Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2002-0414
KAME-derived implementations of IPsec on NetBSD 1.5.2, FreeBSD 4.5, and other operating systems, does not properly consult the Security Policy Database (SPD), which could cause a Security Gateway (SG) that does not use Encapsulating Security Payload (ESP) to forward forged IPv4 p...
Netbsd Netbsd 1.5
Freebsd Freebsd 4.5
Openbsd Openbsd 2.7
Netbsd Netbsd 1.5.1
Freebsd Freebsd 4.4
Netbsd Netbsd 1.5.2
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Openbsd Openbsd 2.6
329
VMScore
CVE-2002-2092
Race condition in exec in OpenBSD 4.0 and previous versions, NetBSD 1.5.2 and previous versions, and FreeBSD 4.4 and previous versions allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.
Freebsd Freebsd 4.3
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 4.4
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.3.1
Openbsd Openbsd 2.9
Freebsd Freebsd 2.2.3
Openbsd Openbsd 2.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 4.2
Freebsd Freebsd 3.5.1
Openbsd Openbsd 2.2
Netbsd Netbsd 1.3.3
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Freebsd Freebsd 4.1
Freebsd Freebsd 2.2.8
445
VMScore
CVE-2021-45487
In NetBSD up to and including 9.2, the IPv4 ID generation algorithm does not use appropriate cryptographic measures.
Netbsd Netbsd
668
VMScore
CVE-2017-1000374
A flaw exists in NetBSD's implementation of the stack guard page that allows malicious users to bypass it resulting in arbitrary code execution using certain setuid binaries. This affects NetBSD 7.1 and possibly earlier versions.
Netbsd Netbsd
755
VMScore
CVE-2017-1000375
NetBSD maps the run-time link-editor ld.so directly below the stack region, even if ASLR is enabled, this allows malicious users to more easily manipulate memory leading to arbitrary code execution. This affects NetBSD 7.1 and possibly earlier versions.
Netbsd Netbsd
1 EDB exploit
668
VMScore
CVE-2017-1000378
The NetBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows malicious users to consume arbitrary amounts of stack memory and manipulate sta...
Netbsd Netbsd
445
VMScore
CVE-2021-45484
In NetBSD up to and including 9.2, the IPv6 fragment ID generation algorithm employs a weak cryptographic PRNG.
Netbsd Netbsd
445
VMScore
CVE-2021-45488
In NetBSD up to and including 9.2, there is an information leak in the TCP ISN (ISS) generation algorithm.
Netbsd Netbsd
445
VMScore
CVE-2021-45489
In NetBSD up to and including 9.2, the IPv6 Flow Label generation algorithm employs a weak cryptographic PRNG.
Netbsd Netbsd
505
VMScore
CVE-2000-0440
NetBSD 1.4.2 and previous versions allows remote malicious users to cause a denial of service by sending a packet with an unaligned IP timestamp option.
Netbsd Netbsd 1.4.2
Freebsd Freebsd 4.0
Freebsd Freebsd 3.4
Netbsd Netbsd 1.4.1
Freebsd Freebsd 5.0
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »