Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
berkeley vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-4785
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015...
Oracle Berkeley Db 12.1.6.0.35
Oracle Berkeley Db 11.2.5.2.42
Oracle Berkeley Db 11.2.5.1.29
Oracle Berkeley Db 11.2.5.3.28
NA
CVE-2015-4786
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015...
Oracle Berkeley Db 11.2.5.1.29
Oracle Berkeley Db 11.2.5.2.42
Oracle Berkeley Db 12.1.6.0.35
Oracle Berkeley Db 11.2.5.3.28
NA
CVE-2015-4787
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015...
Oracle Berkeley Db 11.2.5.2.42
Oracle Berkeley Db 11.2.5.3.28
Oracle Berkeley Db 12.1.6.0.35
Oracle Berkeley Db 11.2.5.1.29
NA
CVE-2015-4788
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect integrity and availability via unknown vectors, a different vulnerability than CVE-2015-4774 and CVE-2015-4779.
Oracle Berkeley Db 11.2.5.1.29
Oracle Berkeley Db 11.2.5.3.28
Oracle Berkeley Db 11.2.5.2.42
Oracle Berkeley Db 12.1.6.0.35
NA
CVE-2015-4789
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015...
Oracle Berkeley Db 11.2.5.1.29
Oracle Berkeley Db 11.2.5.2.42
Oracle Berkeley Db 11.2.5.3.28
Oracle Berkeley Db 12.1.6.0.35
NA
CVE-2015-4790
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015...
Oracle Berkeley Db 12.1.6.0.35
Oracle Berkeley Db 11.2.5.2.42
Oracle Berkeley Db 11.2.5.1.29
Oracle Berkeley Db 11.2.5.3.28
9.8
CVSSv3
CVE-2018-1000875
Berkeley Open Infrastructure for Network Computing BOINC Server and Website Code version 0.9-1.0.2 contains a CWE-302: Authentication Bypass by Assumed-Immutable Data vulnerability in Website Terms of Service Acceptance Page that can result in Access to any user account. This att...
Berkeley Berkeley Open Infrastructure For Network Computing
NA
CVE-2009-0126
The decrypt_public function in lib/crypt.cpp in the client in Berkeley Open Infrastructure for Network Computing (BOINC) 6.2.14 and 6.4.5 does not check the return value from the OpenSSL RSA_public_decrypt function, which allows remote malicious users to bypass validation of the ...
Berkeley Boinc Client 6.4.5
Berkeley Boinc Client 6.2.14
9.8
CVSSv3
CVE-2013-2018
Multiple SQL injection vulnerabilities in BOINC allow remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Berkeley Boinc -
NA
CVE-2001-0915
Format string vulnerability in Berkeley parallel make (pmake) 2.1.33 and previous versions allows a local user to gain root privileges via format specifiers in the check argument of a shell definition.
Berkeley Pmake
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »