | FreeBSD mountd mountd.c makemask Function NFS Mount Request Access Restrictio... |
68313 | FreeBSD pseudofs pfs_getattr() Function NULL Dereference Local Privilege Esca... |
68291 | NetBSD Kernel netsmb Module smb_subr.c /dev/nsmb IOCTL Operation Integer Sign... |
67346 | Multiple Unix Vendor rpc.pcnfsd pr_init() Symlink Arbitrary File Permission M... |
67330 | Coda Filesystem Kernel Module IOCTL ViceIoctl Struct Local Memory Disclosure |
66316 | FreeBSD Read-only Flag Copy Weakness Duplicate mbuf Buffer Reference Sendfile... |
65152 | FreeBSD jail(8) Descendant Process CWD Escape Arbitrary File Access |
65036 | FreeBSD nfsclient nfs_vfsops.c nfs_mount() Function File Handle Buffer Mounti... |
64949 | OPIE readrec.c __opiereadrec() Off-by-One Remote Code Execution |
63646 | J Programming Language libc dtoa Implementation Floating Point Parsing Memory... |
63641 | Matlab libc dtoa Implementation Floating Point Parsing Memory Corruption |
63639 | Apple Mac OS X libc dtoa Implementation Floating Point Parsing Memory Corruption |
ExploitDB Exploits
id | Description |
---|---|
26454 | FreeBSD 9 Address Space Manipulation Privilege Escalation |
26076 | Cisco ASA < 8.4.4.6|8.2.5.32 Ethernet Information Leak |
22131 | Linux Kernel 2.0.x/2.2.x/2.4.x,FreeBSD 4.x Network Device Driver Frame Paddin... |
16951 | FreeBSD <= 6.4 Netgraph Local Privledge Escalation Exploit |
12762 | FreeBSD 8.0 ftpd off-by one PoC (FreeBSD-SA-10:05) |
10380 | Sunbird 0.9 Array Overrun (code execution) 0day |
10187 | Opera 10.01 Remote Array Overrun |
10186 | K-Meleon 1.5.3 Remote Array Overrun |
10185 | SeaMonkey 1.1.8 Remote Array Overrun |
10184 | KDE KDELibs 4.3.3 Remote Array Overrun |
9082 | FreeBSD 7.0/7.1 vfs.usermount Local Privilege Escalation Exploit |
3555 | Ethernet Device Drivers Frame Padding - Info Leakage Exploit (Etherleak) |
OpenVAS Exploits
id | Description |
---|---|
2012-12-18 | Name : Fedora Update for xen FEDORA-2012-19828 File : nvt/gb_fedora_2012_19828_xen_fc16.nasl |
2012-12-14 | Name : Fedora Update for xen FEDORA-2012-19717 File : nvt/gb_fedora_2012_19717_xen_fc17.nasl |
2012-12-13 | Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen) File : nvt/gb_suse_2012_0886_1.nasl |
2012-11-26 | Name : FreeBSD Ports: FreeBSD File : nvt/freebsd_FreeBSD20.nasl |
2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18242 File : nvt/gb_fedora_2012_18242_xen_fc17.nasl |
2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18249 File : nvt/gb_fedora_2012_18249_xen_fc16.nasl |
2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17204 File : nvt/gb_fedora_2012_17204_xen_fc17.nasl |
2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17408 File : nvt/gb_fedora_2012_17408_xen_fc16.nasl |
2012-10-03 | Name : Gentoo Security Advisory GLSA 201209-24 (PostgreSQL) File : nvt/glsa_201209_24.nasl |
2012-09-26 | Name : Gentoo Security Advisory GLSA 201209-03 (php) File : nvt/glsa_201209_03.nasl |
2012-09-25 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2012-004) File : nvt/gb_macosx_su12-004.nasl |
2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13434 File : nvt/gb_fedora_2012_13434_xen_fc17.nasl |
2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13443 File : nvt/gb_fedora_2012_13443_xen_fc16.nasl |
2012-09-10 | Name : Slackware Advisory SSA:2011-133-01 apr/apr-util File : nvt/esoft_slk_ssa_2011_133_01.nasl |
2012-08-30 | Name : Fedora Update for php FEDORA-2012-10936 File : nvt/gb_fedora_2012_10936_php_fc17.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11182 File : nvt/gb_fedora_2012_11182_xen_fc17.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11755 File : nvt/gb_fedora_2012_11755_xen_fc17.nasl |
2012-08-30 | Name : Fedora Update for postgresql FEDORA-2012-12156 File : nvt/gb_fedora_2012_12156_postgresql_fc16.nasl |
2012-08-30 | Name : Fedora Update for postgresql FEDORA-2012-12165 File : nvt/gb_fedora_2012_12165_postgresql_fc17.nasl |
2012-08-30 | Name : Fedora Update for postgresql FEDORA-2012-8924 File : nvt/gb_fedora_2012_8924_postgresql_fc17.nasl |
2012-08-30 | Name : Fedora Update for xen FEDORA-2012-9386 File : nvt/gb_fedora_2012_9386_xen_fc17.nasl |
2012-08-30 | Name : Fedora Update for maniadrive FEDORA-2012-9490 File : nvt/gb_fedora_2012_9490_maniadrive_fc17.nasl |
2012-08-30 | Name : Fedora Update for php FEDORA-2012-9490 File : nvt/gb_fedora_2012_9490_php_fc17.nasl |
2012-08-24 | Name : Fedora Update for xen FEDORA-2012-11785 File : nvt/gb_fedora_2012_11785_xen_fc16.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2491-1 (postgresql-8.4) File : nvt/deb_2491_1.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0222 | Multiple Security Vulnerabilities in Apple iOS Severity: Category I - VMSKEY: V0061471 |
2013-A-0151 | ISC BIND 9 Remote Denial of Service Vulnerability Severity: Category I - VMSKEY: V0039823 |
2012-A-0056 | Multiple Vulnerabilities in VMWare ESX 4.0 and ESXi 4.0 Severity: Category I - VMSKEY: V0031979 |
2008-B-0070 | Multiple Vendors IPv6 Neighbor Discovery Protocol Spoofing Vulnerability Severity: Category II - VMSKEY: V0017557 |
SnortĀ® IPS/IDS
Date | Description |
---|---|
2014-01-10 | record route rr denial of service attempt RuleID : 8730 - Type : PROTOCOL-ICMP - Revision : 6 |
2014-01-10 | vrfy decode RuleID : 672-community - Type : SERVER-MAIL - Revision : 17 |
2014-01-10 | vrfy decode RuleID : 672 - Type : SERVER-MAIL - Revision : 17 |
2014-01-10 | Sendmail expn decode RuleID : 659-community - Type : SERVER-MAIL - Revision : 18 |
2014-01-10 | Sendmail expn decode RuleID : 659 - Type : SERVER-MAIL - Revision : 18 |
2014-01-10 | RCPT TO overflow RuleID : 654-community - Type : SERVER-MAIL - Revision : 28 |
2014-01-10 | RCPT TO overflow RuleID : 654 - Type : SERVER-MAIL - Revision : 28 |
2014-01-10 | portmap pcnfsd request UDP RuleID : 581-community - Type : PROTOCOL-RPC - Revision : 18 |
2014-01-10 | portmap pcnfsd request UDP RuleID : 581 - Type : PROTOCOL-RPC - Revision : 18 |
2014-01-10 | portmap amountd request UDP RuleID : 576-community - Type : PROTOCOL-RPC - Revision : 17 |
2014-01-10 | portmap amountd request UDP RuleID : 576 - Type : PROTOCOL-RPC - Revision : 17 |
2014-01-10 | AMD Overflow RuleID : 573 - Type : RPC - Revision : 9 |
2019-08-31 | Apple DMG ffs_mountfs integer overflow exploit attempt RuleID : 50853 - Type : FILE-OTHER - Revision : 1 |
2019-08-31 | Apple DMG ffs_mountfs integer overflow exploit attempt RuleID : 50852 - Type : FILE-OTHER - Revision : 1 |
2018-09-19 | ntpq decode array buffer overflow attempt RuleID : 47585 - Type : SERVER-OTHER - Revision : 4 |
2018-07-10 | Microsoft Windows Interrupt Service Routine stack rollback attempt RuleID : 46910 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2018-07-10 | Microsoft Windows Interrupt Service Routine stack rollback attempt RuleID : 46909 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2018-07-10 | Microsoft Windows processor modification return to user-mode attempt RuleID : 46908 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2018-07-10 | Microsoft Windows processor modification return to user-mode attempt RuleID : 46907 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2018-07-10 | Microsoft Windows malicious CONTEXT structure creation attempt RuleID : 46906 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2018-07-10 | Microsoft Windows malicious CONTEXT structure creation attempt RuleID : 46905 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2018-07-10 | Microsoft Windows SYSTEM token stealing attempt RuleID : 46904 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2018-07-10 | Microsoft Windows SYSTEM token stealing attempt RuleID : 46903 - Type : INDICATOR-COMPROMISE - Revision : 2 |
2018-07-03 | Microsoft Windows kernel privilege escalation attempt RuleID : 46835 - Type : OS-WINDOWS - Revision : 1 |
2018-07-03 | Microsoft Windows kernel privilege escalation attempt RuleID : 46834 - Type : OS-WINDOWS - Revision : 1 |
NessusĀ® Vulnerability Scanner
id | Description |
---|---|
2019-01-10 | Name: The remote device is affected by multiple vulnerabilities. File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-a7ac26523d.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-d3cb6f113c.nasl - Type: ACT_GATHER_INFO |
2018-12-11 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_32498c8ffc8411e8be12a4badb2f4699.nasl - Type: ACT_GATHER_INFO |
2018-11-30 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_sa-18-13_nfs.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-2911.nasl - Type: ACT_GATHER_INFO |
2018-11-21 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1378.nasl - Type: ACT_GATHER_INFO |
2018-11-13 | Name: The remote Debian host is missing a security update. File: debian_DLA-1573.nasl - Type: ACT_GATHER_INFO |
2018-11-13 | Name: The remote Debian host is missing a security update. File: debian_DLA-1577.nasl - Type: ACT_GATHER_INFO |
2018-11-13 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_791841a3d4844878890992ef9ce424f4.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote AIX host is missing a security patch. File: aix_IJ09618.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote AIX host is missing a security patch. File: aix_IJ09619.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote AIX host is missing a security patch. File: aix_IJ09620.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote AIX host is missing a security patch. File: aix_IJ09621.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote AIX host is missing a security patch. File: aix_IJ09622.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote AIX host is missing a security patch. File: aix_IJ09623.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote AIX host is missing a security patch. File: aix_IJ09624.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote AIX host is missing a security patch. File: aix_IJ09625.nasl - Type: ACT_GATHER_INFO |
2018-11-02 | Name: The remote Debian host is missing a security update. File: debian_DLA-1564.nasl - Type: ACT_GATHER_INFO |
2018-11-02 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL17403481.nasl - Type: ACT_GATHER_INFO |
2018-11-02 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL21344224.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing multiple security updates. File: EulerOS_SA-2018-1263.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing multiple security updates. File: EulerOS_SA-2018-1270.nasl - Type: ACT_GATHER_INFO |
2018-09-13 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_a67c122ab69311e8ac58a4badb2f4699.nasl - Type: ACT_GATHER_INFO |
2018-08-23 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_359e1548a65211e8805ba4badb2f4699.nasl - Type: ACT_GATHER_INFO |