This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:freebsd:freebsd
Detail
VendorFreebsdFirst view 1990-05-09
ProductFreebsdLast view2019-08-30
VersionTypeOs
Edition 
Language 
Update 

Activity : Overall

COMMON PLATFORM ENUMERATION : Repartition per Version

CPE NameAffected CVE
cpe:/o:freebsd:freebsd:4.085
cpe:/o:freebsd:freebsd:4.281
cpe:/o:freebsd:freebsd:4.180
cpe:/o:freebsd:freebsd:4.1.177
cpe:/o:freebsd:freebsd:3.070
Hide | Show 45 More...
CPE NameAffected CVE
cpe:/o:freebsd:freebsd:3.269
cpe:/o:freebsd:freebsd:2.1.067
cpe:/o:freebsd:freebsd:3.166
cpe:/o:freebsd:freebsd:3.465
cpe:/o:freebsd:freebsd:4.3:-65
cpe:/o:freebsd:freebsd:4.4:-65
cpe:/o:freebsd:freebsd:2.064
cpe:/o:freebsd:freebsd63
cpe:/o:freebsd:freebsd:3.563
cpe:/o:freebsd:freebsd:3.3:-63
cpe:/o:freebsd:freebsd:2.1.562
cpe:/o:freebsd:freebsd:5.0:-62
cpe:/o:freebsd:freebsd:2.261
cpe:/o:freebsd:freebsd:2.0.561
cpe:/o:freebsd:freebsd:3.5.160
cpe:/o:freebsd:freebsd:2.1.658
cpe:/o:freebsd:freebsd:4.5:-58
cpe:/o:freebsd:freebsd:4.6:-58
cpe:/o:freebsd:freebsd:1.1.5.157
cpe:/o:freebsd:freebsd:2.2.255
cpe:/o:freebsd:freebsd:-55
cpe:/o:freebsd:freebsd:2.2.554
cpe:/o:freebsd:freebsd:2.2.453
cpe:/o:freebsd:freebsd:2.2.353
cpe:/o:freebsd:freebsd:2.2.853
cpe:/o:freebsd:freebsd:2.2.653
cpe:/o:freebsd:freebsd:2.1.7.153
cpe:/o:freebsd:freebsd:4.7:-52
cpe:/o:freebsd:freebsd:2.1.6.151
cpe:/o:freebsd:freebsd:4.8:-51
cpe:/o:freebsd:freebsd:5.1:-49
cpe:/o:freebsd:freebsd:5.2:-49
cpe:/o:freebsd:freebsd:4.5:release47
cpe:/o:freebsd:freebsd:2.1.746
cpe:/o:freebsd:freebsd:1.046
cpe:/o:freebsd:freebsd:1.146
cpe:/o:freebsd:freebsd:4.9:-46
cpe:/o:freebsd:freebsd:4.0:alpha45
cpe:/o:freebsd:freebsd:1.245
cpe:/o:freebsd:freebsd:4.1.1:stable44
cpe:/o:freebsd:freebsd:4.1.1:release44
cpe:/o:freebsd:freebsd:2.0.144
cpe:/o:freebsd:freebsd:1.544
cpe:/o:freebsd:freebsd:5.3:-44
cpe:/o:freebsd:freebsd:0.4_143

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
7.82019-08-30CVE-2019-5612NetworkLowNone Requ...
7.82019-08-30CVE-2019-5611NetworkLowNone Requ...
52019-08-30CVE-2019-5610NetworkLowNone Requ...
6.42019-08-30CVE-2019-5609NetworkLowNone Requ...
7.52019-08-30CVE-2019-5608NetworkLowNone Requ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
7.22019-07-25CVE-2019-5607LocalLowNone Requ...
7.22019-07-25CVE-2019-5606LocalLowNone Requ...
6.82019-07-25CVE-2019-5605NetworkLowRequires ...
8.52019-07-25CVE-2019-5604NetworkLowRequires ...
7.22019-07-25CVE-2019-5603LocalLowNone Requ...
92019-07-03CVE-2019-5602NetworkLowRequires ...
42019-07-03CVE-2019-5601NetworkLowRequires ...
7.52019-07-03CVE-2019-5600NetworkLowNone Requ...
7.82019-07-02CVE-2019-5599NetworkLowNone Requ...
52019-05-15CVE-2019-8936NetworkLowNone Requ...
52019-05-15CVE-2019-5598NetworkLowNone Requ...
6.42019-05-15CVE-2019-5597NetworkLowNone Requ...
7.52019-01-03CVE-2018-17161NetworkLowNone Requ...
102018-12-04CVE-2018-17160NetworkLowNone Requ...
7.82018-12-04CVE-2018-17159NetworkLowNone Requ...
7.82018-12-04CVE-2018-17158NetworkLowNone Requ...
102018-12-04CVE-2018-17157NetworkLowNone Requ...
4.32018-11-28CVE-2018-17156NetworkMediumNone Requ...
4.92018-09-28CVE-2018-6925LocalLowNone Requ...

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
18% (35)CWE-264Permissions, Privileges, and Access Controls
13% (26)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
12% (23)CWE-20Improper Input Validation
11% (21)CWE-200Information Exposure
6% (13)CWE-399Resource Management Errors
Hide | Show 20 More...
%idName
6% (13)CWE-189Numeric Errors
5% (10)CWE-330Use of Insufficiently Random Values
3% (6)CWE-476NULL Pointer Dereference
3% (6)CWE-190Integer Overflow or Wraparound
2% (5)CWE-400Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (4)CWE-362Race Condition
2% (4)CWE-310Cryptographic Issues
2% (4)CWE-125Out-of-bounds Read
1% (2)CWE-787Out-of-bounds Write
1% (2)CWE-416Use After Free
1% (2)CWE-22Improper Limitation of a Pathname to a Restricted Directory ('Path ...
1% (2)CWE-16Configuration
0% (1)CWE-732Incorrect Permission Assignment for Critical Resource
0% (1)CWE-415Double Free
0% (1)CWE-352Cross-Site Request Forgery (CSRF)
0% (1)CWE-345Insufficient Verification of Data Authenticity
0% (1)CWE-287Improper Authentication
0% (1)CWE-269Improper Privilege Management
0% (1)CWE-255Credentials Management
0% (1)CWE-134Uncontrolled Format String

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idName
CAPEC-1Accessing Functionality Not Properly Constrained by ACLs
CAPEC-8Buffer Overflow in an API Call
CAPEC-9Buffer Overflow in Local Command-Line Utilities
CAPEC-10Buffer Overflow via Environment Variables
CAPEC-13Subverting Environment Variable Values
Hide | Show 20 More...
idName
CAPEC-14Client-side Injection-induced Buffer Overflow
CAPEC-17Accessing, Modifying or Executing Executable Files
CAPEC-18Embedding Scripts in Nonscript Elements
CAPEC-24Filter Failure through Buffer Overflow
CAPEC-25Forced Deadlock
CAPEC-26Leveraging Race Conditions
CAPEC-29Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-39Manipulating Opaque Client-based Data Tokens
CAPEC-42MIME Conversion
CAPEC-44Overflow Binary Resource File
CAPEC-45Buffer Overflow via Symbolic Links
CAPEC-46Overflow Variables and Tags
CAPEC-47Buffer Overflow via Parameter Expansion
CAPEC-51Poison Web Service Registry
CAPEC-58Restful Privilege Elevation
CAPEC-59Session Credential Falsification through Prediction
CAPEC-60Reusing Session IDs (aka Session Replay)
CAPEC-63Simple Script Injection
CAPEC-67String Format Overflow in syslog()
CAPEC-73User-Controlled Filename

SAINT Exploits

DescriptionLink
Telnetd Encryption Key ID Code ExecutionMore info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
78020FreeBSD telnetd Multiple telnet/libtelnet/encrypt.c encrypt_keyid() Function ...
76945OpenPAM Pam Services Traversal Local Privilege Escalation
75788FreeBSD UNIX Domain Socket sys/kern/uipc_usrreq.c uipc_bind() Function Local ...
75249OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
75248OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
Hide | Show 20 More...
idDescription
75010crontab crontab.c realpath() Temporary File Symlink Directory Enumeration
75009crontab crontab.c stat() Call Temporary File Symlink Arbitrary File Enumeration
75007libc glob Expression Pathname Matching Remote DoS (2010-4754)
74934KAME IPSEC Implementations Spoofed ESP Packet DoS
74927X.Org libXfont src/fontfile/decompress.c BufCompressedFill() Function LZW Dec...
73388Multiple Vendor libc Implentation fnmatch.c Memory Consumption DoS
73383Apache HTTP Server Portable Runtime (APR) Library apr_fnmatch() Infinite Loop...
73241VMware Multiple Products mount.vmhgfs Symlink Arbitrary Guest OS File Manipul...
72130FreeBSD mountd mountd.c makemask Function NFS Mount Request Access Restrictio...
70681syslog-ng Type Casting Log File Permission Weakness Local File Modification
68313FreeBSD pseudofs pfs_getattr() Function NULL Dereference Local Privilege Esca...
68291NetBSD Kernel netsmb Module smb_subr.c /dev/nsmb IOCTL Operation Integer Sign...
67346Multiple Unix Vendor rpc.pcnfsd pr_init() Symlink Arbitrary File Permission M...
67330Coda Filesystem Kernel Module IOCTL ViceIoctl Struct Local Memory Disclosure
66316FreeBSD Read-only Flag Copy Weakness Duplicate mbuf Buffer Reference Sendfile...
65152FreeBSD jail(8) Descendant Process CWD Escape Arbitrary File Access
65036FreeBSD nfsclient nfs_vfsops.c nfs_mount() Function File Handle Buffer Mounti...
64949OPIE readrec.c __opiereadrec() Off-by-One Remote Code Execution
63646J Programming Language libc dtoa Implementation Floating Point Parsing Memory...
63641Matlab libc dtoa Implementation Floating Point Parsing Memory Corruption

ExploitDB Exploits

idDescription
26454FreeBSD 9 Address Space Manipulation Privilege Escalation
26076Cisco ASA < 8.4.4.6|8.2.5.32 Ethernet Information Leak
22131Linux Kernel 2.0.x/2.2.x/2.4.x,FreeBSD 4.x Network Device Driver Frame Paddin...
16951FreeBSD <= 6.4 Netgraph Local Privledge Escalation Exploit
12762FreeBSD 8.0 ftpd off-by one PoC (FreeBSD-SA-10:05)
Hide | Show 7 More...
idDescription
10380Sunbird 0.9 Array Overrun (code execution) 0day
10187Opera 10.01 Remote Array Overrun
10186K-Meleon 1.5.3 Remote Array Overrun
10185SeaMonkey 1.1.8 Remote Array Overrun
10184KDE KDELibs 4.3.3 Remote Array Overrun
9082FreeBSD 7.0/7.1 vfs.usermount Local Privilege Escalation Exploit
3555Ethernet Device Drivers Frame Padding - Info Leakage Exploit (Etherleak)

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2012-12-18Name : Fedora Update for xen FEDORA-2012-19828
File : nvt/gb_fedora_2012_19828_xen_fc16.nasl
2012-12-14Name : Fedora Update for xen FEDORA-2012-19717
File : nvt/gb_fedora_2012_19717_xen_fc17.nasl
2012-12-13Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen)
File : nvt/gb_suse_2012_0886_1.nasl
2012-11-23Name : Fedora Update for xen FEDORA-2012-18242
File : nvt/gb_fedora_2012_18242_xen_fc17.nasl
2012-11-23Name : Fedora Update for xen FEDORA-2012-18249
File : nvt/gb_fedora_2012_18249_xen_fc16.nasl
Hide | Show 20 More...
idDescription
2012-11-15Name : Fedora Update for xen FEDORA-2012-17204
File : nvt/gb_fedora_2012_17204_xen_fc17.nasl
2012-11-15Name : Fedora Update for xen FEDORA-2012-17408
File : nvt/gb_fedora_2012_17408_xen_fc16.nasl
2012-10-03Name : Gentoo Security Advisory GLSA 201209-24 (PostgreSQL)
File : nvt/glsa_201209_24.nasl
2012-09-26Name : Gentoo Security Advisory GLSA 201209-03 (php)
File : nvt/glsa_201209_03.nasl
2012-09-25Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2012-004)
File : nvt/gb_macosx_su12-004.nasl
2012-09-22Name : Fedora Update for xen FEDORA-2012-13434
File : nvt/gb_fedora_2012_13434_xen_fc17.nasl
2012-09-22Name : Fedora Update for xen FEDORA-2012-13443
File : nvt/gb_fedora_2012_13443_xen_fc16.nasl
2012-09-10Name : Slackware Advisory SSA:2011-133-01 apr/apr-util
File : nvt/esoft_slk_ssa_2011_133_01.nasl
2012-08-30Name : Fedora Update for php FEDORA-2012-10936
File : nvt/gb_fedora_2012_10936_php_fc17.nasl
2012-08-30Name : Fedora Update for xen FEDORA-2012-11182
File : nvt/gb_fedora_2012_11182_xen_fc17.nasl
2012-08-30Name : Fedora Update for xen FEDORA-2012-11755
File : nvt/gb_fedora_2012_11755_xen_fc17.nasl
2012-08-30Name : Fedora Update for postgresql FEDORA-2012-8924
File : nvt/gb_fedora_2012_8924_postgresql_fc17.nasl
2012-08-30Name : Fedora Update for postgresql FEDORA-2012-12156
File : nvt/gb_fedora_2012_12156_postgresql_fc16.nasl
2012-08-30Name : Fedora Update for postgresql FEDORA-2012-12165
File : nvt/gb_fedora_2012_12165_postgresql_fc17.nasl
2012-08-30Name : Fedora Update for xen FEDORA-2012-9386
File : nvt/gb_fedora_2012_9386_xen_fc17.nasl
2012-08-30Name : Fedora Update for maniadrive FEDORA-2012-9490
File : nvt/gb_fedora_2012_9490_maniadrive_fc17.nasl
2012-08-30Name : Fedora Update for php FEDORA-2012-9490
File : nvt/gb_fedora_2012_9490_php_fc17.nasl
2012-08-24Name : Fedora Update for xen FEDORA-2012-11785
File : nvt/gb_fedora_2012_11785_xen_fc16.nasl
2012-08-10Name : Debian Security Advisory DSA 2491-1 (postgresql-8.4)
File : nvt/deb_2491_1.nasl
2012-08-10Name : Debian Security Advisory DSA 2501-1 (xen)
File : nvt/deb_2501_1.nasl

Information Assurance Vulnerability Management (IAVM)

idDescription
2015-A-0222Multiple Security Vulnerabilities in Apple iOS
Severity : Category I - VMSKEY : V0061471
2015-B-0094NVIDIA GPU Driver for FreeBSD Privilege Escalation Vulnerability
Severity : Category II - VMSKEY : V0061147
2013-A-0151ISC BIND 9 Remote Denial of Service Vulnerability
Severity : Category I - VMSKEY : V0039823
2012-A-0056Multiple Vulnerabilities in VMWare ESX 4.0 and ESXi 4.0
Severity : Category I - VMSKEY : V0031979
2011-A-0075Multiple Vulnerabilities in VMware Products
Severity : Category I - VMSKEY : V0028311
Hide | Show 1 More...
idDescription
2008-B-0070Multiple Vendors IPv6 Neighbor Discovery Protocol Spoofing Vulnerability
Severity : Category II - VMSKEY : V0017557

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2014-01-10record route rr denial of service attempt
RuleID : 8730 - Type : PROTOCOL-ICMP - Revision : 6
2014-01-10vrfy decode
RuleID : 672-community - Type : SERVER-MAIL - Revision : 17
2014-01-10vrfy decode
RuleID : 672 - Type : SERVER-MAIL - Revision : 17
2014-01-10Sendmail expn decode
RuleID : 659-community - Type : SERVER-MAIL - Revision : 18
2014-01-10Sendmail expn decode
RuleID : 659 - Type : SERVER-MAIL - Revision : 18
Hide | Show 20 More...
DateDescription
2014-01-10RCPT TO overflow
RuleID : 654-community - Type : SERVER-MAIL - Revision : 28
2014-01-10RCPT TO overflow
RuleID : 654 - Type : SERVER-MAIL - Revision : 28
2014-01-10portmap pcnfsd request UDP
RuleID : 581-community - Type : PROTOCOL-RPC - Revision : 18
2014-01-10portmap pcnfsd request UDP
RuleID : 581 - Type : PROTOCOL-RPC - Revision : 18
2014-01-10portmap amountd request UDP
RuleID : 576-community - Type : PROTOCOL-RPC - Revision : 17
2014-01-10portmap amountd request UDP
RuleID : 576 - Type : PROTOCOL-RPC - Revision : 17
2014-01-10AMD Overflow
RuleID : 573 - Type : RPC - Revision : 9
2019-08-31Apple DMG ffs_mountfs integer overflow exploit attempt
RuleID : 50853 - Type : FILE-OTHER - Revision : 1
2019-08-31Apple DMG ffs_mountfs integer overflow exploit attempt
RuleID : 50852 - Type : FILE-OTHER - Revision : 1
2018-09-19ntpq decode array buffer overflow attempt
RuleID : 47585 - Type : SERVER-OTHER - Revision : 4
2018-07-10Microsoft Windows Interrupt Service Routine stack rollback attempt
RuleID : 46910 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10Microsoft Windows Interrupt Service Routine stack rollback attempt
RuleID : 46909 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10Microsoft Windows processor modification return to user-mode attempt
RuleID : 46908 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10Microsoft Windows processor modification return to user-mode attempt
RuleID : 46907 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10Microsoft Windows malicious CONTEXT structure creation attempt
RuleID : 46906 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10Microsoft Windows malicious CONTEXT structure creation attempt
RuleID : 46905 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10Microsoft Windows SYSTEM token stealing attempt
RuleID : 46904 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-10Microsoft Windows SYSTEM token stealing attempt
RuleID : 46903 - Type : INDICATOR-COMPROMISE - Revision : 2
2018-07-03Microsoft Windows kernel privilege escalation attempt
RuleID : 46835 - Type : OS-WINDOWS - Revision : 1
2018-07-03Microsoft Windows kernel privilege escalation attempt
RuleID : 46834 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2019-01-10Name : The remote device is affected by multiple vulnerabilities.
File : juniper_space_jsa10917_183R1.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-a7ac26523d.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-d3cb6f113c.nasl - Type : ACT_GATHER_INFO
2018-12-11Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_32498c8ffc8411e8be12a4badb2f4699.nasl - Type : ACT_GATHER_INFO
2018-11-30Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_sa-18-13_nfs.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2018-11-27Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZLSA-2017-2911.nasl - Type : ACT_GATHER_INFO
2018-11-21Name : The remote EulerOS Virtualization host is missing a security update.
File : EulerOS_SA-2018-1378.nasl - Type : ACT_GATHER_INFO
2018-11-13Name : The remote Debian host is missing a security update.
File : debian_DLA-1573.nasl - Type : ACT_GATHER_INFO
2018-11-13Name : The remote Debian host is missing a security update.
File : debian_DLA-1577.nasl - Type : ACT_GATHER_INFO
2018-11-13Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_791841a3d4844878890992ef9ce424f4.nasl - Type : ACT_GATHER_INFO
2018-11-09Name : The remote AIX host is missing a security patch.
File : aix_IJ09618.nasl - Type : ACT_GATHER_INFO
2018-11-09Name : The remote AIX host is missing a security patch.
File : aix_IJ09619.nasl - Type : ACT_GATHER_INFO
2018-11-09Name : The remote AIX host is missing a security patch.
File : aix_IJ09620.nasl - Type : ACT_GATHER_INFO
2018-11-09Name : The remote AIX host is missing a security patch.
File : aix_IJ09621.nasl - Type : ACT_GATHER_INFO
2018-11-09Name : The remote AIX host is missing a security patch.
File : aix_IJ09622.nasl - Type : ACT_GATHER_INFO
2018-11-09Name : The remote AIX host is missing a security patch.
File : aix_IJ09623.nasl - Type : ACT_GATHER_INFO
2018-11-09Name : The remote AIX host is missing a security patch.
File : aix_IJ09624.nasl - Type : ACT_GATHER_INFO
2018-11-09Name : The remote AIX host is missing a security patch.
File : aix_IJ09625.nasl - Type : ACT_GATHER_INFO
2018-11-02Name : The remote Debian host is missing a security update.
File : debian_DLA-1564.nasl - Type : ACT_GATHER_INFO
2018-11-02Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL17403481.nasl - Type : ACT_GATHER_INFO
2018-11-02Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL21344224.nasl - Type : ACT_GATHER_INFO
2018-09-18Name : The remote EulerOS Virtualization host is missing multiple security updates.
File : EulerOS_SA-2018-1263.nasl - Type : ACT_GATHER_INFO
2018-09-18Name : The remote EulerOS Virtualization host is missing multiple security updates.
File : EulerOS_SA-2018-1270.nasl - Type : ACT_GATHER_INFO
2018-09-13Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_a67c122ab69311e8ac58a4badb2f4699.nasl - Type : ACT_GATHER_INFO
2018-08-23Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_359e1548a65211e8805ba4badb2f4699.nasl - Type : ACT_GATHER_INFO