Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 1.5 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2002-0414
KAME-derived implementations of IPsec on NetBSD 1.5.2, FreeBSD 4.5, and other operating systems, does not properly consult the Security Policy Database (SPD), which could cause a Security Gateway (SG) that does not use Encapsulating Security Payload (ESP) to forward forged IPv4 p...
Netbsd Netbsd 1.5
Freebsd Freebsd 4.5
Openbsd Openbsd 2.7
Netbsd Netbsd 1.5.1
Freebsd Freebsd 4.4
Netbsd Netbsd 1.5.2
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Openbsd Openbsd 2.6
641
VMScore
CVE-2002-1500
Buffer overflow in (1) mrinfo, (2) mtrace, and (3) pppd in NetBSD 1.4.x up to and including 1.6 allows local users to gain privileges by executing the programs after filling the file descriptor tables, which produces file descriptors larger than FD_SETSIZE, which are not checked ...
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.4
Netbsd Netbsd 1.5
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.4.3
641
VMScore
CVE-2001-0734
Hitachi Super-H architecture in NetBSD 1.5 and 1.4.1 allows a local user to gain privileges via modified Status Register contents, which are not properly handled by (1) the sigreturn system call or (2) the process_write_regs kernel routine.
Netbsd Netbsd 1.5
Netbsd Netbsd 1.4.1
641
VMScore
CVE-2001-1091
The (1) dump and (2) dump_lfs commands in NetBSD 1.4.x up to and including 1.5.1 do not properly drop privileges, which could allow local users to gain privileges via the RCMD_CMD environment variable.
Netbsd Netbsd 1.5
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.4.3
Netbsd Netbsd 1.4
Netbsd Netbsd 1.4.1
641
VMScore
CVE-2001-0268
The i386_set_ldt system call in NetBSD 1.5 and previous versions, and OpenBSD 2.8 and previous versions, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local...
Openbsd Openbsd
Netbsd Netbsd
641
VMScore
CVE-2001-0033
KTH Kerberos IV allows local users to change the configuration of a Kerberos server running at an elevated privilege by specifying an alternate directory using with the KRBCONFDIR environmental variable, which allows the user to gain additional privileges.
Kth Kth Kerberos 4
Netbsd Netbsd 1.5
641
VMScore
CVE-2001-0094
Buffer overflow in kdc_reply_cipher of libkrb (Kerberos 4 authentication library) in NetBSD 1.5 and FreeBSD 4.2 and previous versions, as used in Kerberised applications such as telnetd and login, allows local users to gain root privileges.
Freebsd Freebsd 1.5
632
VMScore
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0(16)sc3
Cisco Ios 12.2(3.4)bp
Cisco Ios 11.2xa
Cisco Ios 12.4(2)t2
Cisco Ios 12.3ym
Cisco Ios 11.3(11b)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0(21)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1(2)e1
Cisco Ios 12.1xg
Cisco Ios 12.1(19)ew
Cisco Ios 12.3(14)ym4
Cisco Ios 12.0(8)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2(7b)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3(10)
1 Github repository
552
VMScore
CVE-2001-1145
fts routines in FreeBSD 4.3 and previous versions, NetBSD prior to 1.5.2, and OpenBSD 2.9 and previous versions can be forced to change (chdir) into a different directory than intended when the directory above the current directory is moved, which could cause scripts to perform d...
Openbsd Openbsd
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Freebsd Freebsd 4.3
536
VMScore
CVE-2004-0230
TCP, when using a large Window Size, makes it easier for remote malicious users to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connection...
Oracle Solaris 11
Oracle Solaris 10
Openpgp Openpgp 2.6.2
Mcafee Network Data Loss Prevention 9.2.0
Mcafee Network Data Loss Prevention
Mcafee Network Data Loss Prevention 9.2.1
Mcafee Network Data Loss Prevention 9.2.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.5
Netbsd Netbsd 1.6.1
Netbsd Netbsd 1.6.2
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 2.0
Xinuos Openserver 5.0.7
Xinuos Openserver 5.0.6
Juniper Junos
Xinuos Unixware 7.1.3
Xinuos Unixware 7.1.1
7 EDB exploits
2 Github repositories
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »