Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 4.1 vulnerabilities and exploits
(subscribe to this query)
614
VMScore
CVE-2009-2482
The pam_unix module in OpenPAM in NetBSD 4.0 prior to 4.0.2 and 5.0 prior to 5.0.1 allows local users to change the current root password if it is already known, even when they are not in the wheel group.
Netbsd Netbsd 4.1
Netbsd Netbsd 5.0
Netbsd Netbsd 4.0
Netbsd Netbsd 4.0.1
187
VMScore
CVE-2002-1915
tip on multiple BSD-based operating systems allows local users to cause a denial of service (execution prevention) by using flock() to lock the /var/log/acculog file.
Openbsd Openbsd 2.8
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Openbsd Openbsd 3.1
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
Openbsd Openbsd 2.9
Openbsd Openbsd 2.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 4.5
Freebsd Freebsd 3.5.1
Openbsd Openbsd 2.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.0
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Freebsd Freebsd 4.1
Netbsd Netbsd 1.5.1
Freebsd Freebsd 4.4
Openbsd Openbsd 2.4
Netbsd Netbsd 1.1
Netbsd Netbsd 1.5.2
465
VMScore
CVE-2008-1215
Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via long commands containing "~&...
Openbsd Openbsd 4.1
Freebsd Freebsd 6.3
Netbsd Netbsd
Freebsd Freebsd 7.0
Openbsd Openbsd 4.2
1 EDB exploit
329
VMScore
CVE-2002-2092
Race condition in exec in OpenBSD 4.0 and previous versions, NetBSD 1.5.2 and previous versions, and FreeBSD 4.4 and previous versions allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.
Freebsd Freebsd 4.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 4.4
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.3.1
Openbsd Openbsd 2.9
Freebsd Freebsd 2.2.3
Openbsd Openbsd 2.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 4.2
Freebsd Freebsd 3.5.1
Openbsd Openbsd 2.2
Netbsd Netbsd 1.3.3
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Freebsd Freebsd 4.1
Freebsd Freebsd 2.2.8
1000
VMScore
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.1
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.5.7
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
3 EDB exploits
668
VMScore
CVE-1999-0017
FTP servers can allow an malicious user to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce.
Gnu Inet 5.01
Gnu Inet 6.01
Washington University Wu-ftpd 2.4
Gnu Inet 6.02
Sun Sunos 5.5
Ibm Aix 4.3
Sco Open Desktop 3.0
Sun Sunos 5.3
Caldera Openlinux 1.2
Sun Sunos 4.1.4
Ibm Aix 4.2
Netbsd Netbsd 1.2.1
Freebsd Freebsd 2.1.7
Siemens Reliant Unix
Netbsd Netbsd 1.0
Sun Sunos 5.4
Sco Unixware 2.1
Freebsd Freebsd 1.0
Sun Sunos 5.5.1
Freebsd Freebsd 1.1
Netbsd Netbsd 1.1
Freebsd Freebsd 2.1.0
1000
VMScore
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Isc Bind 8.1
Sgi Irix 5.3
Data General Dg Ux 5.4 3.0
Sgi Irix 4.0.5 Iop
Data General Dg Ux 5.4 3.1
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 4.0.4
Sgi Irix 4.0.1
Sgi Irix 6.1
Sgi Irix 3.3.1
Sgi Irix 5.0.1
Sgi Irix 4.0.5e
Sgi Irix 4.0.3
Sgi Irix 5.1.1
Sgi Irix 4.0.5a
Sgi Irix 3.3.3
Isc Bind 4.9.6
Sgi Irix 4.0.5 Ipr
Sgi Irix 5.0
Data General Dg Ux 5.4 4.11
2 EDB exploits
445
VMScore
CVE-1999-0010
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
Data General Dg Ux Y2k Patchr4.11mu05
Data General Dg Ux Y2k Patchr4.20mu03
Data General Dg Ux Y2k Patchr4.12mu03
Isc Bind 4.9
Data General Dg Ux Y2k Patchr4.20mu02
Isc Bind 8
Data General Dg Ux Y2k Patchr4.20mu01
Sco Openserver 5.0
Nec Asl Ux 4800 11
Ibm Aix 4.3
Sco Open Desktop 3.0
Sun Sunos 5.3
Netbsd Netbsd 1.3
Ibm Aix 4.2
Netbsd Netbsd 1.3.1
Redhat Linux 5.0
Sun Sunos 5.5
Sco Unixware 2.1
Sco Unix 3.2v4
Sun Sunos 5.4
Sco Unixware 7.0
Sun Sunos 5.5.1
890
VMScore
CVE-1999-0011
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
Data General Dg Ux Y2k Patchr4.11mu05
Data General Dg Ux Y2k Patchr4.20mu03
Data General Dg Ux Y2k Patchr4.12mu03
Isc Bind 4.9
Data General Dg Ux Y2k Patchr4.20mu02
Isc Bind 8
Data General Dg Ux Y2k Patchr4.20mu01
Sco Openserver 5.0
Nec Asl Ux 4800 11
Ibm Aix 4.3
Sco Open Desktop 3.0
Sun Sunos 5.3
Netbsd Netbsd 1.3
Ibm Aix 4.2
Netbsd Netbsd 1.3.1
Redhat Linux 5.0
Sun Sunos 5.5
Sco Unixware 2.1
Sco Unix 3.2v4
Sun Sunos 5.4
Sco Unixware 7.0
Sun Sunos 5.5.1
1000
VMScore
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Netkit Linux Netkit 0.11
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »