Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Netbsd
(Netbsd)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 168 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
1997-07-01 | CVE-1999-0074 | Listening TCP ports are sequentially allocated, allowing spoofing attacks. | Freebsd, Linux_kernel, Windows_nt, Netbsd | N/A | ||
1997-12-10 | CVE-1999-0017 | FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce. | Openlinux, Freebsd, Inet, Aix, Netbsd, Open_desktop, Openserver, Unixware, Reliant_unix, Sunos, Wu\-Ftpd | N/A | ||
1998-01-05 | CVE-1999-0513 | ICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denial of service. | Unix, Freebsd, Hp\-Ux, Aix, Linux_kernel, Netbsd, Solaris, Sunos | N/A | ||
1998-02-01 | CVE-1999-0304 | mmap function in BSD allows local attackers in the kmem group to modify memory through devices. | Bsd_os, Freebsd, Netbsd, Openbsd | N/A | ||
1998-05-21 | CVE-1999-0303 | Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames. | Osf_1, Netbsd, Openbsd, Solaris, Sunos | N/A | ||
1999-02-17 | CVE-1999-0396 | A race condition between the select() and accept() calls in NetBSD TCP servers allows remote attackers to cause a denial of service. | Netbsd, Openbsd | N/A | ||
1999-03-17 | CVE-1999-0422 | In some cases, NetBSD 1.3.3 mount allows local users to execute programs in some file systems that have the "noexec" flag set. | Netbsd | N/A | ||
1999-03-21 | CVE-1999-0433 | XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. | Netbsd, Linux, Slackware_linux, Suse_linux, X11r6 | N/A | ||
2001-08-14 | CVE-2001-0554 | Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function. | Debian_linux, Freebsd, Aix, Kerberos, Kerberos_5, Netbsd, Linux_netkit, Openbsd, Irix, Solaris, Sunos | N/A | ||
2021-12-25 | CVE-2021-45489 | In NetBSD through 9.2, the IPv6 Flow Label generation algorithm employs a weak cryptographic PRNG. | Netbsd | 7.5 |