freebsd vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://ftp.freebsd.org|freebsd package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Race Condition

[0,)
  • C
Authentication Bypass by Spoofing

[0,)
  • M
Improper Handling of Additional Special Element

[0,)
  • H
Denial of Service (DoS)

[0,7.0.0_cvs)
  • H
Out-of-bounds Write

[13.0,13.0_6)[12.2,12.2_12)
  • H
Denial of Service (DoS)

[,6.0]
  • H
Access Restriction Bypass

[6.0,7.1]
  • M
Denial of Service (DoS)

[4.10,5.2.1]
  • M
Information Exposure

[8.4,10.1]
  • H
Arbitrary Code Execution

[4.4,4.7]
  • H
Denial of Service (DoS)

[0,RHSA-2007-0347)
  • M
Information Exposure

[,11.2)
  • H
Denial of Service (DoS)

[,9.2)
  • M
Denial of Service (DoS)

[0,)
  • M
Out-of-Bounds

[8.3,10.0]
  • H
Information Exposure

[,8.2)
  • H
Integer Overflow or Wraparound

[10.0,10.4)[11.0,11.1)
  • H
Buffer Overflow

[3.0,3.4]
  • H
Denial of Service (DoS)

[6.0_p5_release,7.0]
  • H
Out-of-Bounds

[0,)
  • H
Buffer Overflow

[2.0,2.1.0]
  • H
Out-of-Bounds

[,11.2)
  • M
Denial of Service (DoS)

[,6.0)
  • M
Buffer Overflow

[,3.3]
  • H
Information Exposure

[10.0,10.4)[11.0,11.1)
  • M
NULL Pointer Dereference

[,11.2)
  • M
Information Exposure

[,10.2)
  • H
Denial of Service (DoS)

[5.0,5.4]
  • H
Access Restriction Bypass

[9.3,10.2]
  • M
Resource Management Errors

[0,5.21)
  • H
Access Restriction Bypass

[7.0,8.0]
  • M
Denial of Service (DoS)

[0,)
  • M
Denial of Service (DoS)

[5.3,5.4]
  • H
Denial of Service (DoS)

[8.4,10.2]
  • M
CVE-1999-0857

[,3.3]
  • M
Denial of Service (DoS)

[,6.2]
  • H
Out-of-Bounds

[,11.2)
  • M
Buffer Overflow

[,3.3]
  • M
Improper Input Validation

[,10.1)
  • H
Directory Traversal

[,8.1]
  • C
Out-of-Bounds

[9.3,11.0]
  • H
Buffer Overflow

[3.0,5.0]
  • H
Improper Input Validation

[8.0,9.1]
  • H
Improper Input Validation

[0,)
  • H
Out-of-Bounds

[,10.1]
  • H
Buffer Overflow

[3.0,3.2]
  • H
Access Restriction Bypass

[5.0,5.4]
  • M
Information Exposure

[1.1.5.1,5.4]
  • H
Out-of-bounds Write

[0,)
  • H
Out-of-Bounds

[,9.1)
  • H
Denial of Service (DoS)

[,11.2)
  • C
CVE-2001-0969

[,4.3]
  • M
Buffer Overflow

[5.4,6.0]
  • M
Access Restriction Bypass

[8.0,9.2]
  • C
Out-of-bounds Write

[,11.2)
  • H
Denial of Service (DoS)

[0,)
  • H
Arbitrary Code Execution

[,6.2]
  • M
Denial of Service (DoS)

[1.1.5.1,5.4]
  • H
Cryptographic Issues

[6.3,7.1]
  • H
Access Restriction Bypass

[7.1,8.1]
  • M
Improper Input Validation

[8.4,10.0]
  • M
Denial of Service (DoS)

[,6.4]
  • M
Denial of Service (DoS)

[4.4,4.7]
  • H
Improper Authentication

[9.3,11.0]
  • M
Denial of Service (DoS)

[,6.1]
  • M
Buffer Overflow

[,5.5]
  • M
Denial of Service (DoS)

[1.1.5.1,2.2.8]
  • H
CVE-2001-1145

[,4.3]
  • M
Denial of Service (DoS)

[,6.1]
  • M
Information Exposure

[11.0,11.1)
  • C
Out-of-Bounds

[9.1,10.1]
  • M
Insufficiently Protected Credentials

[,6.2]
  • M
Arbitrary Code Execution

[,6.2]
  • M
Information Exposure

[4.7,5.4]
  • M
CVE-2001-0196

[3.5,4.2]
  • M
Buffer Overflow

[,3.3]
  • H
Access Restriction Bypass

[9.3,10.2]
  • H
CVE-1999-0017

[1.0,2.1.7]
  • H
Arbitrary Code Execution

[,3.3]
  • H
Resource Management Errors

[0,)
  • M
CVE-2005-2068

[4.0,5.4]
  • H
CVE-2004-0125

[4.0,4.10]
  • M
Denial of Service (DoS)

[3.0,5.0]
  • H
Out-of-Bounds

[,11.2)
  • H
CVE-2000-0998

[3.5,4.1.1]
  • H
Out-of-bounds Read

[,11.3)
  • H
Remote Code Execution (RCE)

[1.1.5.1,6.0]
  • M
CVE-1999-1313

[,2.2.8)
  • H
CVE-2002-0754

[4.0,4.4]
  • H
Buffer Overflow

[3.0,5.0]
  • H
Access Restriction Bypass

[10.0,10.2]
  • L
Arbitrary Code Execution

[,6.2]
  • C
Denial of Service (DoS)

[3.0,5.2]
  • M
Access Restriction Bypass

[6.3_releng,7.2]
  • H
CVE-2001-1185

[,4.4]
  • M
Use After Free

[,11.4)[12.0,12.2)
  • M
Denial of Service (DoS)

[1.1.5.1,5.0]
  • M
Information Exposure

[0,)
  • C
Arbitrary Code Execution

[3.0,5.1]
  • H
Arbitrary Code Execution

[0,)
  • M
Access Restriction Bypass

[6.3,7.0]
  • M
Information Exposure

[0,)
  • H
Access Restriction Bypass

[11.0,11.1)
  • H
Access Restriction Bypass

[4.1.1,4.3]
  • H
CVE-1999-0037

[,6.2]
  • M
CVE-2004-0919

[5.0,5.2.1]
  • H
Remote Code Execution (RCE)

[,2.2.8)
  • M
Access Restriction Bypass

[6.0,8.0]
  • H
Arbitrary Code Execution

[3.0,5.0]
  • H
Denial of Service (DoS)

[1.1.5.1,5.2.1]
  • H
Access Restriction Bypass

[0,)
  • H
Denial of Service (DoS)

[0,)
  • M
CVE-2000-0595

[3.0,4.0]
  • M
Denial of Service (DoS)

[1.0,2.0.5]
  • M
Resource Management Errors

[8.3,10.0]
  • M
CVE-2000-0163

[3.0,3.4]
  • H
Arbitrary Code Execution

[4.0,4.3]
  • H
Access Restriction Bypass

[3.0,4.2]
  • H
Denial of Service (DoS)

[4.1.1,4.4]
  • H
Access Restriction Bypass

[9.3,10.2]
  • C
Denial of Service (DoS)

[,4.1.1)
  • M
Resource Management Errors

[0,)
  • H
Arbitrary Code Execution

[,6.2]
  • M
Arbitrary Code Execution

[,4.1.1]
  • H
Improper Data Handling

[9.3,10.2]
  • M
Denial of Service (DoS)

[,4.6]
  • M
Information Exposure

[0,)
  • H
Access Restriction Bypass

[0,)
  • H
Buffer Overflow

[,3.3]
  • H
CVE-1999-1008

[,3.3]
  • H
Arbitrary Code Execution

[1.1.5.1,3.2]
  • H
Arbitrary Code Execution

[,6.3)
  • M
Authentication Bypass

[0,)
  • H
CVE-2002-0572

[4.4,4.5]
  • M
Access Restriction Bypass

[5.5,7.0]
  • M
Resource Management Errors

[9.1,10.1]
  • H
Arbitrary Code Execution

[3.0,5.0]
  • L
Symlink Attack

[0,)
  • M
Denial of Service (DoS)

[0,)
  • C
Information Exposure

[4.0,5.4]
  • M
Denial of Service (DoS)

[,6.0]
  • H
Out-of-Bounds

[9.3,10.3]
  • H
Access Restriction Bypass

[9.0,9.1]
  • M
Improper Initialization

[0,)
  • M
Denial of Service (DoS)

[,6.1]
  • H
Remote Code Execution (RCE)

[3.5.1,4.2]
  • H
Race Condition

[6.3,6.4]
  • H
Denial of Service (DoS)

[,10.1]
  • M
CVE-1999-0821

[,3.3]
  • M
Denial of Service (DoS)

[3.0,5.0]
  • M
Resource Management Errors

[5.3,5.4]
  • M
Out-of-Bounds

[8.4,10.0]
  • M
Denial of Service (DoS)

[,4.3)
  • H
CVE-2001-0371

[,4.3)
  • M
Information Exposure

[4.0,4.6.1]
  • H
Access Restriction Bypass

[7.0_releng,7.1]
  • M
Denial of Service (DoS)

[,4.5]
  • M
CVE-2005-1399

[4.6,5.4]
  • H
Arbitrary Code Execution

[,4.4)
  • H
Resource Management Errors

[,6.1]
  • M
Denial of Service (DoS)

[,4.5]
  • C
Buffer Overflow

[1.1.5.1,2.1.5]
  • M
Improper Input Validation

[,10.1)
  • C
Arbitrary Code Execution

[,6.0]
  • M
Access Restriction Bypass

[5.3,6.1]
  • H
Improper Input Validation

[11.0,11.1)
  • H
Denial of Service (DoS)

[8.4,10.1]
  • H
Access Restriction Bypass

[8.3,9.2]
  • H
Arbitrary Code Execution

[,2.2.8)
  • H
Authentication Bypass

[2.0,4.1.1]
  • H
Information Exposure

[8.3,9.2]
  • H
Arbitrary Code Execution

[,6.2]
  • M
Improper Input Validation

[6.3,7.2]
  • M
Denial of Service (DoS)

[3.0,4.1.1]
  • M
CVE-2001-1166

[4.0,4.3]
  • H
Denial of Service (DoS)

[7.0_releng,8.0]
  • H
Buffer Overflow

[3.0,5.0]
  • H
CVE-2007-4304

[0,)
  • H
CVE-1999-0781

[,6.2]
  • M
Denial of Service (DoS)

[4.4,4.7]
  • M
Denial of Service (DoS)

[,6.1]
  • H
Double Free

[4.4,5.0]
  • H
CVE-2002-0414

[4.2,4.5]
  • M
Improper Input Validation

[8.4,10.1]
  • H
Denial of Service (DoS)

[0,)
  • H
Access Restriction Bypass

[7.1,8.0]
  • C
Out-of-bounds Read

[0,)
  • M
Denial of Service (DoS)

[3.5.1,4.2]
  • H
Out-of-Bounds

[7.0,7.2]
  • M
Improper Input Validation

[,10.1)
  • M
Denial of Service (DoS)

[6.3_releng,7.2]
  • M
Access Restriction Bypass

[5.1,5.2.1]
  • M
Information Exposure

[9.3,10.2]
  • H
Buffer Overflow

[2.0,2.2]
  • H
CVE-2002-0820

[,4.6]
  • M
Denial of Service (DoS)

[4.3,4.6]
  • M
Access Restriction Bypass

[6.0,7.0]
  • M
Arbitrary Code Execution

[4.10,6.0]
  • M
Resource Management Errors

[0,5.21)
  • M
Access Restriction Bypass

[5.3,5.4]
  • H
Buffer Overflow

[3.5,5.0]
  • M
Denial of Service (DoS)

[,6.1]
  • M
Improper Input Validation

[9.3,10.2]
  • M
Out-of-Bounds

[,11.2)
  • M
Denial of Service (DoS)

[,5.2.1)
  • M
Out-of-Bounds

[9.3,10.2]
  • H
Arbitrary Code Execution

[,4.4]
  • M
CVE-2003-0914

[4.4,5.0]
  • M
CVE-2002-1125

[4.2,4.6]
  • M
CVE-2004-0602

[4.0,5.0]
  • H
Access Restriction Bypass

[0,)
  • M
Information Exposure

[0,)
  • M
Denial of Service (DoS)

[3.0,3.2]
  • H
Denial of Service (DoS)

[,9.2)
  • H
Use After Free

[0,)
  • M
Denial of Service (DoS)

[3.5,5.0]
  • M
Information Exposure

[3.5.1,4.1.1]
  • M
CVE-1999-0780

[,6.2]
  • M
Denial of Service (DoS)

[1.1.5.1,5.0]
  • H
CVE-2001-1017

[4.2,4.3]
  • M
Improper Input Validation

[8.4,9.3]
  • M
Denial of Service (DoS)

[,5.4]
  • M
Denial of Service (DoS)

[4.0,4.1.1]
  • M
Resource Management Errors

[7.3,8.1]
  • M
NULL Pointer Dereference

[,11.2)
  • M
Denial of Service (DoS)

[5.3,6.0]
  • H
CVE-2001-0061

[3.5.1,4.2]
  • H
Denial of Service (DoS)

[8.4,10.1]
  • C
Arbitrary Code Execution

[4.0,5.0]
  • M
Denial of Service (DoS)

[,4.4)
  • M
Information Exposure

[,9.2]
  • H
Improper Input Validation

[6.3,7.1]
  • H
Access Restriction Bypass

[,11.3)
  • M
Denial of Service (DoS)

[,4.5]
  • M
Access Restriction Bypass

[8.3,9.1]
  • M
CVE-2002-0381

[,4.6)
  • M
Denial of Service (DoS)

[,2.2.8)
  • M
Access Restriction Bypass

[6.3,8.0]
  • C
Buffer Overflow

[,6.2]
  • M
Denial of Service (DoS)

[4.0,5.3]
  • M
Improper Input Validation

[4.0,5.2.1]
  • L
Information Exposure

[0,)
  • M
Information Exposure

[0,)
  • M
Directory Traversal

[5.0,6.0]
  • M
Denial of Service (DoS)

[,6.0]
  • H
Access Restriction Bypass

[9.3,10.1]
  • C
Use After Free

[11.0,11.1)
  • M
Information Exposure

[,6.2]
  • H
Information Exposure

[10.1,10.2]
  • H
Buffer Overflow

[,525916_2020-02-12)
  • M
Information Exposure

[5.5,7.0]
  • M
Code

[9.1,10.0]
  • H
Arbitrary Code Execution

[4.0,5.4]
  • M
CVE-1999-1402

[2.2.2,3.1]
  • M
CVE-2002-1669

[4.2,4.4]
  • L
Arbitrary Code Execution

[,6.2]
  • M
Information Exposure

[,4.8][4.8,5.2)
  • H
Access Restriction Bypass

[7.1,8.0]
  • H
Buffer Overflow

[2.0,3.2]
  • M
Improper Input Validation

[7.4,8.2]
  • H
CVE-2000-0993

[3.2,4.0]
  • M
Denial of Service (DoS)

[1.1.5.1,3.2]
  • H
Denial of Service (DoS)

[8.3,9.2]
  • H
Access Restriction Bypass

[,6.2]
  • M
Denial of Service (DoS)

[4.6.2,5.2]
  • M
Authentication Bypass

[,6.2]
  • C
Improper Authentication

[,9.3)
  • M
Improper Input Validation

[0,)
  • M
Resource Management Errors

[,5.4]
  • H
Out-of-bounds Read

[0,)
  • H
Access Restriction Bypass

[7.1,8.0]
  • H
Race Condition

[0,)
  • H
Denial of Service (DoS)

[9.3,10.2]
  • M
Information Exposure

[,6.2]
  • M
Improper Input Validation

[1.0,3.0]
  • M
CVE-1999-0782

[,6.2]
  • H
Out-of-Bounds

[7.0,7.1]
  • M
Denial of Service (DoS)

[0,)
  • C
Integer Overflow or Wraparound

[,11.2)
  • H
Denial of Service (DoS)

[,6.0)
  • M
Arbitrary Code Execution

[,3.2]
  • M
Buffer Overflow

[5.4,6.0]
  • M
Out-of-Bounds

[8.4,10.0]
  • M
Arbitrary Code Execution

[,4.5]
  • M
CVE-1999-0703

[,3.2]
  • L
Denial of Service (DoS)

[4.1,4.5]
  • H
Buffer Overflow

[3.4,4.1.1]
  • H
CVE-2006-0905

[4.8,6.0]
  • M
Denial of Service (DoS)

[,3.2]
  • H
Out-of-Bounds

[8.3,10.0]
  • M
Access Restriction Bypass

[8.1-prerelease,8.0]
  • M
Improper Input Validation

[6.3,7.1]
  • M
Denial of Service (DoS)

[4.6,5.0]
  • M
Denial of Service (DoS)

[4.0,5.1]
  • H
Resource Management Errors

[10.0,10.4)[11.0,11.1)
  • M
CVE-2002-2092

[2.0,4.4]
  • M
CVE-1999-0820

[,3.3]
  • M
Resource Management Errors

[4.0,5.3]
  • H
Buffer Overflow

[3.1,5.0]
  • H
Arbitrary Code Execution

[2.0,2.1.5]
  • H
Buffer Overflow

[,2.2.8)
  • L
Information Exposure

[0,)
  • L
Information Exposure

[,9.3)
  • M
Information Exposure

[,10.1)
  • H
Denial of Service (DoS)

[,8.2]
  • H
Improper Input Validation

[7.4,9.1]
  • M
CVE-2004-0126

[5.1,5.2.1]
  • H
Privilege Escalation

[,525916_2020-02-12)
  • H
CVE-2007-4303

[0,)
  • M
Denial of Service (DoS)

[3.4,5.0]
  • H
Integer Overflow or Wraparound

[,11.2)
  • H
Cross-site Request Forgery (CSRF)

[,7.0]
  • H
Improper Input Validation

[,11)
  • M
Access Restriction Bypass

[8.4,10.1]
  • H
Improper Input Validation

[10.0,10.4][11.0,11.1)
  • H
Resource Management Errors

[0,)
  • H
Buffer Overflow

[3.0,3.4]
  • H
Integer Overflow or Wraparound

[10.1,11.0]
  • M
Information Exposure

[10.0,10.4)[11.0,11.1)
  • H
Race Condition

[,11.4)[12.0,12.2)
  • H
Access Restriction Bypass

[4.4,4.5]
  • H
Out-of-Bounds

[7.3,9.0]
  • H
Access Restriction Bypass

[,4.1.1)
  • H
Access Restriction Bypass

[6.3,7.0]
  • C
Out-of-bounds Read

[0,)
  • H
Denial of Service (DoS)

[,6.1]
  • H
Improper Input Validation

[8.1-prerelease,8.0]
  • H
CVE-2000-1167

[3.5,4.1.1]
  • H
Buffer Overflow

[,6.2]
  • H
Access Restriction Bypass

[10.1,10.3]
  • M
Information Exposure

[4.1,5.4]
  • M
Denial of Service (DoS)

[,4.5]
  • H
Access Restriction Bypass

[5.0,7.0]
  • M
Denial of Service (DoS)

[,6.4]
  • H
Access Restriction Bypass

[3.5.1,4.2]
  • M
CVE-2004-0370

[,5.2]
  • C
Denial of Service (DoS)

[4.11,6.1]
  • M
NULL Pointer Dereference

[0,4.2.8p6)
  • C
Out-of-bounds Write

[0,4.2.8p11)
  • M
Security Features

[10.0,10.1)
  • M
Out-of-bounds Read

[0,4.2.8p7)
  • M
Improper Input Validation

[0,4.2.8p10)
  • H
Denial of Service (DoS)

[8.0,9.2]
  • C
Denial of Service (DoS)

[0,)
  • M
Out-of-Bounds

[6.4,7.2]
  • M
Information Exposure

[4.2,4.7]
  • M
CVE-2005-4351

[,6.1)
  • H
CVE-1999-0138

[2.0,2.1.0]
  • M
Cryptographic Issues

[0,)
  • M
Denial of Service (DoS)

[,3.2]
  • M
Denial of Service (DoS)

[1.1.5.1,2.2.4]
  • M
Cross-site Scripting (XSS)

[,7.1]
  • M
Denial of Service (DoS)

[,4.3]
  • H
Out-of-Bounds

[0,)
  • H
Symlink Attack

[0,)
  • M
NULL Pointer Dereference

[,7.1)
  • M
Out-of-bounds Write

[0,)
  • H
Access Restriction Bypass

[0,)
  • C
Buffer Overflow

[7.3,9.1)
  • M
Resource Management Errors

[0,)
  • H
Integer Overflow or Wraparound

[,2.2.3)[5.5.0,5.5.37)[5.6.0,5.6.23)
  • H
Denial of Service (DoS)

[,8.2]
  • M
Cryptographic Issues

[,8.3.19)[8.4.0,8.4.12)[9.0.0,9.0.8)[9.1.0,9.1.4)
  • C
Buffer Overflow

[3.5.1,4.3]
  • C
Buffer Overflow

[2.2,4.2]
  • M
Insecure Randomness

[,11.1]
  • M
Insecure Randomness

[,11.1]
  • M
Insecure Randomness

[,11.1]
  • M
Insecure Randomness

[,11.1]
  • M
Insecure Randomness

[,11.1]
  • M
Insecure Randomness

[,11.1]
  • M
Insecure Randomness

[,11.1]
  • H
Insecure Randomness

[,11.1]
  • M
Insecure Randomness

[,11.1]
  • H
Improper Authentication

[11.0,11.3)
  • H
Improper Authentication

[11.0,11.3)
  • M
Insecure Randomness

[,11.1]
  • M
Arbitrary Code Execution

[4.0,5.4]
  • M
Resource Management Errors

[7.3,8.1]
  • M
Arbitrary Code Execution

[,4.5)
  • H
Arbitrary Code Execution

[4.0,5.0]
  • M
Denial of Service (DoS)

[0,3.2.0)
  • M
Denial of Service (DoS)

[4.8,5.2.1]
  • M
Denial of Service (DoS)

[4.8,5.2.1]
  • M
Information Exposure

[4.2,5.0]
  • M
Denial of Service (DoS)

[4.8,5.2.1]
  • M
CVE-2000-0535

[4.0,5.0]
  • M
Use of Externally-Controlled Format String

[0,)