Lucene search

K

FreeBSD, NetBSD Security Vulnerabilities

nvd
nvd

CVE-2021-45484

In NetBSD through 9.2, the IPv6 fragment ID generation algorithm employs a weak cryptographic...

7.5CVSS

0.002EPSS

2021-12-25 02:15 AM
1
nvd
nvd

CVE-2021-45487

In NetBSD through 9.2, the IPv4 ID generation algorithm does not use appropriate cryptographic...

7.5CVSS

0.002EPSS

2021-12-25 02:15 AM
openvas
openvas

FreeBSD Ports: tnftpd

The remote host is missing an update to the system as announced in the referenced...

6.6AI Score

0.014EPSS

2008-09-04 12:00 AM
4
openvas
openvas

FreeBSD Ports: FreeBSD

The remote host is missing an update to the system as announced in the referenced...

7.6AI Score

0.103EPSS

2012-02-12 12:00 AM
8
openvas
openvas

FreeBSD Ports: libXfont

The remote host is missing an update to the system as announced in the referenced...

7.6AI Score

0.103EPSS

2011-09-21 12:00 AM
17
openvas
openvas

FreeBSD Ports: FreeBSD

The remote host is missing an update to the system as announced in the referenced...

6.8AI Score

0.001EPSS

2012-08-10 12:00 AM
20
openvas
openvas

FreeBSD Ports: pure-ftpd

The remote host is missing an update to the system as announced in the referenced...

9.2AI Score

0.897EPSS

2011-08-03 12:00 AM
19
openvas
openvas

FreeBSD Ports: apr0

The remote host is missing an update to the system as announced in the referenced...

8.8AI Score

0.967EPSS

2012-02-13 12:00 AM
9
openvas
openvas

FreeBSD Ports: apr1

The remote host is missing an update to the system as announced in the referenced...

8.8AI Score

0.967EPSS

2011-08-03 12:00 AM
12
openvas
openvas

FreeBSD Ports: apr1

The remote host is missing an update to the system as announced in the referenced...

8.8AI Score

0.967EPSS

2011-08-03 12:00 AM
9
openvas
openvas

Mandriva Update for libxfont MDVSA-2011:153 (libxfont)

The remote host is missing an update for...

7.7AI Score

0.103EPSS

2011-10-21 12:00 AM
13
nessus
nessus

SUSE SLES11 Security Update : kernel (SUSE-SU-2021:14764-1)

The remote SUSE Linux SLES11 / SLES_SAP11 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:14764-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't...

7.8CVSS

8.3AI Score

0.002EPSS

2021-07-14 12:00 AM
33
nessus
nessus

SUSE SLES12 Security Update : kernel (SUSE-SU-2021:1899-1)

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:1899-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that...

8.8CVSS

8.6AI Score

0.002EPSS

2021-06-10 12:00 AM
47
nessus
nessus

SUSE SLES15 Security Update : kernel (SUSE-SU-2021:1888-1)

The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:1888-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that...

8.8CVSS

8.6AI Score

0.002EPSS

2021-06-11 12:00 AM
26
nessus
nessus

SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2021:1890-1)

The remote SUSE Linux SLED15 / SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:1890-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't...

8.8CVSS

8.6AI Score

0.002EPSS

2021-06-09 12:00 AM
30
nessus
nessus

SUSE SLES15 Security Update : kernel (SUSE-SU-2021:1889-1)

The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:1889-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that...

8.8CVSS

8.6AI Score

0.002EPSS

2021-06-09 12:00 AM
21
nessus
nessus

SUSE SLES15 Security Update : kernel (SUSE-SU-2021:2208-1)

The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:2208-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that...

8.8CVSS

8.6AI Score

0.002EPSS

2021-07-01 12:00 AM
25
nessus
nessus

SUSE SLES12 Security Update : kernel (SUSE-SU-2021:2406-1)

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:2406-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that...

8.3CVSS

8.3AI Score

0.002EPSS

2021-07-21 12:00 AM
19
nessus
nessus

SUSE SLES12 Security Update : kernel (SUSE-SU-2021:1887-1)

The remote SUSE Linux SLES12 / SLES_SAP12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:1887-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't...

8.8CVSS

8.6AI Score

0.002EPSS

2021-06-09 12:00 AM
11
nessus
nessus

SUSE SLES12 Security Update : kernel (SUSE-SU-2021:1891-1)

The remote SUSE Linux SLES12 / SLES_SAP12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:1891-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't...

8.8CVSS

8.6AI Score

0.002EPSS

2021-06-09 12:00 AM
27
nessus
nessus

SUSE SLES15 Security Update : kernel (SUSE-SU-2021:1912-1)

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:1912-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't...

8.8CVSS

8.6AI Score

0.002EPSS

2021-06-10 12:00 AM
29
nessus
nessus

SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2021:1913-1)

The remote SUSE Linux SLED12 / SLES12 / SLES_SAP12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:1913-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP)...

8.8CVSS

8.6AI Score

0.002EPSS

2021-06-10 12:00 AM
29
nessus
nessus

SUSE SLES12 Security Update : kernel (SUSE-SU-2021:2451-1)

The remote SUSE Linux SLES12 / SLES_SAP12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:2451-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't...

8.3CVSS

8.3AI Score

0.002EPSS

2021-07-23 12:00 AM
26
nessus
nessus

SUSE SLES15 Security Update : kernel (SUSE-SU-2021:2421-1)

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:2421-1 advisory. The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't...

8.8CVSS

8.8AI Score

0.002EPSS

2021-07-22 12:00 AM
14
nessus
nessus

SUSE SLES15 Security Update : kernel (SUSE-SU-2021:1975-1)

The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:1975-1 advisory. An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init()...

9.8CVSS

9.6AI Score

0.006EPSS

2021-06-21 12:00 AM
26
nessus
nessus

SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2021:1977-1)

The remote SUSE Linux SLED15 / SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:1977-1 advisory. An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in...

9.8CVSS

9.6AI Score

0.006EPSS

2021-06-21 12:00 AM
19
openvas
openvas

Debian: Security Advisory (DLA-491)

The remote host is missing an update for the...

7.5AI Score

2023-03-08 12:00 AM
7
osv
osv

php5 - security update

CVE-2015-2305 Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular...

3.1AI Score

0.008EPSS

2016-02-29 12:00 AM
12
cert
cert

Heimdal Kerberos vulnerable to remotely triggered NULL pointer dereference

Overview The Heimdal Software Kerberos 5 implementation is vulnerable to a null pointer dereferance. An attacker with network access to an application that depends on the vulnerable code path can cause the application to crash. Description CVE-2022-3116 A flawed logical condition in...

7.5CVSS

7.1AI Score

0.001EPSS

2022-10-07 12:00 AM
29
cert
cert

Devices supporting Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure

Overview Devices supporting the Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure that could allow an attacker to impersonate a legitimate device during pairing. Description The Bluetooth Core Specification and Mesh Profile Specification are...

8.8CVSS

6.5AI Score

0.001EPSS

2021-05-24 12:00 AM
40
cert
cert

L2 network security controls can be bypassed using VLAN 0 stacking and/or 802.3 headers

Overview Layer-2 (L2) network security controls provided by various devices, such as switches, routers, and operating systems, can be bypassed by stacking Ethernet protocol headers. An attacker can send crafted packets through vulnerable devices to cause Denial-of-service (DoS) or to perform a...

5.7CVSS

5.4AI Score

0.001EPSS

2022-09-27 12:00 AM
35
metasploit
metasploit

NetBSD mail.local Privilege Escalation

This module attempts to exploit a race condition in mail.local with SUID bit set on: NetBSD 7.0 - 7.0.1 (verified on 7.0.1) NetBSD 6.1 - 6.1.5 NetBSD 6.0 - 6.0.6 Successful exploitation relies on a crontab job with root privilege, which may take up to 10min to...

6.9AI Score

2016-08-21 11:16 PM
44
cert
cert

uClibc, uClibc-ng libraries have monotonically increasing DNS transaction ID

Overview The uClibc and uClibc-ng libraries, prior to uClibc-ng 1.0.41, are vulnerable to DNS cache poisoning due to the use of predicatble DNS transaction IDs when making DNS requests. This vulnerability can allow an attacker to perform DNS cache poisoning attacks against a vulnerable...

6.5CVSS

6.1AI Score

0.001EPSS

2022-05-09 12:00 AM
32
cert
cert

Netatalk contains multiple error and memory management vulnerabilities

Overview There are six new vulnerabilities in the latest release of Netatalk (3.1.12) that could allow for Remote Code Execution as well as Out-of-bounds Read. Description Below are the new CVEs. Per ZDI: CVE-2022-0194 This vulnerability allows remote attackers to execute arbitrary code on...

9.8CVSS

9.1AI Score

0.048EPSS

2022-11-16 12:00 AM
54
f5
f5

K15082 : OpenSSH vulnerability CVE-2010-4755

Security Advisory Description The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and...

6.8AI Score

0.323EPSS

2014-03-17 12:00 AM
8
f5
f5

K15920 : Apache vulnerability CVE-2011-0419

Security Advisory Description Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle....

6AI Score

0.967EPSS

2014-12-18 12:00 AM
11
f5
f5

K16831 : BSD regex library vulnerability CVE-2015-2305

Security Advisory Description Description Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code...

8.3AI Score

0.006EPSS

2015-07-01 12:00 AM
15
veracode
veracode

Denial Of Service (DoS)

OpenSSL is vulnerable to denial of service flaw. Flaws in OpenSSL's DTLS implementation allows a remote attacker to cause a DTLS server to use excessive amounts of memory, or crash on an invalid memory access or NULL pointer...

4.4AI Score

0.065EPSS

2020-04-10 12:42 AM
16
veracode
veracode

Denial Of Service (DoS)

OpenSSL is vulnerable to denial of service flaw. Flaws in OpenSSL's DTLS implementation allows a remote attacker to cause a DTLS server to use excessive amounts of memory, or crash on an invalid memory access or NULL pointer...

4.4AI Score

0.117EPSS

2020-04-10 12:42 AM
8
veracode
veracode

Information Disclosure

OpenSSL is vulnerable to information disclosure. This is possible because the SSL protocol 3.0 uses a nondeterministic CBC padding allowing attackers to perform man-in-the-middle (MitM) attacks. This is also known as the POODLE...

3.4CVSS

4.3AI Score

0.975EPSS

2017-02-07 12:05 AM
31
veracode
veracode

Information Disclosure

OpenSSL is vulnerable to information disclosure. This is possible because the SSL protocol 3.0 uses a nondeterministic CBC padding allowing attackers to perform man-in-the-middle (MitM) attacks. This is also known as the POODLE...

3.4CVSS

4.3AI Score

0.975EPSS

2019-01-15 08:54 AM
22
prion
prion

Design/Logic Flaw

Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a...

7.4AI Score

0.117EPSS

2009-05-19 07:30 PM
5
prion
prion

Design/Logic Flaw

Use-after-free vulnerability in ISC BIND 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (named daemon crash) via unspecified vectors that cause named to "dereference a freed fetch...

6.5AI Score

0.223EPSS

2007-01-25 08:28 PM
1
veracode
veracode

Denial Of Service (DoS)

ISC BIND (Berkeley Internet Name Domain) is vulnerable to Denial Of Service (DoS). A use-after-free flaw was found in BIND. On servers that have recursion enabled, this could allow a remote attacker to cause a denial of...

4.3AI Score

0.223EPSS

2020-04-10 12:12 AM
9
prion
prion

Code injection

The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an....

7AI Score

0.604EPSS

2015-06-12 07:59 PM
6
veracode
veracode

Denial Of Service (DoS)

OpenSSL is vulnerable to denial of service (DoS) attacks. A malicious user can pass an unrecognized X.660 OID to the hash function to the system to cause an infinite loop that can cause the system to...

7.2AI Score

0.604EPSS

2017-02-10 05:07 AM
13
prion
prion

Out-of-bounds

The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as...

7.5CVSS

7.1AI Score

0.332EPSS

2015-06-12 07:59 PM
9
veracode
veracode

Denial Of Service (DoS)

OpenSSL is vulnerable to denial of service (DoS) attacks. These attacks can be triggered through the length field in ASN1_TIME data via X509_cmp_time function in crypto/x509/x509_vfy.c, causing an out-of-bounds read and an application...

7.5CVSS

7.3AI Score

0.332EPSS

2019-01-15 09:06 AM
14
cve
cve

CVE-2009-1379

Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a...

7.6AI Score

0.117EPSS

2009-05-19 07:30 PM
77
nvd
nvd

CVE-2009-1379

Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a...

7.7AI Score

0.117EPSS

2009-05-19 07:30 PM
Total number of security vulnerabilities2307