Freebsd

Freebsd

527 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 16.11.2017 20:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p4, 11.0-RELEASE-p15, 10.4-STABLE, 10.4-RELEASE-p3, and 10.3-RELEASE-p24, not all information in the struct ptrace_lwpinfo is relevant for the state of any thread, and the kernel does not fill the irrelevan...

  • EPSS 0.05%
  • Veröffentlicht 16.11.2017 20:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

In FreeBSD 10.x before 10.4-STABLE, 10.4-RELEASE-p3, and 10.3-RELEASE-p24 named paths are globally scoped, meaning a process located in one jail can read and modify the content of POSIX shared memory objects created by a process in another jail or th...

  • EPSS 0.08%
  • Veröffentlicht 16.11.2017 20:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p4, 11.0-RELEASE-p15, 10.4-STABLE, 10.4-RELEASE-p3, and 10.3-RELEASE-p24, the kernel does not properly clear the memory of the kld_file_stat structure before filling the data. Since the structure filled by ...

  • EPSS 0.7%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.

  • EPSS 0.35%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.

  • EPSS 0.82%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

  • EPSS 0.34%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

Exploit
  • EPSS 0.69%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, ...

  • EPSS 1.23%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

  • EPSS 1.46%
  • Veröffentlicht 17.10.2017 13:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.