Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 1.5.1 vulnerabilities and exploits
(subscribe to this query)
6.2
CVSSv2
CVE-2001-1145
fts routines in FreeBSD 4.3 and previous versions, NetBSD prior to 1.5.2, and OpenBSD 2.9 and previous versions can be forced to change (chdir) into a different directory than intended when the directory above the current directory is moved, which could cause scripts to perform d...
Netbsd Netbsd 1.5
Openbsd Openbsd
Freebsd Freebsd 4.3
Netbsd Netbsd 1.5.1
5
CVSSv2
CVE-2002-2245
ftpd in NetBSD 1.5 up to and including 1.5.3 and 1.6 does not properly quote a digit in response to a STAT command for a filename that contains a carriage return followed by a digit, which can cause firewalls and other intermediary devices to lose proper track of the FTP session.
Netbsd Ftpd 1.5.1
Netbsd Ftpd 1.5.2
Netbsd Ftpd 1.5.3
Netbsd Ftpd 1.6
Netbsd Ftpd 1.5
3.3
CVSSv2
CVE-2011-1920
The make include files in NetBSD prior to 1.6.2, as used in pmake 1.111 and other products, allow local users to overwrite arbitrary files via a symlink attack on a /tmp/_depend##### temporary file, related to (1) bsd.lib.mk and (2) bsd.prog.mk.
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.2
Netbsd Netbsd
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.4
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.3
Netbsd Netbsd 1.1
Netbsd Netbsd 1.0
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.5
Netbsd Netbsd 1.4.3
Ihji Pmake 1.111
4.6
CVSSv2
CVE-2009-2793
The kernel in NetBSD, probably 5.0.1 and previous versions, on x86 platforms does not properly handle a pre-commit failure of the iret instruction, which might allow local users to gain privileges via vectors related to a tempEIP pseudocode variable that is outside of the code-se...
Netbsd Netbsd 3.0.2
Netbsd Netbsd 3.1
Netbsd Netbsd 1.6.1
Netbsd Netbsd 1.6.2
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.2
Netbsd Netbsd
Netbsd Netbsd 5.0
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.1
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
Netbsd Netbsd 2.1
Netbsd Netbsd 1.6
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Netbsd Netbsd 0.8
1 EDB exploit
2.6
CVSSv2
CVE-2006-5215
The Xsession script, as used by X Display Manager (xdm) in NetBSD prior to 20060212, X.Org prior to 20060317, and Solaris 8 through 10 prior to 20061006, allows local users to overwrite arbitrary files, or read another user's Xsession errors file, via a symlink attack on a /...
X.org Xdm
Netbsd Netbsd 1.1
Netbsd Netbsd 1.2
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Sun Solaris 10.0
Sun Sunos 5.8
Sun Solaris 9.0
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3
Netbsd Netbsd 1.4.3
Netbsd Netbsd 1.4
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.5
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.0.3
4.9
CVSSv2
CVE-2010-2530
Multiple integer signedness errors in smb_subr.c in the netsmb module in the kernel in NetBSD 5.0.2 and previous versions, FreeBSD, and Apple Mac OS X allow local users to cause a denial of service (panic) via a negative size value in a /dev/nsmb ioctl operation, as demonstrated ...
Netbsd Netbsd
Netbsd Netbsd 5.0.1
Netbsd Netbsd 2.1
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.0.4
Netbsd Netbsd 2.1.1
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.3
Netbsd Netbsd 1.2.1
Netbsd Netbsd 3.0.2
Netbsd Netbsd 3.0.1
Netbsd Netbsd 3.0
Netbsd Netbsd 3.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5
Netbsd Netbsd 1.4.3
Netbsd Netbsd 0.8
Netbsd Netbsd 5.0
Netbsd Netbsd 4.0
Netbsd Netbsd 2.0.1
4.6
CVSSv2
CVE-2002-1165
Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows malicious users to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2)...
Sendmail Sendmail 8.12.0
Sendmail Sendmail 8.12.1
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.5
Sendmail Sendmail 8.12.6
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
1 EDB exploit
7.5
CVSSv2
CVE-2002-0414
KAME-derived implementations of IPsec on NetBSD 1.5.2, FreeBSD 4.5, and other operating systems, does not properly consult the Security Policy Database (SPD), which could cause a Security Gateway (SG) that does not use Encapsulating Security Payload (ESP) to forward forged IPv4 p...
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Openbsd Openbsd 2.6
Freebsd Freebsd 4.2
Freebsd Freebsd 4.4
Freebsd Freebsd 4.3
Freebsd Freebsd 4.5
Openbsd Openbsd 2.7
4.6
CVSSv2
CVE-2003-0102
Buffer overflow in tryelf() in readelf.c of the file command allows malicious users to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
File File 3.30
File File 3.32
File File 3.28
File File 3.37
File File 3.39
File File 3.40
File File 3.33
File File 3.34
File File 3.35
File File 3.36
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
2 EDB exploits
2.1
CVSSv2
CVE-2002-1915
tip on multiple BSD-based operating systems allows local users to cause a denial of service (execution prevention) by using flock() to lock the /var/log/acculog file.
Openbsd Openbsd 2.8
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Openbsd Openbsd 3.1
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
Openbsd Openbsd 2.9
Openbsd Openbsd 2.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 4.5
Freebsd Freebsd 3.5.1
Openbsd Openbsd 2.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.0
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Freebsd Freebsd 4.1
Netbsd Netbsd 1.5.1
Freebsd Freebsd 4.4
Openbsd Openbsd 2.4
Netbsd Netbsd 1.1
Netbsd Netbsd 1.5.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »