Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 4.0 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2002-0973
Integer signedness error in several system calls for FreeBSD 4.6.1 RELEASE-p10 and previous versions may allow malicious users to access sensitive kernel memory via large negative values to the (1) accept, (2) getsockname, and (3) getpeername system calls, and the (4) vesa FBIO_G...
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.4
Freebsd Freebsd 4.6
Freebsd Freebsd 4.3
Freebsd Freebsd 4.5
Freebsd Freebsd 4.2
Freebsd Freebsd 4.1
Freebsd Freebsd 4.0
Freebsd Freebsd 4.6.1
10
CVSSv2
CVE-2002-0391
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote malicious users to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services suc...
Openbsd Openbsd 3.1
Sun Sunos 5.7
Sun Sunos 5.8
Sun Sunos 5.5.1
Sun Solaris 2.6
Sun Solaris 9.0
Freebsd Freebsd
Microsoft Windows Nt 4.0
Microsoft Windows Xp -
Microsoft Windows 2000 -
7.2
CVSSv2
CVE-2002-0754
Kerberos 5 su (k5su) in FreeBSD 4.4 and previous versions relies on the getlogin system call to determine if the user running k5su is root, which could allow a root-initiated process to regain its privileges after it has dropped them.
Freebsd Heimdal 0.4e
Kth Heimdal 0.4e
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.3
Freebsd Freebsd 4.2
Freebsd Freebsd 4.1
Freebsd Freebsd 4.4
Freebsd Freebsd 4.0
7.2
CVSSv2
CVE-2002-0062
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
Suse Suse Linux 6.2
Redhat Linux 7.2
Debian Debian Linux 2.2
Freebsd Freebsd 3.1
Redhat Linux 6.1
Redhat Linux 7.1
Freebsd Freebsd 3.5.1
Redhat Linux 7.0
Freebsd Freebsd 4.1
Freebsd Freebsd 3.2
Suse Suse Linux 7.0
Suse Suse Linux 6.3
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 5.0
Gnu Ncurses
5
CVSSv2
CVE-2001-1166
linprocfs on FreeBSD 4.3 and previous versions does not properly restrict access to kernel memory, which allows one process with debugging rights on a privileged process to read restricted memory from that process.
Freebsd Freebsd 4.1
Freebsd Freebsd 4.2
Freebsd Freebsd 4.0
Freebsd Freebsd 4.3
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Netkit Linux Netkit 0.11
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
1 EDB exploit
7.2
CVSSv2
CVE-2001-1180
FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to the child.
Freebsd Freebsd 4.1
Freebsd Freebsd 4.2
Freebsd Freebsd 4.0
Freebsd Freebsd 4.3
5
CVSSv2
CVE-2001-1244
Multiple TCP implementations could allow remote malicious users to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data...
Microsoft Windows Nt 4.0
Openbsd Openbsd 2.8
Hp Hp-ux 11.11
Netbsd Netbsd 1.5
Openbsd Openbsd 2.9
Sun Sunos 5.7
Sun Sunos 5.8
Microsoft Windows 2000
Hp Hp-ux 11.00
Netbsd Netbsd 1.5.1
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.2
Hp Hp-ux 11.0.4
Hp Vvos 11.04
Linux Linux Kernel 2.4.5
Sun Sunos 5.5.1
Freebsd Freebsd 4.3
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.4
1 EDB exploit
7.5
CVSSv2
CVE-2001-0439
licq prior to 1.0.3 allows remote malicious users to execute arbitrary commands via shell metacharacters in a URL.
Conectiva Linux 4.2
Conectiva Linux 4.1
Licq Licq
Conectiva Linux 4.0es
Conectiva Linux 5.0
Conectiva Linux 4.0
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 7.0
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.2
10
CVSSv2
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.1
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.5.7
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
3 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »