Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 7.0 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2008-3890
The kernel in FreeBSD 6.3 up to and including 7.0 on amd64 platforms can make an extra swapgs call after a General Protection Fault (GPF), which allows local users to gain privileges by triggering a GPF during the kernel's return from (1) an interrupt, (2) a trap, or (3) a s...
Freebsd Freebsd 6.3
Freebsd Freebsd 7.0
7.2
CVSSv2
CVE-2002-0572
FreeBSD 4.5 and previous versions, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called set...
Freebsd Freebsd 4.5
Openbsd Openbsd 2.0
Openbsd Openbsd 2.2
Sun Sunos -
Sun Solaris 7.0
Openbsd Openbsd 2.3
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 2.6
Freebsd Freebsd 4.4
Sun Solaris 8.0
Openbsd Openbsd 2.1
Sun Sunos 5.7
Sun Sunos 5.8
1 EDB exploit
7.2
CVSSv2
CVE-2002-0062
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
Suse Suse Linux 6.2
Redhat Linux 7.2
Debian Debian Linux 2.2
Freebsd Freebsd 3.1
Redhat Linux 6.1
Redhat Linux 7.1
Freebsd Freebsd 3.5.1
Redhat Linux 7.0
Freebsd Freebsd 4.1
Freebsd Freebsd 3.2
Suse Suse Linux 7.0
Suse Suse Linux 6.3
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 5.0
Gnu Ncurses
7.2
CVSSv2
CVE-2002-0004
Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.
Caldera Openlinux Workstation 3.1
Caldera Openlinux Server 3.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.2
Netbsd Netbsd 1.5.2
Redhat Linux 6.2
Redhat Linux 7.2
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 7.2
Debian Debian Linux 2.2
Mandrakesoft Mandrake Linux 8.1
Redhat Linux 7.1
Freebsd Freebsd 4.3
Freebsd Freebsd 4.4
Slackware Slackware Linux 7.0
Suse Suse Linux 7.3
Mandrakesoft Mandrake Linux 8.0
Redhat Linux 7.0
Slackware Slackware Linux 7.1
Slackware Slackware Linux 8.0
1 EDB exploit
7.2
CVSSv2
CVE-2001-0128
Zope prior to 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.
Conectiva Linux 5.0
Conectiva Linux 5.1
Conectiva Linux 6.0
Zope Zope
Redhat Linux Powertools 6.1
Redhat Linux Powertools 6.2
Redhat Linux Powertools 7.0
Conectiva Linux 4.2
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 7.0
Debian Debian Linux 2.2
Freebsd Freebsd 6.2
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
7.2
CVSSv2
CVE-2000-0963
Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS.
Immunix Immunix 6.2
Immunix Immunix 7.0 Beta
Freebsd Freebsd 4.1.1
Redhat Linux 7.0
Redhat Linux 6.2
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.1
Freebsd Freebsd 4.0
Freebsd Freebsd 3.4
Gnu Ncurses
7.2
CVSSv2
CVE-1999-1008
xsoldier program allows local users to gain root access via a long argument.
Mandrakesoft Mandrake Linux 7.0
Freebsd Freebsd 3.3
3 EDB exploits
7.2
CVSSv2
CVE-2000-0186
Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.
Freebsd Freebsd 3.4
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 5.1
Redhat Linux 6.0
Turbolinux Turbolinux 6.0.2
Redhat Linux 6.1
Redhat Linux 6.2
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 4.4
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 5.2
7.1
CVSSv2
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0\\(16\\)sc3
Cisco Ios 12.2\\(3.4\\)bp
Cisco Ios 11.2xa
Cisco Ios 12.4\\(2\\)t2
Cisco Ios 12.3ym
Cisco Ios 11.3\\(11b\\)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0\\(21\\)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1\\(2\\)e1
Cisco Ios 12.1xg
Cisco Ios 12.1\\(19\\)ew
Cisco Ios 12.3\\(14\\)ym4
Cisco Ios 12.0\\(8\\)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2\\(7b\\)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3\\(10\\)
1 Github repository
7.1
CVSSv2
CVE-2008-3530
sys/netinet6/icmp6.c in the kernel in FreeBSD 6.3 up to and including 7.1, NetBSD 3.0 up to and including 4.0, and possibly other operating systems does not properly check the proposed new MTU in an ICMPv6 Packet Too Big Message, which allows remote malicious users to cause a den...
Freebsd Freebsd 6.3
Freebsd Freebsd 7.0
Freebsd Freebsd 7.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »