Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bsdi bsd os 4.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-1999-0002
Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.
Caldera Openlinux 1.2
Redhat Linux 2.1
Bsdi Bsd Os 1.1
Redhat Linux 4.0
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 5.0
Redhat Linux 2.0
Redhat Linux 3.0.3
Redhat Linux 5.1
1 EDB exploit
2 Github repositories
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
10
CVSSv2
CVE-1999-0042
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
University Of Washington Pop 3
University Of Washington Imap 4
Ibm Aix 4.2.1
Redhat Linux 2.0
Caldera Openlinux 1.0
Bsdi Bsd Os 3.0
Bsdi Bsd Os 2.1
Redhat Linux 4.0
1 EDB exploit
10
CVSSv2
CVE-1999-0165
NFS cache poisoning.
Sun Nfs
Sun Sunos 5.3
Sun Sunos 4.0.1
Sun Sunos 4.1.4
Sun Solaris 2.4
Sun Sunos 4.0.3
Sun Sunos 4.1
Sun Sunos 5.4
Sun Sunos 4.0.2
Sun Sunos 4.1.1
Bsdi Bsd Os
Sun Sunos 5.1
Sun Sunos 4.1.3
Sun Sunos 4.1.2
Sun Sunos 3.5
Sun Sunos 4.0
Linux Linux Kernel 2.6.20.1
Sun Sunos 5.0
Sun Sunos -
Sun Sunos 5.2
10
CVSSv2
CVE-1999-0046
Buffer overflow of rlogin program using TERM environmental variable.
Bsdi Bsd Os 1.1
Sun Sunos 5.3
Hp Hp-ux 10.30
Oracle Solaris -
Debian Debian Linux 0.93
Sun Sunos 4.1.4
Hp Hp-ux 10.01
Hp Hp-ux 10.00
Ibm Aix 4.1.4
Ibm Aix 4.1.5
Freebsd Freebsd 2.0.5
Bsdi Bsd Os 2.0
Freebsd Freebsd 1.1.5.1
Hp Hp-ux 10.34
Sun Sunos 5.5
Netbsd Netbsd 1.0
Bsdi Bsd Os 2.1
Hp Hp-ux 10.24
Oracle Solaris 8
Ibm Aix 4.1.1
Netbsd Netbsd 1.1
Freebsd Freebsd 2.1.0
1 EDB exploit
3 Github repositories
10
CVSSv2
CVE-1999-0043
Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others.
Isc Inn 1.4unoff4
Isc Inn 1.4sec
Netscape News Server 1.1
Isc Inn 1.4unoff3
Isc Inn 1.4sec2
Isc Inn 1.5
Caldera Openlinux 1.0
Bsdi Bsd Os 2.1
Redhat Linux 4.1
Redhat Linux 4.0
Nec Goah Networksv 2.2
Nec Goah Networksv 1.2
Nec Goah Intrasv 1.1
Nec Goah Networksv 3.1
7.2
CVSSv2
CVE-2001-1541
Buffer overflow in Unix-to-Unix Copy Protocol (UUCP) in BSDI BSD/OS 3.0 up to and including 4.2 allows local users to execute arbitrary code via a long command line argument.
Bsdi Bsd Os 4.2
Bsdi Bsd Os 4.0
Bsdi Bsd Os 4.1
Bsdi Bsd Os 3.0
Bsdi Bsd Os 3.1
Bsdi Bsd Os 4.0.1
7.2
CVSSv2
CVE-2000-1103
rcvtty in BSD 3.0 and 4.0 does not properly drop privileges before executing a script, which allows local malicious users to gain privileges by specifying an alternate Trojan horse script on the command line.
Bsdi Bsd Os 4.0.1
Bsdi Bsd Os 3.0
Bsdi Bsd Os 3.1
Bsdi Bsd Os 4.0
1 EDB exploit
7.2
CVSSv2
CVE-1999-0034
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
Larry Wall Perl 5.3
Sgi Freeware 1.0
Sgi Freeware 2.0
Bsdi Bsd Os 3.0
Bsdi Bsd Os 2.1
Redhat Linux 4.1
Redhat Linux 4.0
Redhat Linux 4.2
4 EDB exploits
7.2
CVSSv2
CVE-1999-0040
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.
Sgi Irix 5.3
Sgi Irix 4.0
Sgi Irix 6.1
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Sun Sunos 5.3
Hp Hp-ux 10.30
Nec Ews-ux V 4.2mp
Hp Hp-ux 9.10
Sun Sunos 4.1.4
Hp Hp-ux 10.01
Sun Solaris 2.4
Hp Hp-ux 10.00
Sun Solaris 2.5.1
Hp Hp-ux 9.00
Nec Ews-ux V 4.2
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Sun Sunos 5.4
5 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »