Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netbsd netbsd 2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-6654
The sendmsg function in NetBSD-current prior to 20061023, NetBSD 3.0 and 3.0.1 prior to 20061024, and NetBSD 2.x prior to 20061029, when run on a 64-bit architecture, allows malicious users to cause a denial of service (kernel panic) via an invalid msg_controllen parameter to the...
Netbsd Netbsd 2.0
Netbsd Netbsd 2.1
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
NA
CVE-2006-6656
Unspecified vulnerability in ptrace in NetBSD-current prior to 20061027, NetBSD 3.0 and 3.0.1 prior to 20061027, and NetBSD 2.x prior to 20061119 allows local users to read kernel memory and obtain sensitive information via certain manipulations of a PT_LWPINFO request, which lea...
Netbsd Netbsd 2.0
Netbsd Netbsd 2.1
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
NA
CVE-2006-6657
The if_clone_list function in NetBSD-current prior to 20061027, NetBSD 3.0 and 3.0.1 prior to 20061027, and NetBSD 2.x prior to 20061119 allows local users to read potentially sensitive, uninitialized stack memory via unspecified vectors.
Netbsd Netbsd 2.1
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
Netbsd Netbsd 2.0
NA
CVE-2005-4783
kernfs_xread in kernfs_vnops.c in NetBSD prior to 20050831 does not check for a negative offset when reading the message buffer, which allows local users to read arbitrary kernel memory.
Netbsd Netbsd 1.6
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.1
NA
CVE-2006-6655
The procfs implementation in NetBSD-current prior to 20061023, NetBSD 3.0 and 3.0.1 prior to 20061024, and NetBSD 2.x prior to 20061029 allows local users to cause a denial of service (kernel panic) by attempting to access /emul/linux/proc/0/stat on a procfs filesystem that was m...
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
Netbsd Netbsd 2.0
Netbsd Netbsd 2.1
NA
CVE-2006-3202
The ip6_savecontrol function in NetBSD 2.0 up to and including 3.0, under certain configurations, does not check to see if IPv4-mapped sockets are being used before processing IPv6 socket options, which allows local users to cause a denial of service (crash) by creating an IPv4-m...
Netbsd Netbsd 2.1
Netbsd Netbsd 3.0
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.0
NA
CVE-2005-4782
NetBSD 2.0 prior to 2.0.4, 2.1 prior to 2.1.1, and 3, when the kernel is compiled with "options DIAGNOSTIC," allows local users to cause a denial of service (kernel assertion panic) via a negative linger time in the SO_LINGER socket option.
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.1
NA
CVE-2006-1589
The elf_load_file function in NetBSD 2.0 up to and including 3.0 allows local users to cause a denial of service (kernel crash) via an ELF interpreter that does not have a PT_LOAD section in its header, which triggers a null dereference.
Netbsd Netbsd 3.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.0.3
Netbsd Netbsd 2.1
Netbsd Netbsd 2.0
NA
CVE-2006-0145
The kernfs_xread function in kernfs in NetBSD 1.6 up to and including 2.1, and OpenBSD 3.8, does not properly validate file offsets against negative 32-bit values that occur as a result of truncation, which allows local users to read arbitrary kernel memory and gain privileges vi...
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.0.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.6.1
Netbsd Netbsd 2.1
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 1.6.2
NA
CVE-2005-4741
NetBSD 1.6, NetBSD 2.0 up to and including 2.1, and NetBSD-current prior to 20051031 allows local users to gain privileges by attaching a debugger to a setuid/setgid (P_SUGID) process that performs an exec without a reset of real credentials.
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.0.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.6.2
Netbsd Netbsd 2.1
Netbsd Netbsd 1.6.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »