Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 2.0 vulnerabilities and exploits
(subscribe to this query)
151
VMScore
CVE-2006-6653
The accept function in NetBSD-current prior to 20061023, NetBSD 3.0 and 3.0.1 prior to 20061024, and NetBSD 2.x prior to 20061029 allows local users to cause a denial of service (socket consumption) via an invalid (1) name or (2) namelen parameter, which may result in the socket ...
Netbsd Netbsd 2.0
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
Netbsd Netbsd Current
383
VMScore
CVE-2006-6654
The sendmsg function in NetBSD-current prior to 20061023, NetBSD 3.0 and 3.0.1 prior to 20061024, and NetBSD 2.x prior to 20061029, when run on a 64-bit architecture, allows malicious users to cause a denial of service (kernel panic) via an invalid msg_controllen parameter to the...
Netbsd Netbsd 2.0
Netbsd Netbsd 2.1
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
187
VMScore
CVE-2006-6656
Unspecified vulnerability in ptrace in NetBSD-current prior to 20061027, NetBSD 3.0 and 3.0.1 prior to 20061027, and NetBSD 2.x prior to 20061119 allows local users to read kernel memory and obtain sensitive information via certain manipulations of a PT_LWPINFO request, which lea...
Netbsd Netbsd 2.0
Netbsd Netbsd 2.1
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
187
VMScore
CVE-2006-6657
The if_clone_list function in NetBSD-current prior to 20061027, NetBSD 3.0 and 3.0.1 prior to 20061027, and NetBSD 2.x prior to 20061119 allows local users to read potentially sensitive, uninitialized stack memory via unspecified vectors.
Netbsd Netbsd 2.1
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
Netbsd Netbsd 2.0
151
VMScore
CVE-2006-6655
The procfs implementation in NetBSD-current prior to 20061023, NetBSD 3.0 and 3.0.1 prior to 20061024, and NetBSD 2.x prior to 20061029 allows local users to cause a denial of service (kernel panic) by attempting to access /emul/linux/proc/0/stat on a procfs filesystem that was m...
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
Netbsd Netbsd 2.0
Netbsd Netbsd 2.1
187
VMScore
CVE-2005-4783
kernfs_xread in kernfs_vnops.c in NetBSD prior to 20050831 does not check for a negative offset when reading the message buffer, which allows local users to read arbitrary kernel memory.
Netbsd Netbsd 1.6
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.1
320
VMScore
CVE-2005-4779
verifiedexecioctl in verified_exec.c in NetBSD 2.0.2 calls NDINIT with UIO_USERSPACE rather than UID_SYSSPACE, which removes the functionality of the verified exec kernel subsystem and might allow local users to execute Trojan horse programs.
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 2.0.2
436
VMScore
CVE-2006-3202
The ip6_savecontrol function in NetBSD 2.0 up to and including 3.0, under certain configurations, does not check to see if IPv4-mapped sockets are being used before processing IPv6 socket options, which allows local users to cause a denial of service (crash) by creating an IPv4-m...
Netbsd Netbsd 2.1
Netbsd Netbsd 3.0
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.0
436
VMScore
CVE-2005-4782
NetBSD 2.0 prior to 2.0.4, 2.1 prior to 2.1.1, and 3, when the kernel is compiled with "options DIAGNOSTIC," allows local users to cause a denial of service (kernel assertion panic) via a negative linger time in the SO_LINGER socket option.
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.1
187
VMScore
CVE-2005-4691
imake in NetBSD prior to 2.0.3, NetBSD-current prior to 12 September 2005, certain versions of X.Org, and certain versions of XFree86 allows local users to overwrite arbitrary files via a symlink attack on the temporary file for the file.0 target, which is used for a pre-formatte...
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 2.0.2
Netbsd Netbsd 1.6
Netbsd Netbsd 1.6.2
Netbsd Netbsd 1.6.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »