Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 3.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2000-1012
The catopen function in FreeBSD 5.0 and previous versions, and possibly other OSes, allows local users to read arbitrary files via the LANG environmental variable.
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.2
Freebsd Freebsd 3.3
Freebsd Freebsd 3.5
Freebsd Freebsd 3.0
Freebsd Freebsd 3.1
Freebsd Freebsd 3.2
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5.1
Freebsd Freebsd 5.0
7.2
CVSSv2
CVE-1999-0761
Buffer overflow in FreeBSD fts library routines allows local user to modify arbitrary files via the periodic program.
Freebsd Freebsd 3.1
Freebsd Freebsd 3.2
Freebsd Freebsd 2.0
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.6
Freebsd Freebsd 3.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.2
Freebsd Freebsd 2.2.3
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.8
5
CVSSv2
CVE-2003-0078
ssl3_get_record in s3_pkt.c for OpenSSL prior to 0.9.7a and 0.9.6 prior to 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that re...
Openssl Openssl 0.9.7
Openssl Openssl 0.9.6i
Openssl Openssl
Openbsd Openbsd 3.1
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Freebsd Freebsd 4.4
Openbsd Openbsd 3.2
Freebsd Freebsd 4.2
Freebsd Freebsd 4.6
Freebsd Freebsd 4.3
Freebsd Freebsd 5.0
1 EDB exploit
10
CVSSv2
CVE-2004-0002
The TCP MSS (maximum segment size) functionality in netinet allows remote malicious users to cause a denial of service (resource exhaustion) via (1) a low MTU, which causes a large number of small packets to be produced, or (2) via a large number of packets with a small TCP paylo...
Freebsd Freebsd 3.3
Freebsd Freebsd 3.5
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.3
Freebsd Freebsd 4.5
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Freebsd Freebsd 4.8
Freebsd Freebsd 4.9
Freebsd Freebsd 5.0
Freebsd Freebsd 5.1
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.4
Freebsd Freebsd 5.2
Freebsd Freebsd 3.0
Freebsd Freebsd 3.1
Freebsd Freebsd 3.2
Freebsd Freebsd 4.2
Freebsd Freebsd 4.6.2
Freebsd Freebsd 3.4
Freebsd Freebsd 4.1
5
CVSSv2
CVE-1999-1518
Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults.
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.3.2
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 3.2
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.4
1 EDB exploit
2.1
CVSSv2
CVE-1999-1402
The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems prior to 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket.
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Sun Solaris 2.5.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.0
Sun Solaris 2.5
Sun Solaris 2.6
Freebsd Freebsd 2.2.2
Freebsd Freebsd 3.1
Sun Sunos 5.0
Sun Sunos -
Sun Sunos 4.0
1 EDB exploit
2.1
CVSSv2
CVE-2000-0489
FreeBSD, NetBSD, and OpenBSD allow an malicious user to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
Netbsd Netbsd 1.4
Freebsd Freebsd 3.1
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.7
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 5.0
Openbsd Openbsd 2.6
Openbsd Openbsd 2.5
1 EDB exploit
9.3
CVSSv2
CVE-1999-0704
Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others.
Redhat Linux 4.2
Redhat Linux 5.0
Redhat Linux 5.1
Redhat Linux 5.2
Bsdi Bsd Os 4.0.1
Freebsd Freebsd 3.1
Bsdi Bsd Os 3.1
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Redhat Linux 6.0
2 EDB exploits
5
CVSSv2
CVE-1999-0001
ip_input.c in BSD-derived TCP/IP implementations allows remote malicious users to cause a denial of service (crash or hang) via crafted packets.
Freebsd Freebsd 1.0
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.8
Openbsd Openbsd 2.3
Bsdi Bsd Os 3.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.2.2
Freebsd Freebsd 2.0.1
Freebsd Freebsd 1.1
Freebsd Freebsd 1.2
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 3.0
3 Github repositories
2.1
CVSSv2
CVE-2000-0461
The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call.
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.2
Freebsd Freebsd 2.2.4
Freebsd Freebsd 3.1
Freebsd Freebsd 3.3
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 4.0
Freebsd Freebsd 5.0
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-25525
CVE-2024-4652
CVE-2024-1438
CVE-2024-4671
CVE-2024-34351
arbitrary
CVE-2024-4650
SQL injection
overflow
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »