Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 5.2 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2006-4172
Integer overflow vulnerability in the i386_set_ldt call in FreeBSD 5.5, and possibly earlier versions down to 5.2, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2006-4178.
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 5.2
Freebsd Freebsd
1 Github repository
7.2
CVSSv2
CVE-2006-1283
opiepasswd in One-Time Passwords in Everything (OPIE) in FreeBSD 4.10-RELEASE-p22 up to and including 6.1-STABLE prior to 20060322 uses the getlogin function to determine the invoking user account, which might allow local users to configure OPIE access to the root account and pos...
Freebsd Freebsd 4.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.6
Freebsd Freebsd 4.8
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 3.1
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Freebsd Freebsd 5.1
Freebsd Freebsd 4.4
Freebsd Freebsd 2.2.2
Freebsd Freebsd 4.7
Freebsd Freebsd 5.2.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 5.0
Freebsd Freebsd 3.5
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.0.5
Freebsd Freebsd 4.5
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 4.10
7.2
CVSSv2
CVE-2005-2218
The device file system (devfs) in FreeBSD 5.x does not properly check parameters of the node type when creating a device node, which makes hidden devices available to attackers, who can then bypass restrictions on a jailed process.
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.4
Freebsd Freebsd 5.3
Freebsd Freebsd 5.1
Freebsd Freebsd 5.0
Freebsd Freebsd 5.2
7.2
CVSSv2
CVE-2005-0610
Multiple symlink vulnerabilities in portupgrade prior to 20041226_2 in FreeBSD allow local users to (1) overwrite arbitrary files and possibly replace packages to execute arbitrary code via pkg_fetch, (2) overwrite arbitrary files via temporary files when portupgrade upgrades a p...
Freebsd Freebsd 4.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.6
Freebsd Freebsd 5.3
Freebsd Freebsd 5.1
Freebsd Freebsd 4.4
Freebsd Freebsd 4.8
Freebsd Freebsd 4.7
Freebsd Freebsd 5.2.1
Freebsd Freebsd 5.0
Freebsd Freebsd 4.5
Freebsd Freebsd 4.10
Freebsd Freebsd 4.2
Freebsd Freebsd 4.1
Freebsd Freebsd 4.9
Freebsd Freebsd 5.2
Freebsd Freebsd 5.4
Freebsd Freebsd 4.0
Freebsd Freebsd 4.6.2
Freebsd Freebsd 4.11
7.2
CVSSv2
CVE-2000-0186
Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.
Redhat Linux 5.1
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.0
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Redhat Linux 6.1
Redhat Linux 6.2
Freebsd Freebsd 3.4
Mandrakesoft Mandrake Linux 6.1
7.2
CVSSv2
CVE-1999-0405
A buffer overflow in lsof allows local users to obtain root privilege.
Freebsd Freebsd 3.1
Freebsd Freebsd 2.2.5
Redhat Linux 5.2
Debian Debian Linux 2.0.5
Freebsd Freebsd 2.2.2
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.0.5
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Suse Suse Linux 5.2
Suse Suse Linux 6.0
Freebsd Freebsd 2.2.8
Suse Suse Linux 6.1
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Freebsd Freebsd 2.2.4
Suse Suse Linux 4.3
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.2.6
Suse Suse Linux 4.4
Suse Suse Linux 5.1
Freebsd Freebsd 2.1.6
2 EDB exploits
7.2
CVSSv2
CVE-1999-0032
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Sun Sunos 4.1.4
Next Nextstep 4.0
Freebsd Freebsd 2.0.5
Bsdi Bsd Os 2.1
Freebsd Freebsd 2.1.0
Next Nextstep 4.1
Sun Sunos 4.1.3u1
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.0
2 EDB exploits
7.2
CVSSv2
CVE-1999-0022
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Bsdi Bsd Os 1.1
Sun Sunos 5.3
Hp Hp-ux 10.00
Ibm Aix 3.2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Freebsd Freebsd 2.0.5
Ibm Aix 3.1
7.1
CVSSv2
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0(16)sc3
Cisco Ios 12.2(3.4)bp
Cisco Ios 11.2xa
Cisco Ios 12.4(2)t2
Cisco Ios 12.3ym
Cisco Ios 11.3(11b)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0(21)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1(2)e1
Cisco Ios 12.1xg
Cisco Ios 12.1(19)ew
Cisco Ios 12.3(14)ym4
Cisco Ios 12.0(8)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2(7b)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3(10)
1 Github repository
7.1
CVSSv2
CVE-2004-1471
Format string vulnerability in wrapper.c in CVS 1.12.x up to and including 1.12.8, and 1.11.x up to and including 1.11.16 allows remote attackers with CVSROOT commit access to cause a denial of service (application crash) and possibly execute arbitrary code via format string spec...
Openpkg Openpkg 2.0
Cvs Cvs 1.11.14
Cvs Cvs 1.11.1
Cvs Cvs 1.11
Cvs Cvs 1.12.2
Cvs Cvs 1.11.4
Cvs Cvs 1.12.7
Sgi Propack 3.0
Cvs Cvs 1.12.5
Openpkg Openpkg 1.3
Cvs Cvs 1.11.16
Cvs Cvs 1.11.5
Cvs Cvs 1.10.8
Cvs Cvs 1.11.15
Cvs Cvs 1.11.11
Openpkg Openpkg Current
Cvs Cvs 1.12.8
Cvs Cvs 1.11.6
Cvs Cvs 1.12.1
Cvs Cvs 1.11.3
Cvs Cvs 1.11.2
Cvs Cvs 1.11.10
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »