The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
http://git.php.net/?p=php-src.git;a=commit;h=aab49e934de1fff046e659cbec46e3d053b41c34
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082258.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082292.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082294.html
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html
http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html
http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html
http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html
http://rhn.redhat.com/errata/RHSA-2012-1037.html
http://secunia.com/advisories/49304
http://secunia.com/advisories/50718
http://security.freebsd.org/advisories/FreeBSD-SA-12:02.crypt.asc
http://support.apple.com/kb/HT5501
http://www.debian.org/security/2012/dsa-2491
http://www.mandriva.com/security/advisories?name=MDVSA-2012:092
http://www.postgresql.org/docs/8.3/static/release-8-3-19.html
http://www.postgresql.org/docs/8.4/static/release-8-4-12.html
http://www.postgresql.org/docs/9.0/static/release-9-0-8.html
http://www.postgresql.org/docs/9.1/static/release-9-1-4.html
http://www.postgresql.org/support/security/
OR
cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*
OR
cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:1.1.5:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.2.7:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.11:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.2.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.4:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:8.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:8.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:8.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:8.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* versions up to 9.0 (inclusive)
OR
cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.3.12:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions up to 5.3.13 (inclusive)
ID | Name | Product | Family | Severity |
---|---|---|---|---|
9097 | PHP 5.3.x < 5.3.14 / 5.4.x < 5.4.4 Multiple Vulnerabilities | Nessus Network Monitor | Web Servers | high |
74773 | openSUSE Security Update : postgresql (openSUSE-SU-2012:1299-1) | Nessus | SuSE Local Security Checks | medium |
74769 | openSUSE Security Update : postgresql / postgresql-libs (openSUSE-SU-2012:1288-1) | Nessus | SuSE Local Security Checks | medium |
74766 | openSUSE Security Update : postgresql / postgresql-libs (openSUSE-SU-2012:1251-1) | Nessus | SuSE Local Security Checks | medium |
74667 | openSUSE Security Update : php5 (openSUSE-SU-2012:0826-1) | Nessus | SuSE Local Security Checks | medium |
69702 | Amazon Linux AMI : php (ALAS-2012-95) | Nessus | Amazon Linux Local Security Checks | high |
69701 | Amazon Linux AMI : postgresql8 (ALAS-2012-94) | Nessus | Amazon Linux Local Security Checks | medium |
69698 | Amazon Linux AMI : postgresql9 (ALAS-2012-91) | Nessus | Amazon Linux Local Security Checks | medium |
68571 | Oracle Linux 5 : php53 (ELSA-2012-1047) | Nessus | Oracle Linux Local Security Checks | high |
68570 | Oracle Linux 6 : php (ELSA-2012-1046) | Nessus | Oracle Linux Local Security Checks | high |
68568 | Oracle Linux 5 / 6 : postgresql / postgresql84 (ELSA-2012-1037) | Nessus | Oracle Linux Local Security Checks | medium |
68567 | Oracle Linux 5 : postgresql (ELSA-2012-1036) | Nessus | Oracle Linux Local Security Checks | medium |
67089 | CentOS 5 : php53 (CESA-2012:1047) | Nessus | CentOS Local Security Checks | high |
6816 | PostgreSQL < 8.3.19 / 8.4.12 / 9.0.8 / 9.1.4 Multiple Vulnerabilities | Nessus Network Monitor | Database | medium |
64216 | SuSE 11.1 Security Update : PostgreSQL (SAT Patch Number 6697) | Nessus | SuSE Local Security Checks | medium |
64104 | SuSE 11.2 Security Update : PHP5 (SAT Patch Number 6440) | Nessus | SuSE Local Security Checks | high |
63353 | PostgreSQL 8.3 < 8.3.19 / 8.4 < 8.4.12 / 9.0 < 9.0.8 / 9.1 < 9.1.4 Multiple Vulnerabilities | Nessus | Databases | medium |
62380 | GLSA-201209-24 : PostgreSQL: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | medium |
62236 | GLSA-201209-03 : PHP: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | critical |
6584 | Mac OS X 10.8 < 10.8.2 Multiple Vulnerabilities | Nessus Network Monitor | Generic | critical |
6583 | Mac OS X 10.7 < 10.7.5 Multiple Vulnerabilities | Nessus Network Monitor | Generic | critical |
62215 | Mac OS X 10.8.x < 10.8.2 Multiple Vulnerabilities | Nessus | MacOS X Local Security Checks | critical |
62214 | Mac OS X 10.7.x < 10.7.5 Multiple Vulnerabilities (BEAST) | Nessus | MacOS X Local Security Checks | critical |
62213 | Mac OS X Multiple Vulnerabilities (Security Update 2012-004) (BEAST) | Nessus | MacOS X Local Security Checks | critical |
61358 | Scientific Linux Security Update : php on SL6.x i386/x86_64 (20120627) | Nessus | Scientific Linux Local Security Checks | high |
61356 | Scientific Linux Security Update : php53 on SL5.x i386/x86_64 (20120627) | Nessus | Scientific Linux Local Security Checks | high |
61354 | Scientific Linux Security Update : postgresql on SL5.x i386/x86_64 (20120625) | Nessus | Scientific Linux Local Security Checks | medium |
61353 | Scientific Linux Security Update : postgresql and postgresql84 on SL6.x i386/x86_64 (20120625) | Nessus | Scientific Linux Local Security Checks | medium |
61352 | Scientific Linux Security Update : postgresql and postgresql84 on SL5.x i386/x86_64 (20120625) | Nessus | Scientific Linux Local Security Checks | medium |
59938 | CentOS 6 : php (CESA-2012:1046) | Nessus | CentOS Local Security Checks | high |
59827 | Fedora 16 : maniadrive-1.2-32.fc16.6 / php-5.3.14-1.fc16 / php-eaccelerator-0.9.6.1-9.fc16.6 (2012-9762) | Nessus | Fedora Local Security Checks | high |
59801 | Fedora 17 : maniadrive-1.2-41.fc17 / php-5.4.4-1.fc17 (2012-9490) | Nessus | Fedora Local Security Checks | high |
59769 | Debian DSA-2491-1 : postgresql-8.4 - several vulnerabilities | Nessus | Debian Local Security Checks | medium |
59753 | RHEL 5 : php53 (RHSA-2012:1047) | Nessus | Red Hat Local Security Checks | high |
59752 | RHEL 6 : php (RHSA-2012:1046) | Nessus | Red Hat Local Security Checks | high |
59746 | FreeBSD : FreeBSD -- Incorrect crypt() hashing (185ff22e-c066-11e1-b5e0-000c299b62e1) | Nessus | FreeBSD Local Security Checks | medium |
59719 | CentOS 5 / 6 : postgresql / postgresql84 (CESA-2012:1037) | Nessus | CentOS Local Security Checks | medium |
59712 | RHEL 5 / 6 : postgresql and postgresql84 (RHSA-2012:1037) | Nessus | Red Hat Local Security Checks | medium |
59711 | RHEL 5 : postgresql (RHSA-2012:1036) | Nessus | Red Hat Local Security Checks | medium |
59687 | CentOS 5 : postgresql (CESA-2012:1036) | Nessus | CentOS Local Security Checks | medium |
59603 | Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : php5 vulnerabilities (USN-1481-1) | Nessus | Ubuntu Local Security Checks | high |
59539 | Fedora 17 : postgresql-9.1.4-1.fc17 (2012-8924) | Nessus | Fedora Local Security Checks | medium |
59538 | Fedora 15 : postgresql-9.0.8-1.fc15 (2012-8915) | Nessus | Fedora Local Security Checks | medium |
59534 | Fedora 16 : postgresql-9.1.4-1.fc16 (2012-8893) | Nessus | Fedora Local Security Checks | medium |
59530 | PHP 5.4.x < 5.4.4 Multiple Vulnerabilities | Nessus | CGI abuses | high |
59529 | PHP 5.3.x < 5.3.14 Multiple Vulnerabilities | Nessus | CGI abuses | high |
59519 | Mandriva Linux Security Advisory : php (MDVSA-2012:093) | Nessus | Mandriva Local Security Checks | high |
59518 | Mandriva Linux Security Advisory : postgresql (MDVSA-2012:092) | Nessus | Mandriva Local Security Checks | medium |
59385 | Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : postgresql-8.3, postgresql-8.4, postgresql-9.1 vulnerabilities (USN-1461-1) | Nessus | Ubuntu Local Security Checks | medium |
59314 | FreeBSD : databases/postgresql*-server -- crypt vulnerabilities (a8864f8f-aa9e-11e1-a284-0023ae8e59f0) | Nessus | FreeBSD Local Security Checks | medium |