CVE-2024-25940
- EPSS 0.23%
- Published 15.02.2024 05:15:11
- Last modified 04.06.2025 21:24:01
`bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file t...
CVE-2024-25941
- EPSS 0.12%
- Published 15.02.2024 05:15:11
- Last modified 04.06.2025 21:55:22
The jail(2) system call has not limited a visiblity of allocated TTYs (the kern.ttys sysctl). This gives rise to an information leak about processes outside the current jail. Attacker can get information about TTYs allocated on the host or in other...
CVE-2022-23085
- EPSS 0.18%
- Published 15.02.2024 05:15:09
- Last modified 09.12.2024 17:27:22
A user-provided integer option was passed to nmreq_copyin() without checking if it would overflow. This insufficient bounds checking could lead to kernel memory corruption. On systems configured to include netmap in their devfs_ruleset, a privilege...
CVE-2022-23086
- EPSS 0.24%
- Published 15.02.2024 05:15:09
- Last modified 09.12.2024 23:24:03
Handlers for *_CFG_PAGE read / write ioctls in the mpr, mps, and mpt drivers allocated a buffer of a caller-specified size, but copied to it a fixed size header. Other heap content would be overwritten if the specified size was too small. Users wit...
CVE-2022-23087
- EPSS 0.11%
- Published 15.02.2024 05:15:09
- Last modified 27.03.2025 20:15:16
The e1000 network adapters permit a variety of modifications to an Ethernet packet when it is being transmitted. These include the insertion of IP and TCP checksums, insertion of an Ethernet VLAN header, and TCP segmentation offload ("TSO"). The e1...
CVE-2022-23088
- EPSS 7.85%
- Published 15.02.2024 05:15:09
- Last modified 04.06.2025 22:16:17
The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame ma...
CVE-2022-23089
- EPSS 0.06%
- Published 15.02.2024 05:15:09
- Last modified 04.06.2025 21:11:31
When dumping core and saving process information, proc_getargv() might return an sbuf which have a sbuf_len() of 0 or -1, which is not properly handled. An out-of-bound read can happen when user constructs a specially crafted ps_string, which in tur...
CVE-2022-23084
- EPSS 0.04%
- Published 15.02.2024 05:15:08
- Last modified 09.12.2024 17:27:41
The total size of the user-provided nmreq to nmreq_copyin() was first computed and then trusted during the copyin. This time-of-check to time-of-use bug could lead to kernel memory corruption. On systems configured to include netmap in their devfs_...
CVE-2023-51765
- EPSS 0.84%
- Published 24.12.2023 06:15:07
- Last modified 21.11.2024 08:38:44
sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occu...
CVE-2023-48795
- EPSS 64.06%
- Published 18.12.2023 16:15:10
- Last modified 29.09.2025 21:56:10
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...