Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 1.4.1 vulnerabilities and exploits
(subscribe to this query)
215
VMScore
CVE-2000-0489
FreeBSD, NetBSD, and OpenBSD allow an malicious user to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
Netbsd Netbsd 1.4
Freebsd Freebsd 3.1
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.7
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 5.0
Openbsd Openbsd 2.6
Openbsd Openbsd 2.5
1 EDB exploit
329
VMScore
CVE-2002-2092
Race condition in exec in OpenBSD 4.0 and previous versions, NetBSD 1.5.2 and previous versions, and FreeBSD 4.4 and previous versions allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.5.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.8
1000
VMScore
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Mit Kerberos 5 1.1.1
Sgi Irix 6.1
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Mit Kerberos 5 1.2
Sgi Irix 6.5.11
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Freebsd Freebsd 2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 3.5
3 EDB exploits
187
VMScore
CVE-2000-0461
The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call.
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.2
Freebsd Freebsd 2.2.4
Freebsd Freebsd 3.1
Freebsd Freebsd 3.3
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 4.0
Freebsd Freebsd 5.0
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.3
1000
VMScore
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
828
VMScore
CVE-2011-2895
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont prior to 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD prior to 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x prior to 5.0.3 and 5.1.x prior to 5.1.1, FreeTyp...
Openbsd Openbsd 3.5
Openbsd Openbsd 3.4
Openbsd Openbsd 3.3
Openbsd Openbsd 2.6
Openbsd Openbsd 2.0
Freebsd Freebsd
Netbsd Netbsd
Openbsd Openbsd 3.0
Openbsd Openbsd 2.9
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
X Libxfont 1.2.0
X Libxfont 1.2.1
X Libxfont 1.2.9
X Libxfont 1.3.0
X Libxfont 1.4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 2.8
Openbsd Openbsd 2.7
Openbsd Openbsd 2.5
Openbsd Openbsd
X Libxfont 1.2.2
632
VMScore
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0\\(16\\)sc3
Cisco Ios 12.2\\(3.4\\)bp
Cisco Ios 11.2xa
Cisco Ios 12.4\\(2\\)t2
Cisco Ios 12.3ym
Cisco Ios 11.3\\(11b\\)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0\\(21\\)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1\\(2\\)e1
Cisco Ios 12.1xg
Cisco Ios 12.1\\(19\\)ew
Cisco Ios 12.3\\(14\\)ym4
Cisco Ios 12.0\\(8\\)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2\\(7b\\)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3\\(10\\)
1 Github repository
668
VMScore
CVE-2017-8283
dpkg-source in dpkg 1.3.0 up to and including 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote malicious users to conduct directory traversal attacks via a crafted Debian source package, as...
Debian Dpkg 1.18.19
Debian Dpkg 1.18.17
Debian Dpkg 1.18.12
Debian Dpkg 1.18.10
Debian Dpkg 1.18.3
Debian Dpkg 1.18.1
Debian Dpkg 1.17.18
Debian Dpkg 1.17.16
Debian Dpkg 1.17.11
Debian Dpkg 1.17.9
Debian Dpkg 1.17.2
Debian Dpkg 1.17.0
Debian Dpkg 1.16.4.3
Debian Dpkg 1.16.4.1
Debian Dpkg 1.16.1.1
Debian Dpkg 1.16.0.3
Debian Dpkg 1.15.8.7
Debian Dpkg 1.15.8.5
Debian Dpkg 1.15.7.1
Debian Dpkg 1.15.6.1
Debian Dpkg 1.15.5.3
Debian Dpkg 1.15.5.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3