Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
berkeley vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2016-3955
The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel prior to 4.5.3 allows remote malicious users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Linux Linux Kernel
Debian Debian Linux 8.0
1 Github repository
10
CVSSv2
CVE-2012-2653
arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow malicious users to gain root privileges by leveraging other vulnerabilities in the daemon.
Lawrence Berkeley National Laboratory Arpwatch 2.1a15
10
CVSSv2
CVE-2001-0010
Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote malicious users to gain root privileges.
Isc Bind 8.2.2
Isc Bind 8.2.1
Isc Bind 8.2
4 EDB exploits
10
CVSSv2
CVE-2001-0011
Buffer overflow in nslookupComplain function in BIND 4 allows remote malicious users to gain root privileges.
Isc Bind 4.9.5
Isc Bind 4.9.7
Isc Bind 4.9.3
Isc Bind 4.9.6
10
CVSSv2
CVE-2001-0013
Format string vulnerability in nslookupComplain function in BIND 4 allows remote malicious users to gain root privileges.
Isc Bind 4.9.3
Isc Bind 4.9.5
Isc Bind 4.9.6
Isc Bind 4.9.7
10
CVSSv2
CVE-1999-0095
The debug command in Sendmail is enabled, allowing malicious users to execute commands as root.
Eric Allman Sendmail 5.58
1 EDB exploit
9.3
CVSSv2
CVE-1999-0704
Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others.
Redhat Linux 4.2
Redhat Linux 5.0
Redhat Linux 5.1
Redhat Linux 5.2
Bsdi Bsd Os 4.0.1
Freebsd Freebsd 3.1
Bsdi Bsd Os 3.1
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Redhat Linux 6.0
2 EDB exploits
7.8
CVSSv2
CVE-2011-4151
The krb5_db2_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 up to and including 1.8.4, when the db2 (aka Berkeley DB) back end is used, allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via...
Mit Kerberos 5 1.8.1
Mit Kerberos 5 1.8
Mit Kerberos 5 1.8.4
Mit Kerberos 5 1.8.3
Mit Kerberos 5 1.8.2
7.8
CVSSv2
CVE-2011-1528
The krb5_ldap_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 up to and including 1.8.4 and 1.9 up to and including 1.9.1, when the LDAP back end is used, allows remote malicious users to cause a denial of service (assertion failure an...
Mit Kerberos 5 1.8.4
Mit Kerberos 5 1.8.2
Mit Kerberos 5 1.8
Mit Kerberos 5 1.9.1
Mit Kerberos 5 1.9
Mit Kerberos 5 1.8.3
Mit Kerberos 5 1.8.1
7.8
CVSSv2
CVE-2011-1529
The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 up to and including 1.8.4 and 1.9 up to and including 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote malicious users to cause a denial of servic...
Mit Kerberos 5 1.8.2
Mit Kerberos 5 1.8.1
Mit Kerberos 5 1.9
Mit Kerberos 5 1.8.4
Mit Kerberos 5 1.8.3
Mit Kerberos 5 1.8
Mit Kerberos 5 1.9.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »