This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Freebsd First view 1990-05-09
Product Freebsd Last view 2023-12-24
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:* 125
cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:* 121
cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:* 121
cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:* 117
cpe:2.3:o:freebsd:freebsd:4.3:-:*:*:*:*:*:* 113
cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:* 112
cpe:2.3:o:freebsd:freebsd:3.3:-:*:*:*:*:*:* 112
cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:* 111
cpe:2.3:o:freebsd:freebsd:4.4:-:*:*:*:*:*:* 110
cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:* 109
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* 109
cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:* 108
cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:* 107
cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:* 106
cpe:2.3:o:freebsd:freebsd:5.0:-:*:*:*:*:*:* 105
cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:* 105
cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:* 104
cpe:2.3:o:freebsd:freebsd:4.5:-:*:*:*:*:*:* 103
cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:* 103
cpe:2.3:o:freebsd:freebsd:4.6:-:*:*:*:*:*:* 103
cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:* 103
cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:* 103
cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:* 100
cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:* 99
cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:* 97
cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:* 97
cpe:2.3:o:freebsd:freebsd:4.7:-:*:*:*:*:*:* 97
cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:* 96
cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:* 96
cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:* 96
cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:* 96
cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:* 95
cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:* 95
cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:* 95
cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:* 95
cpe:2.3:o:freebsd:freebsd:4.8:-:*:*:*:*:*:* 94
cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:* 94
cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:* 93
cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:* 93
cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:* 93
cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:* 93
cpe:2.3:o:freebsd:freebsd:5.1:-:*:*:*:*:*:* 93
cpe:2.3:o:freebsd:freebsd:5.2:-:*:*:*:*:*:* 92
cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:* 92
cpe:2.3:o:freebsd:freebsd:4.9:-:*:*:*:*:*:* 92
cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:* 91
cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:* 89
cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:* 89
cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:* 89
cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:* 89

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.3 2023-12-24 CVE-2023-51765

sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports . but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with 'o' in srv_features.

5.9 2023-12-18 CVE-2023-48795

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

6.5 2023-12-13 CVE-2023-6660

When a program running on an affected system appends data to a file via an NFS client mount, the bug can cause the NFS client to fail to copy in the data to be written but proceed as though the copy operation had succeeded. This means that the data to be written is instead replaced with whatever data had been in the packet buffer previously. Thus, an unprivileged user with access to an affected system may abuse the bug to trigger disclosure of sensitive information. In particular, the leak is limited to data previously stored in mbufs, which are used for network transmission and reception, and for certain types of inter-process communication.

The bug can also be triggered unintentionally by system applications, in which case the data written by the application to an NFS mount may be corrupted. Corrupted data is written over the network to the NFS server, and thus also susceptible to being snooped by other hosts on the network.

Note that the bug exists only in the NFS client; the version and implementation of the server has no effect on whether a given system is affected by the problem.

7.5 2023-12-13 CVE-2023-6534

In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. Ā This could allow a malicious actor to execute a denial-of-service attack against hosts behind the firewall.

7.5 2023-11-08 CVE-2023-5978

In versions of FreeBSD 13-RELEASE before 13-RELEASE-p5, under certain circumstances the cap_net libcasper(3) service incorrectly validates that updated constraints are strictly subsets of the active constraints. Ā When only a listĀ of resolvable domain names was specified without setting any other limitations, an application could submit a new list of domains including include entries not previously listed. Ā This could permit the application to resolve domain names that were previously restricted.

9.8 2023-11-08 CVE-2023-5941

In versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write(2) system call returns an error. Ā Depending on the nature of an application that calls libc's stdio functions and the presence of errors returned from the write(2) system call (or an overridden stdio write routine) a heap buffer overflow may occur. Such overflows may lead to data corruption or the execution of arbitrary code at the privilege level of the calling program.

5.5 2023-10-04 CVE-2023-5370

On CPU 0 the check for the SMCCC workaround is called before SMCCC support has been initialized. This resulted in no speculative execution workarounds being installed on CPU 0.

7.1 2023-10-04 CVE-2023-5369

Before correction, theĀ copy_file_rangeĀ system call checked only for the CAP_READ and CAP_WRITE capabilities on the input and output file descriptors, respectively. Using an offset is logically equivalent to seeking, and the system call must additionally require the CAP_SEEK capability.

This incorrect privilege check enabled sandboxed processes with only read or write but no seek capability on a file descriptor to read data from or write data to an arbitrary location within the file corresponding to that file descriptor.

6.5 2023-10-04 CVE-2023-5368

On an msdosfs filesystem, the 'truncate' or 'ftruncate' system calls under certain circumstances populate the additional space in the file with unallocated data from the underlying disk device, rather than zero bytes.

This may permit a user with write access to files on a msdosfs filesystem to read unintended data (e.g. from a previously deleted file).

7.5 2023-09-06 CVE-2023-4809

In pf packet processing with a 'scrub fragment reassemble' rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recognized as the correct ultimate payload. Instead a packet with multiple IPv6 fragment headers would unexpectedly be interpreted as a fragmented packet, rather than as whatever the real payload is.

As a result, IPv6 fragments may bypass pf firewall rules written on the assumption all fragments have been reassembled and, as a result, be forwarded or processed by the host.

8.8 2023-08-01 CVE-2023-3494

The fwctl driver implements a state machine which is executed when a bhyve guest accesses certain x86 I/O ports. The interface lets the guest copy a string into a buffer resident in the bhyve process' memory. A bug in the state machine implementation can result in a buffer overflowing when copying this string. Malicious, privileged software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root, mitigated by the capabilities assigned through the Capsicum sandbox available to the bhyve process.

7.5 2023-08-01 CVE-2023-3107

A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.

9.8 2023-06-22 CVE-2023-3326

pam_krb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. However, if a keytab is not provisioned on the system, pam_krb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. In a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned, an attacker that is able to control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system.

6.5 2023-02-08 CVE-2023-0751

When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.

7.5 2022-09-06 CVE-2022-32264

sys/netinet/tcp_timer.h in FreeBSD before 7.0 contains a denial-of-service (DoS) vulnerability due to improper handling of TSopt on TCP connections. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

7.5 2022-01-18 CVE-2021-29632

In FreeBSD 13.0-STABLE before n247428-9352de39c3dc, 12.2-STABLE before r370674, 13.0-RELEASE before p6, and 12.2-RELEASE before p12, certain conditions involving use of the highlight buffer while text is scrolling on the console, console data may overwrite data structures associated with the system console or other kernel memory.

3.7 2021-10-19 CVE-2011-1075

FreeBSD's crontab calculates the MD5 sum of the previous and new cronjob to determine if any changes have been made before copying the new version in. In particular, it uses the MD5File() function, which takes a pathname as an argument, and is called with euid 0. A race condition in this process may lead to an arbitrary MD5 comparison regardless of the read permissions.

7.8 2021-08-30 CVE-2021-29631

In FreeBSD 13.0-STABLE before n246941-20f96f215562, 12.2-STABLE before r370400, 11.4-STABLE before r370399, 13.0-RELEASE before p4, 12.2-RELEASE before p10, and 11.4-RELEASE before p13, certain VirtIO-based device models in bhyve failed to handle errors when fetching I/O descriptors. A malicious guest may cause the device model to operate on uninitialized I/O vectors leading to memory corruption, crashing of the bhyve process, and possibly arbitrary code execution in the bhyve process.

8.1 2021-08-30 CVE-2021-29630

In FreeBSD 13.0-STABLE before n246938-0729ba2f49c9, 12.2-STABLE before r370383, 11.4-STABLE before r370381, 13.0-RELEASE before p4, 12.2-RELEASE before p10, and 11.4-RELEASE before p13, the ggatec daemon does not validate the size of a response before writing it to a fixed-sized buffer allowing a malicious attacker in a privileged network position to overwrite the stack of ggatec and potentially execute arbitrary code.

7.5 2021-06-04 CVE-2020-7469

In FreeBSD 12.2-STABLE before r367402, 11.4-STABLE before r368202, 12.2-RELEASE before p1, 12.1-RELEASE before p11 and 11.4-RELEASE before p5 the handler for a routing option caches a pointer into the packet buffer holding the ICMPv6 message. However, when processing subsequent options the packet buffer may be freed, rendering the cached pointer invalid. The network stack may later dereference the pointer, potentially triggering a use-after-free.

7.5 2021-05-28 CVE-2021-29629

In FreeBSD 13.0-STABLE before n245765-bec0d2c9c841, 12.2-STABLE before r369859, 11.4-STABLE before r369866, 13.0-RELEASE before p1, 12.2-RELEASE before p7, and 11.4-RELEASE before p10, missing message validation in libradius(3) could allow malicious clients or servers to trigger denial of service in vulnerable servers or clients respectively.

7.5 2021-05-28 CVE-2021-29628

In FreeBSD 13.0-STABLE before n245764-876ffe28796c, 12.2-STABLE before r369857, 13.0-RELEASE before p1, and 12.2-RELEASE before p7, a system call triggering a fault could cause SMAP protections to be disabled for the duration of the system call. This weakness could be combined with other kernel bugs to craft an exploit.

7.8 2021-04-07 CVE-2021-29627

In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 before p0, and 12.2-RELEASE before p6, listening socket accept filters implementing the accf_create callback incorrectly freed a process supplied argument string. Additional operations on the socket can lead to a double free or use after free.

5.5 2021-04-07 CVE-2021-29626

In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11.4-STABLE before r369559, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, copy-on-write logic failed to invalidate shared memory page mappings between multiple processes allowing an unprivileged process to maintain a mapping after it is freed, allowing the process to read private data belonging to other processes or the kernel.

7.5 2021-04-07 CVE-2020-25584

In FreeBSD 13.0-STABLE before n245118, 12.2-STABLE before r369552, 11.4-STABLE before r369560, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, a superuser inside a FreeBSD jail configured with the non-default allow.mount permission could cause a race condition between the lookup of ".." and remounting a filesystem, allowing access to filesystem hierarchy outside of the jail.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
10% (28) CWE-20 Improper Input Validation
10% (27) CWE-264 Permissions, Privileges, and Access Controls
9% (25) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
8% (21) CWE-200 Information Exposure
5% (15) CWE-787 Out-of-bounds Write
4% (12) CWE-189 Numeric Errors
4% (11) CWE-399 Resource Management Errors
4% (11) CWE-330 Use of Insufficiently Random Values
3% (10) CWE-416 Use After Free
3% (10) CWE-362 Race Condition
3% (8) CWE-190 Integer Overflow or Wraparound
3% (8) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
2% (7) CWE-476 NULL Pointer Dereference
2% (7) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (6) CWE-125 Out-of-bounds Read
1% (5) CWE-287 Improper Authentication
1% (4) CWE-665 Improper Initialization
1% (3) CWE-345 Insufficient Verification of Data Authenticity
1% (3) CWE-203 Information Exposure Through Discrepancy
1% (3) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
0% (2) CWE-772 Missing Release of Resource after Effective Lifetime
0% (2) CWE-770 Allocation of Resources Without Limits or Throttling
0% (2) CWE-667 Insufficient Locking
0% (2) CWE-415 Double Free
0% (2) CWE-404 Improper Resource Shutdown or Release

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-17 Accessing, Modifying or Executing Executable Files
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-25 Forced Deadlock
CAPEC-26 Leveraging Race Conditions
CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-30 Hijacking a Privileged Thread of Execution
CAPEC-39 Manipulating Opaque Client-based Data Tokens
CAPEC-42 MIME Conversion
CAPEC-44 Overflow Binary Resource File
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-51 Poison Web Service Registry
CAPEC-58 Restful Privilege Elevation
CAPEC-59 Session Credential Falsification through Prediction
CAPEC-60 Reusing Session IDs (aka Session Replay)
CAPEC-63 Simple Script Injection
CAPEC-67 String Format Overflow in syslog()

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:5931 The vacation program erroneously passes parameters to sendmail.
oval:org.mitre.oval:def:10888 cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating sys...
oval:org.mitre.oval:def:1828 Buffer Overflow in "in.telnetd"or "telnetd"Process
oval:org.mitre.oval:def:9 Solaris 8 RPC xdr_array Buffer Overflow
oval:org.mitre.oval:def:4728 SunRPC xdr_array Function Integer Overflow
oval:org.mitre.oval:def:42 Solaris 7 RPC xdr_array Buffer Overflow
oval:org.mitre.oval:def:2539 BIND SIG Resource Records Buffer Overflow
oval:org.mitre.oval:def:449 Bind OPT Resource Record DoS Vulnerability
oval:org.mitre.oval:def:2094 BIND DoS via SIG RR Elements
oval:org.mitre.oval:def:2665 Data Leak in NIC
oval:org.mitre.oval:def:28706 Critical Patch Update January 2015
oval:org.mitre.oval:def:230 xdrmem_bytes() Integer Overflow Vulnerability
oval:org.mitre.oval:def:1970 Off-by-one Error in fb_realpath()
oval:org.mitre.oval:def:597 Denial of Service in Sendmail via the enhdnsbl Feature
oval:org.mitre.oval:def:603 Sendmail BO in prescan Function
oval:org.mitre.oval:def:572 Sendmail BO in Prescan Function
oval:org.mitre.oval:def:2975 Sendmail prescan function Buffer Overflow
oval:org.mitre.oval:def:2011 ISC BIND Cache Poison Denial Of Service
oval:org.mitre.oval:def:9779 The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to...
oval:org.mitre.oval:def:975 Red Hat OpenSSL do_change_cipher_spec Function Denial of Service
oval:org.mitre.oval:def:870 Red Hat Enterprise 3 OpenSSL do_change_cipher_spec Function Denial of Service
oval:org.mitre.oval:def:5770 Multiple Vendor OpenSSL 0.9.6x, 0.9.7x Null-Pointer DoS Vulnerability
oval:org.mitre.oval:def:2621 OpenSSL Denial of Service Vulnerabilities
oval:org.mitre.oval:def:902 Red Hat OpenSSL Improper Unknown Message Handling Vulnerability
oval:org.mitre.oval:def:871 Red Hat Enterprise 3 OpenSSL Improper Unknown Message Handling Vulnerability

SAINT Exploits

Description Link
Telnetd Encryption Key ID Code Execution More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
78020 FreeBSD telnetd Multiple telnet/libtelnet/encrypt.c encrypt_keyid() Function ...
76945 OpenPAM Pam Services Traversal Local Privilege Escalation
75788 FreeBSD UNIX Domain Socket sys/kern/uipc_usrreq.c uipc_bind() Function Local ...
75249 OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
75248 OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
75011 crontab crontab.c Temporary File Symlink Arbitrary MD5 Hash Comparison
75010 crontab crontab.c realpath() Temporary File Symlink Directory Enumeration
75009 crontab crontab.c stat() Call Temporary File Symlink Arbitrary File Enumeration
75007 libc glob Expression Pathname Matching Remote DoS (2010-4754)
74934 KAME IPSEC Implementations Spoofed ESP Packet DoS
74927 X.Org libXfont src/fontfile/decompress.c BufCompressedFill() Function LZW Dec...
73388 Multiple Vendor libc Implentation fnmatch.c Memory Consumption DoS
73383 Apache HTTP Server Portable Runtime (APR) Library apr_fnmatch() Infinite Loop...
72130 FreeBSD mountd mountd.c makemask Function NFS Mount Request Access Restrictio...
68313 FreeBSD pseudofs pfs_getattr() Function NULL Dereference Local Privilege Esca...
68291 NetBSD Kernel netsmb Module smb_subr.c /dev/nsmb IOCTL Operation Integer Sign...
67346 Multiple Unix Vendor rpc.pcnfsd pr_init() Symlink Arbitrary File Permission M...
67330 Coda Filesystem Kernel Module IOCTL ViceIoctl Struct Local Memory Disclosure
66316 FreeBSD Read-only Flag Copy Weakness Duplicate mbuf Buffer Reference Sendfile...
65152 FreeBSD jail(8) Descendant Process CWD Escape Arbitrary File Access
65036 FreeBSD nfsclient nfs_vfsops.c nfs_mount() Function File Handle Buffer Mounti...
64949 OPIE readrec.c __opiereadrec() Off-by-One Remote Code Execution
63646 J Programming Language libc dtoa Implementation Floating Point Parsing Memory...
63641 Matlab libc dtoa Implementation Floating Point Parsing Memory Corruption
63639 Apple Mac OS X libc dtoa Implementation Floating Point Parsing Memory Corruption

ExploitDB Exploits

id Description
26454 FreeBSD 9 Address Space Manipulation Privilege Escalation
26076 Cisco ASA < 8.4.4.6|8.2.5.32 Ethernet Information Leak
22131 Linux Kernel 2.0.x/2.2.x/2.4.x,FreeBSD 4.x Network Device Driver Frame Paddin...
16951 FreeBSD <= 6.4 Netgraph Local Privledge Escalation Exploit
12762 FreeBSD 8.0 ftpd off-by one PoC (FreeBSD-SA-10:05)
10380 Sunbird 0.9 Array Overrun (code execution) 0day
10187 Opera 10.01 Remote Array Overrun
10186 K-Meleon 1.5.3 Remote Array Overrun
10185 SeaMonkey 1.1.8 Remote Array Overrun
10184 KDE KDELibs 4.3.3 Remote Array Overrun
9082 FreeBSD 7.0/7.1 vfs.usermount Local Privilege Escalation Exploit
3555 Ethernet Device Drivers Frame Padding - Info Leakage Exploit (Etherleak)

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-12-18 Name : Fedora Update for xen FEDORA-2012-19828
File : nvt/gb_fedora_2012_19828_xen_fc16.nasl
2012-12-14 Name : Fedora Update for xen FEDORA-2012-19717
File : nvt/gb_fedora_2012_19717_xen_fc17.nasl
2012-12-13 Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen)
File : nvt/gb_suse_2012_0886_1.nasl
2012-11-26 Name : FreeBSD Ports: FreeBSD
File : nvt/freebsd_FreeBSD20.nasl
2012-11-23 Name : Fedora Update for xen FEDORA-2012-18242
File : nvt/gb_fedora_2012_18242_xen_fc17.nasl
2012-11-23 Name : Fedora Update for xen FEDORA-2012-18249
File : nvt/gb_fedora_2012_18249_xen_fc16.nasl
2012-11-15 Name : Fedora Update for xen FEDORA-2012-17204
File : nvt/gb_fedora_2012_17204_xen_fc17.nasl
2012-11-15 Name : Fedora Update for xen FEDORA-2012-17408
File : nvt/gb_fedora_2012_17408_xen_fc16.nasl
2012-10-03 Name : Gentoo Security Advisory GLSA 201209-24 (PostgreSQL)
File : nvt/glsa_201209_24.nasl
2012-09-26 Name : Gentoo Security Advisory GLSA 201209-03 (php)
File : nvt/glsa_201209_03.nasl
2012-09-25 Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2012-004)
File : nvt/gb_macosx_su12-004.nasl
2012-09-22 Name : Fedora Update for xen FEDORA-2012-13434
File : nvt/gb_fedora_2012_13434_xen_fc17.nasl
2012-09-22 Name : Fedora Update for xen FEDORA-2012-13443
File : nvt/gb_fedora_2012_13443_xen_fc16.nasl
2012-09-10 Name : Slackware Advisory SSA:2011-133-01 apr/apr-util
File : nvt/esoft_slk_ssa_2011_133_01.nasl
2012-08-30 Name : Fedora Update for php FEDORA-2012-10936
File : nvt/gb_fedora_2012_10936_php_fc17.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-11182
File : nvt/gb_fedora_2012_11182_xen_fc17.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-11755
File : nvt/gb_fedora_2012_11755_xen_fc17.nasl
2012-08-30 Name : Fedora Update for postgresql FEDORA-2012-12156
File : nvt/gb_fedora_2012_12156_postgresql_fc16.nasl
2012-08-30 Name : Fedora Update for postgresql FEDORA-2012-12165
File : nvt/gb_fedora_2012_12165_postgresql_fc17.nasl
2012-08-30 Name : Fedora Update for postgresql FEDORA-2012-8924
File : nvt/gb_fedora_2012_8924_postgresql_fc17.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-9386
File : nvt/gb_fedora_2012_9386_xen_fc17.nasl
2012-08-30 Name : Fedora Update for maniadrive FEDORA-2012-9490
File : nvt/gb_fedora_2012_9490_maniadrive_fc17.nasl
2012-08-30 Name : Fedora Update for php FEDORA-2012-9490
File : nvt/gb_fedora_2012_9490_php_fc17.nasl
2012-08-24 Name : Fedora Update for xen FEDORA-2012-11785
File : nvt/gb_fedora_2012_11785_xen_fc16.nasl
2012-08-10 Name : Debian Security Advisory DSA 2491-1 (postgresql-8.4)
File : nvt/deb_2491_1.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0222 Multiple Security Vulnerabilities in Apple iOS
Severity: Category I - VMSKEY: V0061471
2013-A-0151 ISC BIND 9 Remote Denial of Service Vulnerability
Severity: Category I - VMSKEY: V0039823
2012-A-0056 Multiple Vulnerabilities in VMWare ESX 4.0 and ESXi 4.0
Severity: Category I - VMSKEY: V0031979
2008-B-0070 Multiple Vendors IPv6 Neighbor Discovery Protocol Spoofing Vulnerability
Severity: Category II - VMSKEY: V0017557

SnortĀ® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 record route rr denial of service attempt
RuleID : 8730 - Type : PROTOCOL-ICMP - Revision : 6
2014-01-10 vrfy decode
RuleID : 672-community - Type : SERVER-MAIL - Revision : 17
2014-01-10 vrfy decode
RuleID : 672 - Type : SERVER-MAIL - Revision : 17
2014-01-10 Sendmail expn decode
RuleID : 659-community - Type : SERVER-MAIL - Revision : 18
2014-01-10 Sendmail expn decode
RuleID : 659 - Type : SERVER-MAIL - Revision : 18
2014-01-10 RCPT TO overflow
RuleID : 654-community - Type : SERVER-MAIL - Revision : 28
2014-01-10 RCPT TO overflow
RuleID : 654 - Type : SERVER-MAIL - Revision : 28
2014-01-10 portmap pcnfsd request UDP
RuleID : 581-community - Type : PROTOCOL-RPC - Revision : 18
2014-01-10 portmap pcnfsd request UDP
RuleID : 581 - Type : PROTOCOL-RPC - Revision : 18
2014-01-10 portmap amountd request UDP
RuleID : 576-community - Type : PROTOCOL-RPC - Revision : 17
2014-01-10 portmap amountd request UDP
RuleID : 576 - Type : PROTOCOL-RPC - Revision : 17
2014-01-10 AMD Overflow
RuleID : 573 - Type : RPC - Revision : 9
2019-08-31 Apple DMG ffs_mountfs integer overflow exploit attempt
RuleID : 50853 - Type : FILE-OTHER - Revision : 1
2019-08-31 Apple DMG ffs_mountfs integer overflow exploit attempt
RuleID : 50852 - Type : FILE-OTHER - Revision : 1
2018-09-19 ntpq decode array buffer overflow attempt
RuleID : 47585 - Type : SERVER-OTHER - Revision : 4
2018-07-10 Microsoft Windows Interrupt Service Routine stack rollback attempt
RuleID : 46910 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows Interrupt Service Routine stack rollback attempt
RuleID : 46909 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows processor modification return to user-mode attempt
RuleID : 46908 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows processor modification return to user-mode attempt
RuleID : 46907 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows malicious CONTEXT structure creation attempt
RuleID : 46906 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows malicious CONTEXT structure creation attempt
RuleID : 46905 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows SYSTEM token stealing attempt
RuleID : 46904 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10 Microsoft Windows SYSTEM token stealing attempt
RuleID : 46903 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-03 Microsoft Windows kernel privilege escalation attempt
RuleID : 46835 - Type : OS-WINDOWS - Revision : 1
2018-07-03 Microsoft Windows kernel privilege escalation attempt
RuleID : 46834 - Type : OS-WINDOWS - Revision : 1

NessusĀ® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-a7ac26523d.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-d3cb6f113c.nasl - Type: ACT_GATHER_INFO
2018-12-11 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_32498c8ffc8411e8be12a4badb2f4699.nasl - Type: ACT_GATHER_INFO
2018-11-30 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_sa-18-13_nfs.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-2911.nasl - Type: ACT_GATHER_INFO
2018-11-21 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1378.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote Debian host is missing a security update.
File: debian_DLA-1573.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote Debian host is missing a security update.
File: debian_DLA-1577.nasl - Type: ACT_GATHER_INFO
2018-11-13 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_791841a3d4844878890992ef9ce424f4.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09618.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09619.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09620.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09621.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09622.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09623.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09624.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote AIX host is missing a security patch.
File: aix_IJ09625.nasl - Type: ACT_GATHER_INFO
2018-11-02 Name: The remote Debian host is missing a security update.
File: debian_DLA-1564.nasl - Type: ACT_GATHER_INFO
2018-11-02 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL17403481.nasl - Type: ACT_GATHER_INFO
2018-11-02 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL21344224.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1263.nasl - Type: ACT_GATHER_INFO
2018-09-18 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1270.nasl - Type: ACT_GATHER_INFO
2018-09-13 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_a67c122ab69311e8ac58a4badb2f4699.nasl - Type: ACT_GATHER_INFO
2018-08-23 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_359e1548a65211e8805ba4badb2f4699.nasl - Type: ACT_GATHER_INFO