Show filters
172 Total Results
Displaying 1-10 of 172
Sort by:
Attacker Value
High

CVE-2024-6387

Disclosure Date: July 01, 2024 (last updated July 28, 2024)
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
Attacker Value
Unknown

CVE-2014-3566

Disclosure Date: October 15, 2014 (last updated November 25, 2024)
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
Attacker Value
Unknown

CVE-2023-45198

Disclosure Date: October 05, 2023 (last updated October 12, 2023)
ftpd before "NetBSD-ftpd 20230930" can leak information about the host filesystem before authentication via an MLSD or MLST command. tnftpd (the portable version of NetBSD ftpd) before 20231001 is also vulnerable.
Attacker Value
Unknown

CVE-2021-45489

Disclosure Date: December 25, 2021 (last updated October 07, 2023)
In NetBSD through 9.2, the IPv6 Flow Label generation algorithm employs a weak cryptographic PRNG.
Attacker Value
Unknown

CVE-2021-45488

Disclosure Date: December 25, 2021 (last updated October 07, 2023)
In NetBSD through 9.2, there is an information leak in the TCP ISN (ISS) generation algorithm.
Attacker Value
Unknown

CVE-2021-45487

Disclosure Date: December 25, 2021 (last updated October 07, 2023)
In NetBSD through 9.2, the IPv4 ID generation algorithm does not use appropriate cryptographic measures.
Attacker Value
Unknown

CVE-2021-45484

Disclosure Date: December 25, 2021 (last updated October 07, 2023)
In NetBSD through 9.2, the IPv6 fragment ID generation algorithm employs a weak cryptographic PRNG.
Attacker Value
Unknown

CVE-2020-26139

Disclosure Date: May 11, 2021 (last updated November 28, 2024)
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
Attacker Value
Unknown

CVE-2012-5363

Disclosure Date: February 20, 2020 (last updated November 28, 2024)
The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2011-2393.
Attacker Value
Unknown

CVE-2012-5365

Disclosure Date: February 20, 2020 (last updated November 28, 2024)
The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.