Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 4.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-0315
traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks.
Redhat Linux 2.0.34
Slackware Slackware Linux 2.0.34
Netbsd Netbsd
Debian Debian Linux 2.0.34
Digital Unix 4.0
5
CVSSv2
CVE-1999-0015
Teardrop IP denial of service.
Hp Hp-ux 10.01
Hp Hp-ux 10.16
Hp Hp-ux 10.20
Hp Hp-ux 9.04
Hp Hp-ux 9.05
Microsoft Windows Nt 4.0
Hp Hp-ux 11.00
Hp Hp-ux 9.00
Microsoft Windows Nt 3.5.1
Netbsd Netbsd 1.2
Netbsd Netbsd 1.2.1
Hp Hp-ux 10
Hp Hp-ux 9.01
Hp Hp-ux 9.03
Sun Sunos 4.1.3u1
Sun Sunos 4.1.4
Hp Hp-ux 10.24
Hp Hp-ux 10.30
Hp Hp-ux 9.07
Microsoft Windows 95 0.0a
Netbsd Netbsd 1.0
Netbsd Netbsd 1.1
1 EDB exploit
7.5
CVSSv2
CVE-2008-1391
Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent malicious users to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function...
Freebsd Freebsd 6.0
Netbsd Netbsd 4.0
Freebsd Freebsd 6.0 P5 Release
Freebsd Freebsd 7.0
Freebsd Freebsd 7.0 Beta4
Freebsd Freebsd 7.0 Releng
1 EDB exploit
10
CVSSv2
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Mit Kerberos 5 1.1.1
Sgi Irix 6.1
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Mit Kerberos 5 1.2
Sgi Irix 6.5.11
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Freebsd Freebsd 2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 3.5
3 EDB exploits
4.6
CVSSv2
CVE-1999-0433
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Xfree86 Project X11r6 3.3.3
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Redhat Linux 5.2
Slackware Slackware Linux 3.4
Netbsd Netbsd 1.3.3
Slackware Slackware Linux 4.0
Suse Suse Linux 5.2
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 5.1
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.3
Netbsd Netbsd 1.3.2
1 EDB exploit
5
CVSSv2
CVE-2001-1244
Multiple TCP implementations could allow remote malicious users to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Microsoft Windows Nt 4.0
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Hp Hp-ux 11.11
Hp Vvos 11.04
Microsoft Windows 2000
Sun Sunos 5.8
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Linux Linux Kernel 2.4.5
Sun Sunos 5.5.1
Sun Sunos 5.7
Freebsd Freebsd 4.3
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.4
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
1 EDB exploit
2.1
CVSSv2
CVE-2000-0461
The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call.
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.2
Freebsd Freebsd 2.2.4
Freebsd Freebsd 3.1
Freebsd Freebsd 3.3
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 4.0
Freebsd Freebsd 5.0
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.3
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
5
CVSSv2
CVE-1999-0016
Land IP denial of service.
Cisco Ios 7000
Gnu Inet 5.01
Microsoft Winsock 2.0
Hp Hp-ux 9.04
Hp Hp-ux 9.05
Hp Hp-ux 9.07
Microsoft Windows 95
Hp Hp-ux 10.16
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Hp Hp-ux 10.30
Hp Hp-ux 10.01
Hp Hp-ux 9.00
Hp Hp-ux 9.03
Microsoft Windows Nt 4.0
Netbsd Netbsd 1.1
Sun Sunos 4.1.4
Hp Hp-ux 10.00
Hp Hp-ux 10.10
Hp Hp-ux 11.00
Hp Hp-ux 9.01
Netbsd Netbsd 1.0
5 EDB exploits
3 Github repositories
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »