Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 2.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2006-4304
Buffer overflow in the sppp driver in FreeBSD 4.11 up to and including 6.1, NetBSD 2.0 up to and including 4.0 beta prior to 20060823, and OpenBSD 3.8 and 3.9 prior to 20060902 allows remote malicious users to cause a denial of service (panic), obtain sensitive information, and p...
Freebsd Freebsd 4.11
Netbsd Netbsd 3.0
Netbsd Netbsd 4.0
Freebsd Freebsd 5.5
Freebsd Freebsd 6.0
Freebsd Freebsd 5.3
Freebsd Freebsd 5.4
Openbsd Openbsd 3.8
Openbsd Openbsd 3.9
Freebsd Freebsd 6.1
Netbsd Netbsd 2.0
4 Github repositories
10
CVSSv2
CVE-2003-0466
Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow malicious users to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 up to and including 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buff...
Wuftpd Wu-ftpd
Redhat Wu Ftpd 2.6.1-16
Apple Mac Os X Server 10.2.6
Apple Mac Os X 10.2.6
Sun Solaris 9.0
Freebsd Freebsd
Netbsd Netbsd
Openbsd Openbsd
5 EDB exploits
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
10
CVSSv2
CVE-1999-0046
Buffer overflow of rlogin program using TERM environmental variable.
Bsdi Bsd Os 1.1
Sun Sunos 5.3
Hp Hp-ux 10.30
Oracle Solaris -
Debian Debian Linux 0.93
Sun Sunos 4.1.4
Hp Hp-ux 10.01
Hp Hp-ux 10.00
Ibm Aix 4.1.4
Ibm Aix 4.1.5
Freebsd Freebsd 2.0.5
Bsdi Bsd Os 2.0
Freebsd Freebsd 1.1.5.1
Hp Hp-ux 10.34
Sun Sunos 5.5
Netbsd Netbsd 1.0
Bsdi Bsd Os 2.1
Hp Hp-ux 10.24
Oracle Solaris 8
Ibm Aix 4.1.1
Netbsd Netbsd 1.1
Freebsd Freebsd 2.1.0
1 EDB exploit
3 Github repositories
9.3
CVSSv2
CVE-2011-2895
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont prior to 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD prior to 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x prior to 5.0.3 and 5.1.x prior to 5.1.1, FreeTyp...
Openbsd Openbsd 3.5
Openbsd Openbsd 3.4
Openbsd Openbsd 3.3
Openbsd Openbsd 2.6
Openbsd Openbsd 2.0
Freebsd Freebsd
Netbsd Netbsd
Openbsd Openbsd 3.0
Openbsd Openbsd 2.9
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
X Libxfont 1.2.0
X Libxfont 1.2.1
X Libxfont 1.2.9
X Libxfont 1.3.0
X Libxfont 1.4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 2.8
Openbsd Openbsd 2.7
Openbsd Openbsd 2.5
Openbsd Openbsd
X Libxfont 1.2.2
9.3
CVSSv2
CVE-2008-1335
The ipsec4_get_ulp function in the kernel in NetBSD 2.0 up to and including 3.1 and NetBSD-current prior to 20071028, when the fast_ipsec subsystem is enabled, allows remote malicious users to bypass the IPsec policy by sending packets from a source machine with a different endia...
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.0.4
Netbsd Netbsd 3.1
Netbsd Netbsd 2.1
Netbsd Netbsd 2.1.1
Netbsd Netbsd Current
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 3.0.2
9
CVSSv2
CVE-2006-6652
Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current prior to 20050914, NetBSD 2.* and 3.* prior to 20061203, and Apple Mac OS X prior to 2007-004, as used by the FTP daemon and tnftpd, allows remote authenticated users to execute arbitrary code via a lon...
Apple Mac Os X 10.0.2
Apple Mac Os X 10.0.3
Apple Mac Os X 10.0.4
Apple Mac Os X 10.1
Apple Mac Os X 10.2.8
Apple Mac Os X 10.3
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.2
Apple Mac Os X 10.4.6
Apple Mac Os X 10.4.7
Apple Mac Os X 10.4.8
Apple Mac Os X 10.4.9
Apple Mac Os X 10.1.5
Apple Mac Os X 10.2
Apple Mac Os X 10.2.1
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2.3
Apple Mac Os X 10.3.7
Apple Mac Os X 10.3.8
Apple Mac Os X 10.3.9
Apple Mac Os X 10.4
Apple Mac Os X 10.0
2 EDB exploits
7.5
CVSSv2
CVE-2006-0905
A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE up to and including 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows remote ma...
Freebsd Freebsd 4.10
Freebsd Freebsd 4.8
Freebsd Freebsd 5.0
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Freebsd Freebsd 6.0
Freebsd Freebsd 4.11
Freebsd Freebsd 4.9
Netbsd Netbsd 2.0
Netbsd Netbsd 3.0
Freebsd Freebsd 5.2
Freebsd Freebsd 5.4
Freebsd Freebsd 5.2.1
7.5
CVSSv2
CVE-2005-4741
NetBSD 1.6, NetBSD 2.0 up to and including 2.1, and NetBSD-current prior to 20051031 allows local users to gain privileges by attaching a debugger to a setuid/setgid (P_SUGID) process that performs an exec without a reset of real credentials.
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.0.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.6.2
Netbsd Netbsd 2.1
Netbsd Netbsd 1.6.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »