Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 2.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-4783
kernfs_xread in kernfs_vnops.c in NetBSD prior to 20050831 does not check for a negative offset when reading the message buffer, which allows local users to read arbitrary kernel memory.
Netbsd Netbsd 1.6
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.1
NA
CVE-2005-4741
NetBSD 1.6, NetBSD 2.0 up to and including 2.1, and NetBSD-current prior to 20051031 allows local users to gain privileges by attaching a debugger to a setuid/setgid (P_SUGID) process that performs an exec without a reset of real credentials.
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.0.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.6.2
Netbsd Netbsd 2.1
Netbsd Netbsd 1.6.1
NA
CVE-2005-4352
The securelevels implementation in NetBSD 2.1 and previous versions, and Linux 2.6.15 and previous versions, allows local users to bypass time setting restrictions and set the clock backwards by setting the clock ahead to the maximum unixtime value (19 Jan 2038), which then wraps...
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.11.12
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.13.1
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6 Test9 Cvs
Netbsd Netbsd 1.6
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.1
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.12.6
Linux Linux Kernel 2.6.13.4
NA
CVE-2005-4691
imake in NetBSD prior to 2.0.3, NetBSD-current prior to 12 September 2005, certain versions of X.Org, and certain versions of XFree86 allows local users to overwrite arbitrary files via a symlink attack on the temporary file for the file.0 target, which is used for a pre-formatte...
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 2.0.2
Netbsd Netbsd 1.6
Netbsd Netbsd 1.6.2
Netbsd Netbsd 1.6.1
NA
CVE-2005-2134
The (1) clcs and (2) emuxki drivers in NetBSD 1.6 up to and including 2.0.2 allow local users to cause a denial of service (kernel crash) by using the set-parameters ioctl on an audio device to change the block size and set the pause state to "unpaused" in the same ioct...
Netbsd Netbsd 1.6
Netbsd Netbsd 1.6.2
Netbsd Netbsd 2.0.1
Netbsd Netbsd 1.6.1
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.2
NA
CVE-2004-2012
The systrace_exit function in the systrace utility for NetBSD-current and 2.0 before April 16, 2004, and certain FreeBSD ports, does not verify the owner of the /dec/systrace connection before setting euid to 0, which allows local users to gain root privileges.
Niels Provos Systrace 1.2
Niels Provos Systrace 1.3
Niels Provos Systrace 1.1
Vladimir Kotal Systrace Port For Freebsd 2004-03-09
Vladimir Kotal Systrace Port For Freebsd 2004-06-02
Niels Provos Systrace 1.4
Niels Provos Systrace 1.5
Netbsd Netbsd 2.0
1 EDB exploit
NA
CVE-2004-1323
Multiple syscalls in the compat subsystem for NetBSD prior to 2.0 allow local users to cause a denial of service (kernel crash) via a large signal number to (1) xxx_sys_kill, (2) xxx_sys_sigaction, and possibly other translation functions.
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5
Netbsd Netbsd 1.6.1
Netbsd Netbsd 1.6.2
NA
CVE-2004-0230
TCP, when using a large Window Size, makes it easier for remote malicious users to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connection...
Oracle Solaris 11
Oracle Solaris 10
Openpgp Openpgp 2.6.2
Mcafee Network Data Loss Prevention 9.2.1
Mcafee Network Data Loss Prevention 9.2.0
Mcafee Network Data Loss Prevention
Mcafee Network Data Loss Prevention 9.2.2
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.6.1
Netbsd Netbsd 1.6.2
Netbsd Netbsd 2.0
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Xinuos Openserver 5.0.6
Xinuos Openserver 5.0.7
Juniper Junos
Xinuos Unixware 7.1.1
Xinuos Unixware 7.1.3
7 EDB exploits
2 Github repositories
NA
CVE-2003-0001
Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote malicious users to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.
Linux Linux Kernel 2.4.1
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Netbsd Netbsd 1.6
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.9
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
3 EDB exploits
2 Github repositories
NA
CVE-2002-2092
Race condition in exec in OpenBSD 4.0 and previous versions, NetBSD 1.5.2 and previous versions, and FreeBSD 4.4 and previous versions allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.5.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.8
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »