Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 4.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-1674
procfs on FreeBSD prior to 4.5 allows local users to cause a denial of service (kernel panic) by removing a file that the fstatfs function refers to.
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Freebsd Freebsd 4.4
Freebsd Freebsd 4.5
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
NA
CVE-2002-0973
Integer signedness error in several system calls for FreeBSD 4.6.1 RELEASE-p10 and previous versions may allow malicious users to access sensitive kernel memory via large negative values to the (1) accept, (2) getsockname, and (3) getpeername system calls, and the (4) vesa FBIO_G...
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.2
Freebsd Freebsd 4.5
Freebsd Freebsd 4.3
Freebsd Freebsd 4.6
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.6.1
Freebsd Freebsd 4.4
NA
CVE-2002-0754
Kerberos 5 su (k5su) in FreeBSD 4.4 and previous versions relies on the getlogin system call to determine if the user running k5su is root, which could allow a root-initiated process to regain its privileges after it has dropped them.
Freebsd Heimdal 0.4e
Kth Heimdal 0.4e
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Freebsd Freebsd 4.4
NA
CVE-2002-0062
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
Suse Suse Linux 6.2
Redhat Linux 7.2
Debian Debian Linux 2.2
Freebsd Freebsd 3.1
Redhat Linux 6.1
Redhat Linux 7.1
Freebsd Freebsd 3.5.1
Redhat Linux 7.0
Freebsd Freebsd 4.1
Freebsd Freebsd 3.2
Suse Suse Linux 7.0
Suse Suse Linux 6.3
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 5.0
Gnu Ncurses
NA
CVE-2001-1166
linprocfs on FreeBSD 4.3 and previous versions does not properly restrict access to kernel memory, which allows one process with debugging rights on a privileged process to read restricted memory from that process.
Freebsd Freebsd 4.3
Freebsd Freebsd 4.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.2
NA
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
NA
CVE-2001-1180
FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to the child.
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
NA
CVE-2001-0439
licq prior to 1.0.3 allows remote malicious users to execute arbitrary commands via shell metacharacters in a URL.
Conectiva Linux 5.0
Licq Licq
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 4.0
Conectiva Linux 4.0es
Redhat Linux 7.0
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Freebsd Freebsd 4.2
Mandrakesoft Mandrake Linux 7.1
Freebsd Freebsd 3.5.1
NA
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Mit Kerberos 5 1.1.1
Sgi Irix 6.1
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Mit Kerberos 5 1.2
Sgi Irix 6.5.11
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Freebsd Freebsd 2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 3.5
3 EDB exploits
NA
CVE-2001-0183
ipfw and ip6fw in FreeBSD 4.2 and previous versions allows remote malicious users to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection.
Freebsd Freebsd 3.5
Freebsd Freebsd 3.5.1
Freebsd Freebsd 3.0
Freebsd Freebsd 3.1
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.3
Freebsd Freebsd 3.4
Freebsd Freebsd 4.2
Freebsd Freebsd 4.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »