Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 4.1 vulnerabilities and exploits
(subscribe to this query)
6.9
CVSSv2
CVE-2009-2482
The pam_unix module in OpenPAM in NetBSD 4.0 prior to 4.0.2 and 5.0 prior to 5.0.1 allows local users to change the current root password if it is already known, even when they are not in the wheel group.
Netbsd Netbsd 4.0.1
Netbsd Netbsd 4.0
Netbsd Netbsd 5.0
Netbsd Netbsd 4.1
2.1
CVSSv2
CVE-2002-1915
tip on multiple BSD-based operating systems allows local users to cause a denial of service (execution prevention) by using flock() to lock the /var/log/acculog file.
Openbsd Openbsd 2.8
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Openbsd Openbsd 3.1
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
Openbsd Openbsd 2.9
Openbsd Openbsd 2.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 4.5
Freebsd Freebsd 3.5.1
Openbsd Openbsd 2.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.0
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Freebsd Freebsd 4.1
Netbsd Netbsd 1.5.1
Freebsd Freebsd 4.4
Openbsd Openbsd 2.4
Netbsd Netbsd 1.1
Netbsd Netbsd 1.5.2
4.6
CVSSv2
CVE-2008-1215
Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via long commands containing "~&...
Netbsd Netbsd
Openbsd Openbsd 4.1
Openbsd Openbsd 4.2
Freebsd Freebsd 6.3
Freebsd Freebsd 7.0
1 EDB exploit
3.7
CVSSv2
CVE-2002-2092
Race condition in exec in OpenBSD 4.0 and previous versions, NetBSD 1.5.2 and previous versions, and FreeBSD 4.4 and previous versions allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.5.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.8
10
CVSSv2
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Mit Kerberos 5 1.1.1
Sgi Irix 6.1
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Mit Kerberos 5 1.2
Sgi Irix 6.5.11
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Freebsd Freebsd 2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 3.5
3 EDB exploits
7.5
CVSSv2
CVE-1999-0017
FTP servers can allow an malicious user to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce.
Gnu Inet 5.01
Gnu Inet 6.01
Washington University Wu-ftpd 2.4
Gnu Inet 6.02
Sun Sunos 5.5
Ibm Aix 4.3
Sco Open Desktop 3.0
Sun Sunos 5.3
Caldera Openlinux 1.2
Sun Sunos 4.1.4
Ibm Aix 4.2
Netbsd Netbsd 1.2.1
Freebsd Freebsd 2.1.7
Siemens Reliant Unix
Netbsd Netbsd 1.0
Sun Sunos 5.4
Freebsd Freebsd 1.1
Freebsd Freebsd 1.2
Freebsd Freebsd 2.1.0
Sun Sunos 4.1.3u1
Netbsd Netbsd 1.1
Netbsd Netbsd 1.2
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
10
CVSSv2
CVE-1999-0011
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
Data General Dg Ux Y2k Patchr4.20mu03
Isc Bind 4.9
Isc Bind 8
Data General Dg Ux Y2k Patchr4.11mu05
Data General Dg Ux Y2k Patchr4.20mu01
Data General Dg Ux Y2k Patchr4.12mu03
Data General Dg Ux Y2k Patchr4.20mu02
Sco Unixware 2.1
Sco Unixware 7.0
Sun Sunos 5.3
Sun Sunos 5.4
Nec Asl Ux 4800 13
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Redhat Linux 4.2
Ibm Aix 4.2
Nec Asl Ux 4800 11
Redhat Linux 5.0
Sco Openserver 5.0
Sun Sunos 5.5.1
Ibm Aix 4.1
Ibm Aix 4.3
5
CVSSv2
CVE-1999-0010
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
Data General Dg Ux Y2k Patchr4.11mu05
Data General Dg Ux Y2k Patchr4.12mu03
Data General Dg Ux Y2k Patchr4.20mu02
Isc Bind 4.9
Data General Dg Ux Y2k Patchr4.20mu01
Data General Dg Ux Y2k Patchr4.20mu03
Isc Bind 8
Redhat Linux 4.2
Redhat Linux 5.0
Sco Open Desktop 3.0
Sco Openserver 5.0
Ibm Aix 4.1
Ibm Aix 4.2
Ibm Aix 4.3
Sun Sunos 5.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Sunos 5.6
Nec Asl Ux 4800 13
Netbsd Netbsd 1.3.1
Sco Unix 3.2v4
Sco Unixware 7.0
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »