Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown

CVE-2012-4576

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
FreeBSD: Input Validation Flaw allows local users to gain elevated privileges
Attacker Value
Unknown

CVE-2018-6923

Disclosure Date: September 04, 2018 (last updated November 27, 2024)
In FreeBSD before 11.1-STABLE, 11.2-RELEASE-p2, 11.1-RELEASE-p13, ip fragment reassembly code is vulnerable to a denial of service due to excessive system resource consumption. This issue can allow a remote attacker who is able to send an arbitrary ip fragments to cause the machine to consume excessive resources.
0
Attacker Value
Unknown

CVE-2018-3665

Disclosure Date: June 21, 2018 (last updated November 26, 2024)
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
Attacker Value
Unknown

CVE-2018-8897

Disclosure Date: May 08, 2018 (last updated November 26, 2024)
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that tra…
0
Attacker Value
Unknown

CVE-2016-2518

Disclosure Date: January 30, 2017 (last updated November 25, 2024)
The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
Attacker Value
Unknown

CVE-2013-6832

Disclosure Date: November 21, 2013 (last updated October 05, 2023)
The nand_ioctl function in sys/dev/nand/nand_geom.c in the nand driver in the kernel in FreeBSD 10 and earlier does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted ioctl call.
0
Attacker Value
Unknown

CVE-2013-6834

Disclosure Date: November 21, 2013 (last updated October 05, 2023)
The ql_eioctl function in sys/dev/qlxgbe/ql_ioctl.c in the kernel in FreeBSD 10 and earlier does not validate a certain size parameter, which allows local users to obtain sensitive information from kernel memory via a crafted ioctl call.
0
Attacker Value
Unknown

CVE-2013-6833

Disclosure Date: November 21, 2013 (last updated October 05, 2023)
The qls_eioctl function in sys/dev/qlxge/qls_ioctl.c in the kernel in FreeBSD 10 and earlier does not validate a certain size parameter, which allows local users to obtain sensitive information from kernel memory via a crafted ioctl call.
0
Attacker Value
Unknown

CVE-2012-2143

Disclosure Date: July 05, 2012 (last updated March 15, 2024)
The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
0
Attacker Value
Unknown

CVE-2011-4062

Disclosure Date: October 18, 2011 (last updated October 04, 2023)
Buffer overflow in the kernel in FreeBSD 7.3 through 9.0-RC1 allows local users to cause a denial of service (panic) or possibly gain privileges via a bind system call with a long pathname for a UNIX socket.
0