Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 3.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-3584
NetBSD 3.0, 3.1, and 4.0, when a pppoe instance exists, does not properly check the length of a PPPoE packet tag, which allows remote malicious users to cause a denial of service (system crash) via a crafted PPPoE packet.
Netbsd Netbsd 3.0
Netbsd Netbsd 3.1
Netbsd Netbsd 4.0
NA
CVE-2008-1335
The ipsec4_get_ulp function in the kernel in NetBSD 2.0 up to and including 3.1 and NetBSD-current prior to 20071028, when the fast_ipsec subsystem is enabled, allows remote malicious users to bypass the IPsec policy by sending packets from a source machine with a different endia...
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.0.4
Netbsd Netbsd 3.1
Netbsd Netbsd 2.1
Netbsd Netbsd 2.1.1
Netbsd Netbsd Current
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 3.0.2
NA
CVE-2007-1677
Multiple buffer overflows in the ISO network protocol support in the NetBSD kernel 2.0 up to and including 4.0_BETA2, and NetBSD-current prior to 20070329, allow local users to execute arbitrary code via long parameters to certain functions, as demonstrated by a long sockaddr str...
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.0.3
Netbsd Netbsd 4.0
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 3.1
Navision Software Navision Financials Server 3.0
Netbsd Netbsd 3.0.1
Netbsd Netbsd 3.0.2
NA
CVE-2009-2793
The kernel in NetBSD, probably 5.0.1 and previous versions, on x86 platforms does not properly handle a pre-commit failure of the iret instruction, which might allow local users to gain privileges via vectors related to a tempEIP pseudocode variable that is outside of the code-se...
Netbsd Netbsd 3.0.2
Netbsd Netbsd 3.1
Netbsd Netbsd 1.6.1
Netbsd Netbsd 1.6.2
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.2
Netbsd Netbsd
Netbsd Netbsd 5.0
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.1
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
Netbsd Netbsd 2.1
Netbsd Netbsd 1.6
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Netbsd Netbsd 0.8
1 EDB exploit
NA
CVE-2010-2530
Multiple integer signedness errors in smb_subr.c in the netsmb module in the kernel in NetBSD 5.0.2 and previous versions, FreeBSD, and Apple Mac OS X allow local users to cause a denial of service (panic) via a negative size value in a /dev/nsmb ioctl operation, as demonstrated ...
Netbsd Netbsd
Netbsd Netbsd 5.0.1
Netbsd Netbsd 2.1
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.0.4
Netbsd Netbsd 2.1.1
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.3
Netbsd Netbsd 1.2.1
Netbsd Netbsd 3.0.2
Netbsd Netbsd 3.0.1
Netbsd Netbsd 3.0
Netbsd Netbsd 3.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5
Netbsd Netbsd 1.4.3
Netbsd Netbsd 0.8
Netbsd Netbsd 5.0
Netbsd Netbsd 4.0
Netbsd Netbsd 2.0.1
NA
CVE-2004-0257
OpenBSD 3.4 and NetBSD 1.6 and 1.6.1 allow remote malicious users to cause a denial of service (crash) by sending an IPv6 packet with a small MTU to a listening port and then issuing a TCP connect to that port.
Openbsd Openbsd 3.4
Netbsd Netbsd 1.6.1
Openbsd Openbsd 3.0
Netbsd Netbsd 1.6
Openbsd Openbsd 3.1
Openbsd Openbsd 3.2
Openbsd Openbsd 3.3
5.5
CVSSv3
CVE-2002-1915
tip on multiple BSD-based operating systems allows local users to cause a denial of service (execution prevention) by using flock() to lock the /var/log/acculog file.
Openbsd Openbsd 2.8
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Openbsd Openbsd 3.1
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
Openbsd Openbsd 2.9
Openbsd Openbsd 2.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 4.5
Freebsd Freebsd 3.5.1
Openbsd Openbsd 2.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.0
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Freebsd Freebsd 4.1
Netbsd Netbsd 1.5.1
Freebsd Freebsd 4.4
Openbsd Openbsd 2.4
Netbsd Netbsd 1.1
Netbsd Netbsd 1.5.2
NA
CVE-2000-0489
FreeBSD, NetBSD, and OpenBSD allow an malicious user to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
Netbsd Netbsd 1.4
Freebsd Freebsd 3.1
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.7
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 5.0
Openbsd Openbsd 2.6
Openbsd Openbsd 2.5
1 EDB exploit
NA
CVE-2002-2092
Race condition in exec in OpenBSD 4.0 and previous versions, NetBSD 1.5.2 and previous versions, and FreeBSD 4.4 and previous versions allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.5.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.8
NA
CVE-1999-1518
Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults.
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.3.2
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 3.2
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.4
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »