Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 3.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0102
Buffer overflow in tryelf() in readelf.c of the file command allows malicious users to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
File File 3.30
File File 3.32
File File 3.28
File File 3.37
File File 3.39
File File 3.40
File File 3.33
File File 3.34
File File 3.35
File File 3.36
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
2 EDB exploits
NA
CVE-1999-1518
Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults.
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.3.2
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 3.2
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.4
1 EDB exploit
NA
CVE-1999-0297
Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable.
Paul Vixie Vixie Cron 3.0
Netbsd Netbsd 2.0.4
Redhat Linux
Bsdi Bsd Os 2.1
Freebsd Freebsd 2.1.0
NA
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Mit Kerberos 5 1.1.1
Sgi Irix 6.1
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Mit Kerberos 5 1.2
Sgi Irix 6.5.11
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Freebsd Freebsd 2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 3.5
3 EDB exploits
NA
CVE-2006-0905
A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE up to and including 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows remote ma...
Freebsd Freebsd 4.10
Freebsd Freebsd 4.8
Freebsd Freebsd 5.0
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Freebsd Freebsd 6.0
Freebsd Freebsd 4.11
Freebsd Freebsd 4.9
Netbsd Netbsd 2.0
Netbsd Netbsd 3.0
Freebsd Freebsd 5.2
Freebsd Freebsd 5.4
Freebsd Freebsd 5.2.1
NA
CVE-2002-1337
Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote malicious users to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
Sendmail Sendmail
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Hp Hp-ux 11.11
Netbsd Netbsd 1.5
Windriver Bsdos 4.2
Sun Sunos 5.7
Sun Sunos 5.8
Gentoo Linux 1.4
Hp Hp-ux 11.00
Windriver Bsdos 5.0
Netbsd Netbsd 1.5.1
Hp Hp-ux 11.0.4
Oracle Solaris 8
Hp Hp-ux 11.22
Netbsd Netbsd 1.5.2
Oracle Solaris 9
Hp Alphaserver Sc
Hp Hp-ux 10.20
Windriver Platform Sa 1.0
Hp Hp-ux 10.10
Windriver Bsdos 4.3.1
3 EDB exploits
1 Github repository
NA
CVE-1999-0017
FTP servers can allow an malicious user to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce.
Gnu Inet 5.01
Gnu Inet 6.01
Washington University Wu-ftpd 2.4
Gnu Inet 6.02
Sun Sunos 5.5
Ibm Aix 4.3
Sco Open Desktop 3.0
Sun Sunos 5.3
Caldera Openlinux 1.2
Sun Sunos 4.1.4
Ibm Aix 4.2
Netbsd Netbsd 1.2.1
Freebsd Freebsd 2.1.7
Siemens Reliant Unix
Netbsd Netbsd 1.0
Sun Sunos 5.4
Freebsd Freebsd 1.1
Freebsd Freebsd 1.2
Freebsd Freebsd 2.1.0
Sun Sunos 4.1.3u1
Netbsd Netbsd 1.1
Netbsd Netbsd 1.2
NA
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
NA
CVE-2000-0461
The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call.
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.2
Freebsd Freebsd 2.2.4
Freebsd Freebsd 3.1
Freebsd Freebsd 3.3
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 4.0
Freebsd Freebsd 5.0
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.3
NA
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »