Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 6.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2006-4304
Buffer overflow in the sppp driver in FreeBSD 4.11 up to and including 6.1, NetBSD 2.0 up to and including 4.0 beta prior to 20060823, and OpenBSD 3.8 and 3.9 prior to 20060902 allows remote malicious users to cause a denial of service (panic), obtain sensitive information, and p...
Freebsd Freebsd 4.11
Netbsd Netbsd 3.0
Netbsd Netbsd 4.0
Freebsd Freebsd 5.5
Freebsd Freebsd 6.0
Freebsd Freebsd 5.3
Freebsd Freebsd 5.4
Openbsd Openbsd 3.8
Openbsd Openbsd 3.9
Freebsd Freebsd 6.1
Netbsd Netbsd 2.0
19 Github repositories
10
CVSSv2
CVE-2003-0694
The prescan function in Sendmail 8.12.9 allows remote malicious users to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
Sendmail Advanced Message Server 1.3
Sendmail Sendmail 2.6
Sendmail Sendmail 8.10
Sendmail Sendmail 8.10.1
Sendmail Sendmail 8.11.5
Sendmail Sendmail 8.11.6
Sendmail Sendmail 8.12.7
Sendmail Sendmail 3.0
Sendmail Sendmail 3.0.1
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.2
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12
Sendmail Sendmail 8.9.3
Sendmail Advanced Message Server 1.2
Sendmail Sendmail 3.0.2
Sendmail Sendmail 3.0.3
Sendmail Sendmail 8.11.3
Sendmail Sendmail 8.11.4
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.5
1 Github repository
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
7.5
CVSSv2
CVE-2015-8212
CGI handling flaw in bozohttpd in NetBSD 6.0 up to and including 6.0.6, 6.1 up to and including 6.1.5, and 7.0 allows remote malicious users to execute arbitrary code via crafted arguments, which are handled by a non-CGI aware program.
Netbsd Netbsd 6.0.6
Netbsd Netbsd 6.1
Netbsd Netbsd 6.1.1
Netbsd Netbsd 6.1.2
Netbsd Netbsd 7.0
Netbsd Netbsd 6.0
Netbsd Netbsd 6.0.1
Netbsd Netbsd 6.0.3
Netbsd Netbsd 6.0.5
Netbsd Netbsd 6.1.3
Netbsd Netbsd 6.1.5
Netbsd Netbsd 6.0.2
Netbsd Netbsd 6.0.4
Netbsd Netbsd 6.1.4
7.5
CVSSv2
CVE-2014-8517
The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 up to and including 5.1.4, 5.2 up to and including 5.2.2, 6.0 up to and including 6.0.6, and 6.1 up to and including 6.1.5 allows remote malicious users to execute arbitrary commands via a | (pipe) char...
Apple Mac Os X 10.10.1
Apple Mac Os X 10.10.0
Apple Mac Os X 10.9.5
Apple Mac Os X 10.8.5
Netbsd Netbsd 5.1.3
Netbsd Netbsd 5.1.4
Netbsd Netbsd 5.2
Netbsd Netbsd 6.0.4
Netbsd Netbsd 6.0.5
Netbsd Netbsd 6.1.5
Netbsd Netbsd 5.1
Netbsd Netbsd 6.0
Netbsd Netbsd 6.0.1
Netbsd Netbsd 6.1.1
Netbsd Netbsd 6.1.2
Netbsd Netbsd 5.2.1
Netbsd Netbsd 5.2.2
Netbsd Netbsd 6.0.6
Netbsd Netbsd 6.1
Netbsd Netbsd 5.1.1
Netbsd Netbsd 5.1.2
Netbsd Netbsd 6.0.2
2 EDB exploits
1 Github repository
1 Article
7.5
CVSSv2
CVE-2008-1391
Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent malicious users to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function...
Freebsd Freebsd 6.0
Netbsd Netbsd 4.0
Freebsd Freebsd 6.0 P5 Release
Freebsd Freebsd 7.0
Freebsd Freebsd 7.0 Beta4
Freebsd Freebsd 7.0 Releng
1 EDB exploit
7.5
CVSSv2
CVE-2006-0905
A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE up to and including 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows remote ma...
Freebsd Freebsd 4.10
Freebsd Freebsd 4.8
Freebsd Freebsd 5.0
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Freebsd Freebsd 6.0
Freebsd Freebsd 4.11
Freebsd Freebsd 4.9
Netbsd Netbsd 2.0
Netbsd Netbsd 3.0
Freebsd Freebsd 5.2
Freebsd Freebsd 5.4
Freebsd Freebsd 5.2.1
7.5
CVSSv2
CVE-2003-0681
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
Sendmail Advanced Message Server 1.2
Sendmail Advanced Message Server 1.3
Sendmail Sendmail 8.10
Sendmail Sendmail 8.10.1
Sendmail Sendmail 8.11.5
Sendmail Sendmail 8.11.6
Sendmail Sendmail 8.12.6
Sendmail Sendmail 8.12.7
Sendmail Sendmail 8.8.8
Sendmail Sendmail 8.9.0
Sendmail Sendmail Switch 2.1.1
Sendmail Sendmail Switch 2.1.2
Sendmail Sendmail Switch 2.2.3
Sendmail Sendmail Switch 2.2.4
Sendmail Sendmail 2.6.2
Sendmail Sendmail 3.0
Sendmail Sendmail 3.0.1
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.2
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12
1 EDB exploit
7.5
CVSSv2
CVE-2000-0750
Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote malicious users to execute arbitrary commands via a long file name.
Netbsd Netbsd 1.4.2
Redhat Linux 6.0
Redhat Linux 6.2
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Netbsd Netbsd 1.4.1
Redhat Linux 6.1
7.5
CVSSv2
CVE-2000-0751
mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote malicious users to execute arbitrary commands.
Openbsd Openbsd 2.7
Redhat Linux 6.1
Redhat Linux 6.2
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.4.2
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Redhat Linux 6.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »