Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 7.0 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2005-4351
The securelevels implementation in FreeBSD 7.0 and previous versions, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running.
Freebsd Freebsd 7.0
Dragonfly Dragonfly
Openbsd Openbsd
Freebsd Freebsd
Linux Linux Kernel
7.2
CVSSv2
CVE-2000-1208
Format string vulnerability in startprinting() function of printjob.c in BSD-based lpr lpd package may allow local users to gain privileges via an improper syslog call that uses format strings from the checkremote() call.
Immunix Immunix 6.2
Openbsd Openbsd 2.7
Redhat Linux 7.0
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.4
4.3
CVSSv2
CVE-2011-0419
Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library prior to 1.4.3 and the Apache HTTP Server prior to 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris...
Apache Portable Runtime
Apache Http Server
Netbsd Netbsd 5.1
Google Android
Freebsd Freebsd
Openbsd Openbsd 4.8
Apple Mac Os X 10.6.0
Oracle Solaris 10
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Suse Linux Enterprise Server 10
1 EDB exploit
2 Github repositories
7.5
CVSSv2
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
7.2
CVSSv2
CVE-2001-0872
OpenSSH 3.0.1 and previous versions with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges.
Openbsd Openssh
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 7.2
Redhat Linux 7.0
Suse Suse Linux 7.3
Redhat Linux 7.1
Redhat Linux 7.2
5
CVSSv2
CVE-2002-1345
Directory traversal vulnerabilities in multiple FTP clients on UNIX systems allow remote malicious FTP servers to create or overwrite files as the client user via filenames containing /absolute/path or .. (dot dot) sequences.
Ncftp Software Ncftp 3.0.3
Ncftp Software Ncftp 3.0.4
Ncftp Software Ncftp 3.1.0
Ncftp Software Ncftp 3.0.0
Ncftp Software Ncftp 3.1.3
Ncftp Software Ncftp 3.1.4
Ncftp Software Ncftp 3.1.1
Ncftp Software Ncftp 3.1.2
Ncftp Software Ncftp 3.0.1
Ncftp Software Ncftp 3.0.2
Sun Solaris 2.6
Sun Sunos -
Sun Sunos 5.7
Sun Solaris 7.0
Openbsd Openbsd 3.0
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
10
CVSSv2
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 up to and including 3.0.2 allows local users or remote malicious servers to gain privileges.
Conectiva Linux Graficas
Immunix Immunix 7.0
Conectiva Linux 6.0
Conectiva Linux 5.1
Openpkg Openpkg 1.0
Conectiva Linux Ecommerce
Mandrakesoft Mandrake Single Network Firewall 7.2
Conectiva Linux 7.0
Conectiva Linux 5.0
Openbsd Openssh
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Suse Suse Linux 7.1
Redhat Linux 7.0
Redhat Linux 7.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 7.0
Trustix Secure Linux 1.5
Suse Suse Linux 6.4
1 EDB exploit
5
CVSSv2
CVE-2018-15473
OpenSSH up to and including 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Openbsd Openssh
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
Netapp Cn1610 Firmware -
Netapp Cloud Backup -
Netapp Data Ontap Edge -
Netapp Ontap Select Deploy -
Netapp Steelstore Cloud Integrated Storage -
Netapp Clustered Data Ontap -
Netapp Service Processor -
Netapp Data Ontap -
Netapp Fas Baseboard Management Controller -
Netapp Aff Baseboard Management Controller -
2 EDB exploits
70 Github repositories
1 Article
7.5
CVSSv2
CVE-2003-0681
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
Sendmail Advanced Message Server 1.2
Sendmail Advanced Message Server 1.3
Sendmail Sendmail 8.10
Sendmail Sendmail 8.10.1
Sendmail Sendmail 8.11.5
Sendmail Sendmail 8.11.6
Sendmail Sendmail 8.12.6
Sendmail Sendmail 8.12.7
Sendmail Sendmail 8.8.8
Sendmail Sendmail 8.9.0
Sendmail Sendmail Switch 2.1.1
Sendmail Sendmail Switch 2.1.2
Sendmail Sendmail Switch 2.2.3
Sendmail Sendmail Switch 2.2.4
Sendmail Sendmail 2.6.2
Sendmail Sendmail 3.0
Sendmail Sendmail 3.0.1
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.2
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »