Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 7.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-6150
The "internal state tracking" code for the random and urandom devices in FreeBSD 5.5, 6.1 up to and including 6.3, and 7.0 beta 4 allows local users to obtain portions of previously-accessed random values, which could be leveraged to bypass protection mechanisms that re...
Freebsd Freebsd 6.2
Freebsd Freebsd 6.3
Freebsd Freebsd 5.5
Freebsd Freebsd 6.1
Freebsd Freebsd 7.0
NA
CVE-2005-4351
The securelevels implementation in FreeBSD 7.0 and previous versions, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running.
Freebsd Freebsd 7.0
Dragonfly Dragonfly
Openbsd Openbsd
Freebsd Freebsd
Linux Linux Kernel
NA
CVE-2005-0988
Race condition in gzip 1.2.4, 1.3.3, and previous versions, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompressio...
Gnu Gzip 1.2.4
Gnu Gzip 1.2.4a
Gnu Gzip 1.3.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.11
Freebsd Freebsd 4.4
Freebsd Freebsd 4.5
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Freebsd Freebsd 4.9
Freebsd Freebsd 5.1
Freebsd Freebsd 5.3
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 3.0
Turbolinux Turbolinux Appliance Server 1.0 Hosting
Turbolinux Turbolinux Appliance Server 1.0 Workgroup
Ubuntu Ubuntu Linux 4.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.10
Freebsd Freebsd 4.3
Freebsd Freebsd 4.8
NA
CVE-2003-0914
ISC BIND 8.3.x prior to 8.3.7, and 8.4.x prior to 8.4.3, allows remote malicious users to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value.
Isc Bind 8.2.3
Isc Bind 8.3.2
Isc Bind 8.3.3
Nixu Namesurfer Suite 3.0.1
Isc Bind 8.2.4
Isc Bind 8.2.5
Isc Bind 8.3.4
Isc Bind 8.3.5
Isc Bind 8.3.0
Isc Bind 8.3.1
Isc Bind 8.4.1
Nixu Namesurfer Standard 3.0.1
Isc Bind 8.2.6
Isc Bind 8.2.7
Isc Bind 8.3.6
Isc Bind 8.4
Compaq Tru64 5.1
Compaq Tru64 5.1 Pk3 Bl17
Compaq Tru64 5.1a Pk3 Bl3
Compaq Tru64 5.1a Pk4 Bl21
Freebsd Freebsd 4.6
Freebsd Freebsd 4.6.2
NA
CVE-2003-0694
The prescan function in Sendmail 8.12.9 allows remote malicious users to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
Sendmail Advanced Message Server 1.3
Sendmail Sendmail 2.6
Sendmail Sendmail 8.10
Sendmail Sendmail 8.10.1
Sendmail Sendmail 8.11.5
Sendmail Sendmail 8.11.6
Sendmail Sendmail 8.12.7
Sendmail Sendmail 3.0
Sendmail Sendmail 3.0.1
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.2
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12
Sendmail Sendmail 8.9.3
Sendmail Advanced Message Server 1.2
Sendmail Sendmail 3.0.2
Sendmail Sendmail 3.0.3
Sendmail Sendmail 8.11.3
Sendmail Sendmail 8.11.4
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.5
1 Github repository
NA
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
NA
CVE-2002-0572
FreeBSD 4.5 and previous versions, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called set...
Freebsd Freebsd 4.5
Openbsd Openbsd 2.0
Openbsd Openbsd 2.2
Sun Sunos -
Sun Solaris 7.0
Openbsd Openbsd 2.3
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 2.6
Freebsd Freebsd 4.4
Sun Solaris 8.0
Openbsd Openbsd 2.1
Sun Sunos 5.7
Sun Sunos 5.8
1 EDB exploit
NA
CVE-2002-0062
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
Suse Suse Linux 6.2
Redhat Linux 7.2
Debian Debian Linux 2.2
Freebsd Freebsd 3.1
Redhat Linux 6.1
Redhat Linux 7.1
Freebsd Freebsd 3.5.1
Redhat Linux 7.0
Freebsd Freebsd 4.1
Freebsd Freebsd 3.2
Suse Suse Linux 7.0
Suse Suse Linux 6.3
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 5.0
Gnu Ncurses
NA
CVE-2002-0004
Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.
Caldera Openlinux Workstation 3.1
Caldera Openlinux Server 3.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.2
Netbsd Netbsd 1.5.2
Redhat Linux 6.2
Redhat Linux 7.2
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 7.2
Debian Debian Linux 2.2
Mandrakesoft Mandrake Linux 8.1
Redhat Linux 7.1
Freebsd Freebsd 4.3
Freebsd Freebsd 4.4
Slackware Slackware Linux 7.0
Suse Suse Linux 7.3
Mandrakesoft Mandrake Linux 8.0
Redhat Linux 7.0
Slackware Slackware Linux 7.1
Slackware Slackware Linux 8.0
1 EDB exploit
NA
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36954
CVE-2024-36933
CVE-2024-24919
CVE-2024-36923
CVE-2024-2961
CVE-2024-36925
bypass
encryption
command injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »