Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
berkeley vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-4786
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015...
Oracle Berkeley Db 11.2.5.1.29
Oracle Berkeley Db 11.2.5.2.42
Oracle Berkeley Db 12.1.6.0.35
Oracle Berkeley Db 11.2.5.3.28
NA
CVE-2015-4787
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015...
Oracle Berkeley Db 11.2.5.2.42
Oracle Berkeley Db 11.2.5.3.28
Oracle Berkeley Db 12.1.6.0.35
Oracle Berkeley Db 11.2.5.1.29
NA
CVE-2015-4789
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015...
Oracle Berkeley Db 11.2.5.1.29
Oracle Berkeley Db 11.2.5.2.42
Oracle Berkeley Db 11.2.5.3.28
Oracle Berkeley Db 12.1.6.0.35
NA
CVE-2015-4790
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015...
Oracle Berkeley Db 12.1.6.0.35
Oracle Berkeley Db 11.2.5.2.42
Oracle Berkeley Db 11.2.5.1.29
Oracle Berkeley Db 11.2.5.3.28
NA
CVE-2015-2583
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2624, CVE-2015...
Oracle Berkeley Db 11.2.5.1.29
Oracle Berkeley Db 11.2.5.3.28
Oracle Berkeley Db 11.2.5.2.42
Oracle Berkeley Db 12.1.6.0.35
NA
CVE-2015-2656
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015...
Oracle Berkeley Db 11.2.5.1.29
Oracle Berkeley Db 11.2.5.2.42
Oracle Berkeley Db 11.2.5.3.28
Oracle Berkeley Db 12.1.6.0.35
9.8
CVSSv3
CVE-2018-1000875
Berkeley Open Infrastructure for Network Computing BOINC Server and Website Code version 0.9-1.0.2 contains a CWE-302: Authentication Bypass by Assumed-Immutable Data vulnerability in Website Terms of Service Acceptance Page that can result in Access to any user account. This att...
Berkeley Berkeley Open Infrastructure For Network Computing
NA
CVE-2009-0126
The decrypt_public function in lib/crypt.cpp in the client in Berkeley Open Infrastructure for Network Computing (BOINC) 6.2.14 and 6.4.5 does not check the return value from the OpenSSL RSA_public_decrypt function, which allows remote malicious users to bypass validation of the ...
Berkeley Boinc Client 6.4.5
Berkeley Boinc Client 6.2.14
NA
CVE-2001-0916
Buffer overflow in Berkeley parallel make (pmake) 2.1.33 and previous versions allows a local user to gain root privileges via a long check argument of a shell definition.
Berkeley Pmake
1 EDB exploit
9.8
CVSSv3
CVE-2013-2018
Multiple SQL injection vulnerabilities in BOINC allow remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Berkeley Boinc -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »