Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 2.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2006-4304
Buffer overflow in the sppp driver in FreeBSD 4.11 up to and including 6.1, NetBSD 2.0 up to and including 4.0 beta prior to 20060823, and OpenBSD 3.8 and 3.9 prior to 20060902 allows remote malicious users to cause a denial of service (panic), obtain sensitive information, and p...
Freebsd Freebsd 6.1
Openbsd Openbsd 3.8
Freebsd Freebsd 5.5
Freebsd Freebsd 5.4
Netbsd Netbsd 4.0
Freebsd Freebsd 5.3
Freebsd Freebsd 4.11
Openbsd Openbsd 3.9
Freebsd Freebsd 6.0
Netbsd Netbsd 3.0
Netbsd Netbsd 2.0
25 Github repositories
10
CVSSv2
CVE-2003-0466
Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow malicious users to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 up to and including 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buff...
Wuftpd Wu-ftpd
Redhat Wu Ftpd 2.6.1-16
Apple Mac Os X Server 10.2.6
Apple Mac Os X 10.2.6
Sun Solaris 9.0
Freebsd Freebsd
Netbsd Netbsd
Openbsd Openbsd
5 EDB exploits
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Netkit Linux Netkit 0.11
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
1 EDB exploit
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Isc Bind 8.1
Sgi Irix 5.3
Data General Dg Ux 5.4 3.0
Sgi Irix 4.0.5 Iop
Data General Dg Ux 5.4 3.1
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 4.0.4
Sgi Irix 4.0.1
Sgi Irix 6.1
Sgi Irix 3.3.1
Sgi Irix 5.0.1
Sgi Irix 4.0.5e
Sgi Irix 4.0.3
Sgi Irix 5.1.1
Sgi Irix 4.0.5a
Sgi Irix 3.3.3
Isc Bind 4.9.6
Sgi Irix 4.0.5 Ipr
Sgi Irix 5.0
Data General Dg Ux 5.4 4.11
2 EDB exploits
10
CVSSv2
CVE-1999-0046
Buffer overflow of rlogin program using TERM environmental variable.
Bsdi Bsd Os 1.1
Sun Sunos 5.3
Hp Hp-ux 10.30
Oracle Solaris -
Debian Debian Linux 0.93
Sun Sunos 4.1.4
Hp Hp-ux 10.01
Hp Hp-ux 10.00
Ibm Aix 4.1.4
Ibm Aix 4.1.5
Freebsd Freebsd 2.0.5
Bsdi Bsd Os 2.0
Freebsd Freebsd 1.1.5.1
Hp Hp-ux 10.34
Sun Sunos 5.5
Netbsd Netbsd 1.0
Bsdi Bsd Os 2.1
Hp Hp-ux 10.24
Oracle Solaris 8
Ibm Aix 4.1.1
Netbsd Netbsd 1.1
Freebsd Freebsd 2.1.0
1 EDB exploit
3 Github repositories
9.3
CVSSv2
CVE-2011-2895
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont prior to 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD prior to 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x prior to 5.0.3 and 5.1.x prior to 5.1.1, FreeTyp...
Openbsd Openbsd 2.8
Freetype Freetype 2.1.9
Netbsd Netbsd
X Libxfont 1.2.1
X Libxfont 1.2.7
X Libxfont 1.2.6
Openbsd Openbsd 3.1
X Libxfont 1.3.3
Openbsd Openbsd 3.3
Openbsd Openbsd 2.9
X Libxfont
X Libxfont 1.3.2
X Libxfont 1.3.4
Openbsd Openbsd 2.1
X Libxfont 1.3.1
Freebsd Freebsd
Openbsd Openbsd 2.2
X Libxfont 1.4.0
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
X Libxfont 1.2.4
X Libxfont 1.2.9
9.3
CVSSv2
CVE-2008-1335
The ipsec4_get_ulp function in the kernel in NetBSD 2.0 up to and including 3.1 and NetBSD-current prior to 20071028, when the fast_ipsec subsystem is enabled, allows remote malicious users to bypass the IPsec policy by sending packets from a source machine with a different endia...
Netbsd Netbsd 2.0.4
Netbsd Netbsd 2.1
Netbsd Netbsd 3.1
Netbsd Netbsd 2.0.2
Netbsd Netbsd 3.0.1
Netbsd Netbsd Current
Netbsd Netbsd 2.0.3
Netbsd Netbsd 3.0.2
Netbsd Netbsd 2.1.1
Netbsd Netbsd 2.0.1
Netbsd Netbsd 3.0
Netbsd Netbsd 2.0
9
CVSSv2
CVE-2006-6652
Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current prior to 20050914, NetBSD 2.* and 3.* prior to 20061203, and Apple Mac OS X prior to 2007-004, as used by the FTP daemon and tnftpd, allows remote authenticated users to execute arbitrary code via a lon...
Apple Mac Os X 10.4.3
Apple Mac Os X 10.2.5
Apple Mac Os X 10.2.7
Apple Mac Os X 10.0.2
Apple Mac Os X 10.2.8
Apple Mac Os X 10.2.1
Apple Mac Os X 10.3.1
Apple Mac Os X 10.3.5
Apple Mac Os X 10.4.1
Apple Mac Os X 10.1
Apple Mac Os X 10.0.1
Apple Mac Os X 10.4.10
Apple Mac Os X 10.0.3
Apple Mac Os X 10.4.9
Apple Mac Os X 10.1.4
Apple Mac Os X 10.2.4
Apple Mac Os X 10.4.7
Apple Mac Os X 10.4.4
Apple Mac Os X 10.3.2
Apple Mac Os X 10.2.2
Apple Mac Os X 10.0
Apple Mac Os X 10.3.7
2 EDB exploits
7.5
CVSSv2
CVE-2006-0905
A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE up to and including 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows remote ma...
Freebsd Freebsd 4.8
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 5.1
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.0
Freebsd Freebsd 4.10
Freebsd Freebsd 4.11
Freebsd Freebsd 4.9
Freebsd Freebsd 5.2
Freebsd Freebsd 6.0
Netbsd Netbsd 3.0
Netbsd Netbsd 2.0
7.5
CVSSv2
CVE-2005-4741
NetBSD 1.6, NetBSD 2.0 up to and including 2.1, and NetBSD-current prior to 20051031 allows local users to gain privileges by attaching a debugger to a setuid/setgid (P_SUGID) process that performs an exec without a reset of real credentials.
Netbsd Netbsd 1.6
Netbsd Netbsd 2.1
Netbsd Netbsd 2.0.2
Netbsd Netbsd 1.6.1
Netbsd Netbsd 2.0.3
Netbsd Netbsd 1.6.2
Netbsd Netbsd 2.0.1
Netbsd Netbsd 2.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
malicious code
XML injection
CVE-2024-28020
CVE-2024-35252
CVE-2024-5833
CVE-2024-30066
injection
CVE-2024-23282
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »