Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 1.5.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-2245
ftpd in NetBSD 1.5 up to and including 1.5.3 and 1.6 does not properly quote a digit in response to a STAT command for a filename that contains a carriage return followed by a digit, which can cause firewalls and other intermediary devices to lose proper track of the FTP session.
Netbsd Ftpd 1.5.1
Netbsd Ftpd 1.5.2
Netbsd Ftpd 1.5.3
Netbsd Ftpd 1.6
Netbsd Ftpd 1.5
NA
CVE-2002-0666
IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote malicious users to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in...
Frees Wan Frees Wan 1.9
Frees Wan Frees Wan 1.9.1
Frees Wan Frees Wan 1.9.3
Frees Wan Frees Wan 1.9.5
Frees Wan Frees Wan 1.9.2
Frees Wan Frees Wan 1.9.4
Frees Wan Frees Wan 1.9.6
Apple Mac Os X 10.2
Apple Mac Os X Server 10.2
Freebsd Freebsd 4.6
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.6
Global Technology Associates Gnat Box Firmware 3.3
Nec Bluefire Ix1035 Router
Nec Ix1010
Nec Ix1011
Global Technology Associates Gnat Box Firmware 3.1
Nec Ix1050
Global Technology Associates Gnat Box Firmware 3.2
NA
CVE-2002-1192
Multiple buffer overflows in rogue on NetBSD 1.6 and previous versions, FreeBSD 4.6, and possibly other operating systems, allows local users to gain "games" group privileges via malformed entries in a game save file.
Rogue Rogue 5.3
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
1 EDB exploit
NA
CVE-2002-1194
Buffer overflow in talkd on NetBSD 1.6 and previous versions, and possibly other operating systems, may allow remote malicious users to execute arbitrary code via a long inbound message.
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.6
NA
CVE-2002-1165
Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows malicious users to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2)...
Sendmail Sendmail 8.12.0
Sendmail Sendmail 8.12.1
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.5
Sendmail Sendmail 8.12.6
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
1 EDB exploit
NA
CVE-2002-0414
KAME-derived implementations of IPsec on NetBSD 1.5.2, FreeBSD 4.5, and other operating systems, does not properly consult the Security Policy Database (SPD), which could cause a Security Gateway (SG) that does not use Encapsulating Security Payload (ESP) to forward forged IPv4 p...
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Openbsd Openbsd 2.6
Freebsd Freebsd 4.2
Freebsd Freebsd 4.4
Freebsd Freebsd 4.3
Freebsd Freebsd 4.5
Openbsd Openbsd 2.7
NA
CVE-2001-1091
The (1) dump and (2) dump_lfs commands in NetBSD 1.4.x up to and including 1.5.1 do not properly drop privileges, which could allow local users to gain privileges via the RCMD_CMD environment variable.
Netbsd Netbsd 1.4
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.4.3
NA
CVE-2001-1145
fts routines in FreeBSD 4.3 and previous versions, NetBSD prior to 1.5.2, and OpenBSD 2.9 and previous versions can be forced to change (chdir) into a different directory than intended when the directory above the current directory is moved, which could cause scripts to perform d...
Netbsd Netbsd 1.5
Openbsd Openbsd
Freebsd Freebsd 4.3
Netbsd Netbsd 1.5.1
NA
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
NA
CVE-2001-1244
Multiple TCP implementations could allow remote malicious users to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Microsoft Windows Nt 4.0
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Hp Hp-ux 11.11
Hp Vvos 11.04
Microsoft Windows 2000
Sun Sunos 5.8
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Linux Linux Kernel 2.4.5
Sun Sunos 5.5.1
Sun Sunos 5.7
Freebsd Freebsd 4.3
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.4
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3