Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd freebsd 3.1 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2000-0489
FreeBSD, NetBSD, and OpenBSD allow an malicious user to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
Netbsd Netbsd 1.4
Freebsd Freebsd 3.1
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.7
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 5.0
Openbsd Openbsd 2.6
Openbsd Openbsd 2.5
1 EDB exploit
2.1
CVSSv2
CVE-1999-1402
The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems prior to 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket.
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Sun Solaris 2.5.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.0
Sun Solaris 2.5
Sun Solaris 2.6
Freebsd Freebsd 2.2.2
Freebsd Freebsd 3.1
Sun Sunos 5.0
Sun Sunos -
Sun Sunos 4.0
1 EDB exploit
1.2
CVSSv2
CVE-2002-0760
Race condition in bzip2 prior to 1.0.2 in FreeBSD 4.5 and previous versions, OpenLinux 3.1 and 3.1.1, and possibly other operating systems, decompresses files with world-readable permissions before setting the permissions to what is specified in the bzip2 archive, which could all...
Bzip Bzip2 0.9.0
Bzip Bzip2 0.9.0a
Bzip Bzip2 0.9.0b
Bzip Bzip2 0.9.5a
Bzip Bzip2 0.9.5c
Bzip Bzip2 0.9.5d
Bzip Bzip2 1.0
Bzip Bzip2 1.0.1
Bzip Bzip2 0.9.0c
Bzip Bzip2 0.9.5b
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7