Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Netbsd:
Security Vulnerabilities
CVE-1999-0396
A race condition between the select() and accept() calls in NetBSD TCP servers allows remote attackers to cause a denial of service.
CVSS Score
2.6
EPSS Score
0.007
Published
1999-02-17
CVE-1999-0367
NetBSD netstat command allows local users to access kernel memory.
CVSS Score
2.1
EPSS Score
0.001
Published
1999-02-09
CVE-1999-1409
The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail.
CVSS Score
2.1
EPSS Score
0.003
Published
1998-07-03
CVE-1999-0303
Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames.
CVSS Score
4.6
EPSS Score
0.001
Published
1998-05-21
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
CVSS Score
10.0
EPSS Score
0.805
Published
1998-04-08
CVE-1999-0010
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
CVSS Score
5.0
EPSS Score
0.02
Published
1998-04-08
CVE-1999-0011
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
CVSS Score
5.4
EPSS Score
0.11
Published
1998-04-08
CVE-1999-0323
FreeBSD mmap function allows users to modify append-only or immutable files.
CVSS Score
10.0
EPSS Score
0.005
Published
1998-02-20
CVE-1999-0304
mmap function in BSD allows local attackers in the kmem group to modify memory through devices.
CVSS Score
7.2
EPSS Score
0.001
Published
1998-02-01
CVE-1999-0513
ICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denial of service.
CVSS Score
5.0
EPSS Score
0.256
Published
1998-01-05
Prev
Next
Page 17
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved