Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 1.4 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2001-0053
One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote malicious users to gain root privileges.
David Madore Ftpd-bsd 0.2.3
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.5
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Netbsd Netbsd 1.4
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.8
2 EDB exploits
7.2
CVSSv2
CVE-1999-0674
The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve.
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.4
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Sun Sunos -
Sun Sunos 5.7
Sun Solaris 7.0
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.2
Openbsd Openbsd 2.2
Openbsd Openbsd 2.4
Sun Sunos 5.1
Sun Sunos 5.5
Sun Solaris 2.5
Netbsd Netbsd 1.0
Netbsd Netbsd 1.1
Netbsd Netbsd 1.2
Sun Sunos 5.2
Sun Sunos 5.3
Sun Sunos 5.4
Sun Solaris 2.4
Netbsd Netbsd 1.2.1
1 EDB exploit
2.1
CVSSv2
CVE-2002-1915
tip on multiple BSD-based operating systems allows local users to cause a denial of service (execution prevention) by using flock() to lock the /var/log/acculog file.
Openbsd Openbsd 2.8
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Openbsd Openbsd 3.1
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
Openbsd Openbsd 2.9
Openbsd Openbsd 2.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 4.5
Freebsd Freebsd 3.5.1
Openbsd Openbsd 2.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.0
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Freebsd Freebsd 4.1
Netbsd Netbsd 1.5.1
Freebsd Freebsd 4.4
Openbsd Openbsd 2.4
Netbsd Netbsd 1.1
Netbsd Netbsd 1.5.2
7.2
CVSSv2
CVE-2000-0993
Format string vulnerability in pw_error function in BSD libutil library allows local users to gain root privileges via a malformed password in commands such as chpass or passwd.
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Freebsd Freebsd 4.0
Netbsd Netbsd 1.4
Openbsd Openbsd 2.7
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 3.2
Freebsd Freebsd 3.3
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
1 EDB exploit
5
CVSSv2
CVE-2000-0440
NetBSD 1.4.2 and previous versions allows remote malicious users to cause a denial of service by sending a packet with an unaligned IP timestamp option.
Netbsd Netbsd 1.4.1
Freebsd Freebsd 3.4
Freebsd Freebsd 4.0
Freebsd Freebsd 5.0
Netbsd Netbsd 1.4.2
1 EDB exploit
2.1
CVSSv2
CVE-2000-0489
FreeBSD, NetBSD, and OpenBSD allow an malicious user to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
Netbsd Netbsd 1.4
Freebsd Freebsd 3.1
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.7
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 5.0
Openbsd Openbsd 2.6
Openbsd Openbsd 2.5
1 EDB exploit
3.7
CVSSv2
CVE-2002-2092
Race condition in exec in OpenBSD 4.0 and previous versions, NetBSD 1.5.2 and previous versions, and FreeBSD 4.4 and previous versions allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.5.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.8
5
CVSSv2
CVE-1999-1518
Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults.
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.3.2
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 3.2
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.4
1 EDB exploit
10
CVSSv2
CVE-2002-1337
Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote malicious users to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
Sendmail Sendmail
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Hp Hp-ux 11.11
Netbsd Netbsd 1.5
Windriver Bsdos 4.2
Sun Sunos 5.7
Sun Sunos 5.8
Gentoo Linux 1.4
Hp Hp-ux 11.00
Windriver Bsdos 5.0
Netbsd Netbsd 1.5.1
Hp Hp-ux 11.0.4
Oracle Solaris 8
Hp Hp-ux 11.22
Netbsd Netbsd 1.5.2
Oracle Solaris 9
Hp Alphaserver Sc
Hp Hp-ux 10.20
Windriver Platform Sa 1.0
Hp Hp-ux 10.10
Windriver Bsdos 4.3.1
3 EDB exploits
1 Github repository
10
CVSSv2
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Mit Kerberos 5 1.1.1
Sgi Irix 6.1
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Mit Kerberos 5 1.2
Sgi Irix 6.5.11
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Freebsd Freebsd 2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 3.5
3 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »