This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/o:freebsd:freebsd:4.3:-
Detail
VendorFreebsdFirst view 2001-06-18
ProductFreebsdLast view2018-11-28
Version4.3TypeOs
Edition 
Language 
Update- 
 
CPE Productcpe:/o:freebsd:freebsd

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
 DateAlertAccess VectorAccess ComplexityAuthentication
4.32018-11-28CVE-2018-17156NetworkMediumNone Requ...
7.22018-09-12CVE-2017-1085LocalLowNone Requ...
7.82018-09-12CVE-2017-1084NetworkLowNone Requ...
7.82018-09-12CVE-2017-1083NetworkLowNone Requ...
7.82018-04-10CVE-2017-1081NetworkLowNone Requ...
Hide | Show 20 More...
 DateAlertAccess VectorAccess ComplexityAuthentication
6.82017-10-05CVE-2017-15037NetworkMediumNone Requ...
2.12015-04-10CVE-2015-1415LocalLowNone Requ...
1.92014-06-04CVE-2014-3956LocalMediumNone Requ...
4.92013-11-20CVE-2013-6834LocalLowNone Requ...
4.92013-11-20CVE-2013-6833LocalLowNone Requ...
4.92013-11-20CVE-2013-6832LocalLowNone Requ...
4.32012-07-05CVE-2012-2143NetworkMediumNone Requ...
7.22012-06-12CVE-2012-0217LocalLowNone Requ...
7.12008-10-20CVE-2008-4609NetworkMediumNone Requ...
6.62007-01-11CVE-2007-0166LocalMediumRequires ...
4.92006-09-25CVE-2006-4178LocalLowNone Requ...
7.22006-09-25CVE-2006-4172LocalLowNone Requ...
7.22006-03-23CVE-2006-1283LocalLowNone Requ...
4.32005-12-31CVE-2005-4351LocalLowRequires ...
52005-07-05CVE-2005-2068NetworkLowNone Requ...
52005-05-31CVE-2005-0356NetworkLowNone Requ...
4.62005-05-06CVE-2005-1406LocalLowNone Requ...
3.72005-05-02CVE-2005-0988LocalHighNone Requ...
102005-05-02CVE-2005-0708NetworkLowNone Requ...

CWE : Common Weakness Enumeration

%idName
23% (4)CWE-200Information Exposure
23% (4)CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
17% (3)CWE-20Improper Input Validation
5% (1)CWE-787Out-of-bounds Write
5% (1)CWE-399Resource Management Errors
Hide | Show 4 More...
%idName
5% (1)CWE-362Race Condition
5% (1)CWE-310Cryptographic Issues
5% (1)CWE-125Out-of-bounds Read
5% (1)CWE-16Configuration

CAPEC : Common Attack Pattern Enumeration & Classification

idName
CAPEC-1Accessing Functionality Not Properly Constrained by ACLs
CAPEC-13Subverting Environment Variable Values
CAPEC-17Accessing, Modifying or Executing Executable Files
CAPEC-18Embedding Scripts in Nonscript Elements
CAPEC-25Forced Deadlock
Hide | Show 14 More...
idName
CAPEC-39Manipulating Opaque Client-based Data Tokens
CAPEC-45Buffer Overflow via Symbolic Links
CAPEC-51Poison Web Service Registry
CAPEC-58Restful Privilege Elevation
CAPEC-59Session Credential Falsification through Prediction
CAPEC-60Reusing Session IDs (aka Session Replay)
CAPEC-63Simple Script Injection
CAPEC-73User-Controlled Filename
CAPEC-76Manipulating Input to File System Calls
CAPEC-77Manipulating User-Controlled Variables
CAPEC-87Forceful Browsing
CAPEC-92Forced Integer Overflow
CAPEC-104Cross Zone Scripting
CAPEC-128Integer Attacks

Oval Markup Language : Definitions

OvalIDName
oval:org.mitre.oval:def:1970Off-by-one Error in fb_realpath()
oval:org.mitre.oval:def:2665Data Leak in NIC
oval:org.mitre.oval:def:28706Critical Patch Update January 2015
oval:org.mitre.oval:def:21377RHSA-2012:1036: postgresql security update (Moderate)
oval:org.mitre.oval:def:23044ELSA-2012:1036: postgresql security update (Moderate)
Hide | Show 16 More...
idName
oval:org.mitre.oval:def:27122DEPRECATED: ELSA-2012-1036 -- postgresql security update (moderate)
oval:org.mitre.oval:def:19861DSA-2508-1 kfreebsd-8 - privilege escalation
oval:org.mitre.oval:def:19281CRITICAL PATCH UPDATE OCTOBER 2012
oval:org.mitre.oval:def:15596User Mode Scheduler Memory Corruption Vulnerability (CVE-2012-0217)
oval:org.mitre.oval:def:765GNU GZip CHMod File Permission Modification Race ConditionWeakness
oval:org.mitre.oval:def:1169gzip Hard Link Attack
oval:org.mitre.oval:def:10242Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzippe...
oval:org.mitre.oval:def:230xdrmem_bytes() Integer Overflow Vulnerability
oval:org.mitre.oval:def:26065SUSE-SU-2014:0872-1 -- Security update for sendmail
oval:org.mitre.oval:def:9Solaris 8 RPC xdr_array Buffer Overflow
oval:org.mitre.oval:def:4728SunRPC xdr_array Function Integer Overflow
oval:org.mitre.oval:def:42Solaris 7 RPC xdr_array Buffer Overflow
oval:org.mitre.oval:def:1828Buffer Overflow in "in.telnetd"or "telnetd"Process
oval:org.mitre.oval:def:9747Hyper-Threading technology, as used in FreeBSD and other operating systems th...
oval:org.mitre.oval:def:6340TCP/IP Zero Window Size Vulnerability
oval:org.mitre.oval:def:18890CRITICAL PATCH UPDATE JULY 2012

Open Source Vulnerability Database (OSVDB)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
62144F5 Multiple Products TCP/IP Implementation Queue Connection Saturation TCP St...
61133Citrix Multiple Products TCP/IP Implementation Queue Connection Saturation TC...
60393FreeBSD f_count Counter Local Overflow DoS
59910SuSE Linux tip acculog File Lock Local DoS
59909Multiple BSD tip acculog File Lock Local DoS
Hide | Show 20 More...
idDescription
59482Blue Coat Multiple Products TCP/IP Implementation Queue Connection Saturation...
58614McAfee Email and Web Security Appliance TCP/IP Implementation Queue Connectio...
58321Check Point Multiple Products TCP/IP Implementation Queue Connection Saturati...
58189Yamaha RT Series Routers TCP/IP Implementation Queue Connection Saturation TC...
57993Solaris TCP/IP Implementation Queue Connection Saturation TCP State Table Rem...
57795Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State...
57794Multiple BSD TCP/IP Implementation Queue Connection Saturation TCP State Tabl...
57793Multiple Linux TCP/IP Implementation Queue Connection Saturation TCP State Ta...
50286Cisco TCP/IP Implementation Queue Connection Saturation TCP State Table Remot...
32726FreeBSD jail rc.d Symlink Privilege Escalation
29168FreeBSD i386_set_ldt() Integer Signedness Local DoS
29167FreeBSD i386_set_ldt() Local Overflow DoS
24067FreeBSD OPIE opiepasswd getlogin(2) Privilege Escalation
22397Multiple Vendor Securelevels Immutable Flag Bypass
21359FreeBSD procfs fstatfs Function Local DoS
20829FreeBSD pkg_add Temp Directory Permission Weakness
20753Multiple BSD pppd Race Condition Arbitrary File Permission Modification
20288FreeBSD linprocfs cmdline Process Argument Vector Local DoS
19475Multiple BSD exec Race Condition Process Debugger Privilege Escalation
17677FreeBSD TCP Crafted SYN Packet Arbitrary Option Overwrite

ExploitDB Exploits

idDescription
26076Cisco ASA < 8.4.4.6|8.2.5.32 Ethernet Information Leak
22131Linux Kernel 2.0.x/2.2.x/2.4.x,FreeBSD 4.x Network Device Driver Frame Paddin...
3555Ethernet Device Drivers Frame Padding - Info Leakage Exploit (Etherleak)

OpenVAS Exploits

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2012-12-18Name : Fedora Update for xen FEDORA-2012-19828
File : nvt/gb_fedora_2012_19828_xen_fc16.nasl
2012-12-14Name : Fedora Update for xen FEDORA-2012-19717
File : nvt/gb_fedora_2012_19717_xen_fc17.nasl
2012-12-13Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen)
File : nvt/gb_suse_2012_0886_1.nasl
2012-11-23Name : Fedora Update for xen FEDORA-2012-18242
File : nvt/gb_fedora_2012_18242_xen_fc17.nasl
2012-11-23Name : Fedora Update for xen FEDORA-2012-18249
File : nvt/gb_fedora_2012_18249_xen_fc16.nasl
Hide | Show 20 More...
idDescription
2012-11-15Name : Fedora Update for xen FEDORA-2012-17204
File : nvt/gb_fedora_2012_17204_xen_fc17.nasl
2012-11-15Name : Fedora Update for xen FEDORA-2012-17408
File : nvt/gb_fedora_2012_17408_xen_fc16.nasl
2012-10-03Name : Gentoo Security Advisory GLSA 201209-24 (PostgreSQL)
File : nvt/glsa_201209_24.nasl
2012-09-26Name : Gentoo Security Advisory GLSA 201209-03 (php)
File : nvt/glsa_201209_03.nasl
2012-09-25Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2012-004)
File : nvt/gb_macosx_su12-004.nasl
2012-09-22Name : Fedora Update for xen FEDORA-2012-13434
File : nvt/gb_fedora_2012_13434_xen_fc17.nasl
2012-09-22Name : Fedora Update for xen FEDORA-2012-13443
File : nvt/gb_fedora_2012_13443_xen_fc16.nasl
2012-08-30Name : Fedora Update for php FEDORA-2012-10936
File : nvt/gb_fedora_2012_10936_php_fc17.nasl
2012-08-30Name : Fedora Update for xen FEDORA-2012-11182
File : nvt/gb_fedora_2012_11182_xen_fc17.nasl
2012-08-30Name : Fedora Update for xen FEDORA-2012-11755
File : nvt/gb_fedora_2012_11755_xen_fc17.nasl
2012-08-30Name : Fedora Update for postgresql FEDORA-2012-8924
File : nvt/gb_fedora_2012_8924_postgresql_fc17.nasl
2012-08-30Name : Fedora Update for postgresql FEDORA-2012-12156
File : nvt/gb_fedora_2012_12156_postgresql_fc16.nasl
2012-08-30Name : Fedora Update for postgresql FEDORA-2012-12165
File : nvt/gb_fedora_2012_12165_postgresql_fc17.nasl
2012-08-30Name : Fedora Update for xen FEDORA-2012-9386
File : nvt/gb_fedora_2012_9386_xen_fc17.nasl
2012-08-30Name : Fedora Update for maniadrive FEDORA-2012-9490
File : nvt/gb_fedora_2012_9490_maniadrive_fc17.nasl
2012-08-30Name : Fedora Update for php FEDORA-2012-9490
File : nvt/gb_fedora_2012_9490_php_fc17.nasl
2012-08-24Name : Fedora Update for xen FEDORA-2012-11785
File : nvt/gb_fedora_2012_11785_xen_fc16.nasl
2012-08-10Name : Debian Security Advisory DSA 2491-1 (postgresql-8.4)
File : nvt/deb_2491_1.nasl
2012-08-10Name : Debian Security Advisory DSA 2501-1 (xen)
File : nvt/deb_2501_1.nasl
2012-08-10Name : Debian Security Advisory DSA 2508-1 (kfreebsd-8)
File : nvt/deb_2508_1.nasl

Snort® IPS/IDS

DateDescription
2014-01-10RETR overflow attempt
RuleID : 2392-community - Type : PROTOCOL-FTP - Revision : 22
2014-01-10RETR overflow attempt
RuleID : 2392 - Type : PROTOCOL-FTP - Revision : 22
2014-01-10APPE overflow attempt
RuleID : 2391-community - Type : PROTOCOL-FTP - Revision : 17
2014-01-10APPE overflow attempt
RuleID : 2391 - Type : PROTOCOL-FTP - Revision : 17
2014-01-10STOU overflow attempt
RuleID : 2390-community - Type : PROTOCOL-FTP - Revision : 12
Hide | Show 20 More...
DateDescription
2014-01-10STOU overflow attempt
RuleID : 2390 - Type : PROTOCOL-FTP - Revision : 12
2014-01-10PHP truncated crypt function attempt
RuleID : 23896 - Type : SERVER-WEBAPP - Revision : 4
2014-01-10PHP truncated crypt function attempt
RuleID : 23895 - Type : SERVER-WEBAPP - Revision : 5
2014-01-10truncated crypt function attempt
RuleID : 23894 - Type : SERVER-WEBAPP - Revision : 7
2014-01-10RNTO overflow attempt
RuleID : 2389-community - Type : PROTOCOL-FTP - Revision : 21
2014-01-10RNTO overflow attempt
RuleID : 2389 - Type : PROTOCOL-FTP - Revision : 21
2014-01-10CMSD TCP CMSD_CREATE array buffer overflow attempt
RuleID : 2095-community - Type : PROTOCOL-RPC - Revision : 14
2014-01-10CMSD TCP CMSD_CREATE array buffer overflow attempt
RuleID : 2095 - Type : PROTOCOL-RPC - Revision : 14
2014-01-10CMSD UDP CMSD_CREATE array buffer overflow attempt
RuleID : 2094-community - Type : PROTOCOL-RPC - Revision : 18
2014-01-10CMSD UDP CMSD_CREATE array buffer overflow attempt
RuleID : 2094 - Type : PROTOCOL-RPC - Revision : 18
2014-01-10portmap proxy integer overflow attempt TCP
RuleID : 2093-community - Type : PROTOCOL-RPC - Revision : 13
2014-01-10portmap proxy integer overflow attempt TCP
RuleID : 2093 - Type : PROTOCOL-RPC - Revision : 13
2014-01-10portmap proxy integer overflow attempt UDP
RuleID : 2092-community - Type : PROTOCOL-RPC - Revision : 14
2014-01-10portmap proxy integer overflow attempt UDP
RuleID : 2092 - Type : PROTOCOL-RPC - Revision : 14
2014-01-10Microsoft Windows TCP stack zero window size exploit attempt
RuleID : 16294 - Type : OS-WINDOWS - Revision : 15
2014-01-10TCP window closed before receiving data
RuleID : 15912 - Type : OS-WINDOWS - Revision : 9
2014-01-10bsd exploit client finishing
RuleID : 1253-community - Type : PROTOCOL-TELNET - Revision : 23
2014-01-10bsd exploit client finishing
RuleID : 1253 - Type : PROTOCOL-TELNET - Revision : 23
2014-01-10bsd telnet exploit response
RuleID : 1252-community - Type : PROTOCOL-TELNET - Revision : 25
2014-01-10bsd telnet exploit response
RuleID : 1252 - Type : PROTOCOL-TELNET - Revision : 25

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
idDescription
2018-06-15Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_ioctl_call.nasl - Type : ACT_GATHER_INFO
2018-04-10Name : The remote AIX host is missing a security patch.
File : aix_IJ02915.nasl - Type : ACT_GATHER_INFO
2018-04-10Name : The remote AIX host is missing a security patch.
File : aix_IJ02917.nasl - Type : ACT_GATHER_INFO
2018-04-10Name : The remote AIX host is missing a security patch.
File : aix_IJ02918.nasl - Type : ACT_GATHER_INFO
2018-04-10Name : The remote AIX host is missing a security patch.
File : aix_IJ02919.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2018-04-10Name : The remote AIX host is missing a security patch.
File : aix_IJ02920.nasl - Type : ACT_GATHER_INFO
2018-04-10Name : The remote AIX host is missing a security patch.
File : aix_IJ03121.nasl - Type : ACT_GATHER_INFO
2018-04-10Name : The remote AIX host is missing a security patch.
File : aix_IJ03273.nasl - Type : ACT_GATHER_INFO
2017-05-30Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_51d1282d420e11e782c514dae9d210b8.nasl - Type : ACT_GATHER_INFO
2017-05-05Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_sa-17-04_ipfilter.nasl - Type : ACT_GATHER_INFO
2017-01-20Name : The remote device is affected by a memory disclosure vulnerability.
File : juniper_jsa10773.nasl - Type : ACT_GATHER_INFO
2016-08-12Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_0b65f297600a11e6a6c314dae9d210b8.nasl - Type : ACT_GATHER_INFO
2015-03-30Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-128.nasl - Type : ACT_GATHER_INFO
2015-01-23Name : The remote Solaris system is missing a security patch from CPU jan2015.
File : solaris_jan2015_SRU11_1_11_4_0.nasl - Type : ACT_GATHER_INFO
2015-01-19Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_sendmail_20141120.nasl - Type : ACT_GATHER_INFO
2014-12-23Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201412-32.nasl - Type : ACT_GATHER_INFO
2014-11-26Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2012-0020.nasl - Type : ACT_GATHER_INFO
2014-11-26Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2012-0021.nasl - Type : ACT_GATHER_INFO
2014-11-26Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2012-0022.nasl - Type : ACT_GATHER_INFO
2014-10-10Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL4743.nasl - Type : ACT_GATHER_INFO
2014-10-10Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL10509.nasl - Type : ACT_GATHER_INFO
2014-08-01Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-147.nasl - Type : ACT_GATHER_INFO
2014-07-26Name : The remote Solaris system is missing a security patch from CPU oct2012.
File : solaris_oct2012_SRU10_5.nasl - Type : ACT_GATHER_INFO
2014-07-05Name : The remote SuSE 11 host is missing a security update.
File : suse_11_rmail-140604.nasl - Type : ACT_GATHER_INFO
2014-06-20Name : The remote Fedora host is missing a security update.
File : fedora_2014-7095.nasl - Type : ACT_GATHER_INFO