Show filters
168 Total Results
Displaying 1-10 of 168
Sort by:
Attacker Value
High
CVE-2024-6387
Disclosure Date: July 01, 2024 (last updated July 28, 2024)
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
13
Attacker Value
Unknown
CVE-2014-3566
Disclosure Date: October 15, 2014 (last updated November 25, 2024)
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
1
Attacker Value
Unknown
CVE-2021-45489
Disclosure Date: December 25, 2021 (last updated October 07, 2023)
In NetBSD through 9.2, the IPv6 Flow Label generation algorithm employs a weak cryptographic PRNG.
0
Attacker Value
Unknown
CVE-2021-45488
Disclosure Date: December 25, 2021 (last updated October 07, 2023)
In NetBSD through 9.2, there is an information leak in the TCP ISN (ISS) generation algorithm.
0
Attacker Value
Unknown
CVE-2021-45487
Disclosure Date: December 25, 2021 (last updated October 07, 2023)
In NetBSD through 9.2, the IPv4 ID generation algorithm does not use appropriate cryptographic measures.
0
Attacker Value
Unknown
CVE-2021-45484
Disclosure Date: December 25, 2021 (last updated October 07, 2023)
In NetBSD through 9.2, the IPv6 fragment ID generation algorithm employs a weak cryptographic PRNG.
0
Attacker Value
Unknown
CVE-2020-26139
Disclosure Date: May 11, 2021 (last updated November 28, 2024)
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
0
Attacker Value
Unknown
CVE-2012-5363
Disclosure Date: February 20, 2020 (last updated November 28, 2024)
The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2011-2393.
0
Attacker Value
Unknown
CVE-2012-5365
Disclosure Date: February 20, 2020 (last updated November 28, 2024)
The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.
0
Attacker Value
Unknown
CVE-2011-2480
Disclosure Date: November 27, 2019 (last updated November 27, 2024)
Information Disclosure vulnerability in the 802.11 stack, as used in FreeBSD before 8.2 and NetBSD when using certain non-x86 architectures. A signedness error in the IEEE80211_IOC_CHANINFO ioctl allows a local unprivileged user to cause the kernel to copy large amounts of kernel memory back to the user, disclosing potentially sensitive information.
0