Known vulnerabilities in FreeBSD Foundation FreeBSD 15.0

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › FreeBSD Foundation › FreeBSD › 15.0

Known vulnerabilities in FreeBSD Foundation FreeBSD 15.0

Vendor: FreeBSD Foundation
Website: https://www.freebsdfoundation.org/
Total Security Bulletins: 5
14.4 15.0 14.3 13.5 14.2 13.4 14.1 13.3 14.0 13.2 12.4 13.1 12.3 13.0-RC4 11.4-RELEASE-p9 12.2-RELEASE-p6 13.0-RC5-p1 13.0 7.0_releng 7.0_beta4 6.0_p5_release 12.2 2.0.1 1.5 1.2 0.4_1 4.2.8 11.4 12.1 3.5.1 2.2.4 2.2.3 2.1.7.1 2.1.6.1 2.1.0 11.3 12.0 2.2.1 2.2.2 2.2.7 2.2.5 2.2.6 4.9 4.8 4.7 4.6 4.5 4.4 4.3 4.2 4.1 4.0 2.2.8 4.10 4.11 1.1.5 5.2.1 3.5 3.4 3.3 3.2 3.1 3.0 4.6.2 2.0.5 2.2 2.1 2.0 4.1.1 2.1.5 2.1.7 2.1.6 5.2 5.1 5.0 1.1 1.0 1.1.5.1 11.2 10.2-RC2-p1 10.2-RC1-p2 10.2-BETA2-p3 10.1-RELEASE-p17 10.2-RC2 10.2-RC1 10.4 11.1 10.0 9.2 9.1 9.0 8.4 8.3 8.2 8.1 8.0 7.4 7.3 7.2 7.1 7.0 6.4 6.3 6.2 6.1 6.0 5.5 5.4 5.3 11.0 10.3 10.2 10.1 9.3

Security bulletins (5)

Secuity bulletin Severity Status Published
SB2026022529: Multiple vulnerabilities in FreeBSD Low
Patched
25.02.2026
SB2026021076: Denial of service in FreeBSD blocklistd Medium
Patched
10.02.2026
SB2025121716: Remote code execution via ND6 router advertisements in FreeBSD High
Patched Exploited
17.12.2025
SB2025112669: FreeBSD update for Unbound Medium
Patched
26.11.2025
SB2025102304: Spoofing attack in FreeBSD connect(2) for UDP sockets Medium
Patched
23.10.2025

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or