Trustedbsd Trustedbsd -

CPE Details

Trustedbsd Trustedbsd -
-
2023-09-28
19h37 +00:00
2023-09-28
19h37 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:trustedbsd:trustedbsd:-:*:*:*:*:*:*:*

Informations

Vendor

trustedbsd

Product

trustedbsd

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2008-4609 2008-10-20 15h00 +00:00 The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
7.1
CVE-2006-6013 2006-11-21 22h00 +00:00 Integer signedness error in the fw_ioctl (FW_IOCTL) function in the FireWire (IEEE-1394) drivers (dev/firewire/fwdev.c) in various BSD kernels, including DragonFlyBSD, FreeBSD 5.5, MidnightBSD 0.1-CURRENT before 20061115, NetBSD-current before 20061116, NetBSD-4 before 20061203, and TrustedBSD, allows local users to read arbitrary memory contents via certain negative values of crom_buf->len in an FW_GCROM command. NOTE: this issue has been labeled as an integer overflow, but it is more like an integer signedness error.
2.1