netbsd security advisories
4 threat alerts tracking vulnerabilities and security advisories that affect netbsd products.
Vulnios monitors netbsd CVE feeds, vendor advisories, CISA KEV listings, and exploit-prediction data continuously. Each alert below is enriched with severity, exploitation status, affected products, and a remediation path. Use this page to scan recent netbsd security news in one place, or click into an individual alert for full detail.
Critical Vulnerability: CVE-2017-1000375 — netbsd — netbsd
NetBSD maps the run-time link-editor ld.so directly below the stack region, even if ASLR is enabled, this allows attackers to more easily manipulate memory leading to arbitrary code execution. This af
criticalCVE-2017-1000375Critical Vulnerability: CVE-2017-1000378 — netbsd — netbsd
The NetBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows
criticalCVE-2017-1000378Critical Vulnerability: CVE-2017-1000374 — netbsd — netbsd
A flaw exists in NetBSD's implementation of the stack guard page that allows attackers to bypass it resulting in arbitrary code execution using certain setuid binaries. This affects NetBSD 7.1 and pos
criticalCVE-2017-1000374Critical Vulnerability: CVE-2015-8212 — netbsd — netbsd
CGI handling flaw in bozohttpd in NetBSD 6.0 through 6.0.6, 6.1 through 6.1.5, and 7.0 allows remote attackers to execute arbitrary code via crafted arguments, which are handled by a non-CGI aware pro
criticalCVE-2015-8212
Track netbsd exposure across your environment
Vulnios automatically cross-references your asset inventory against new netbsd CVEs and surfaces only what affects you. No more sifting manually — actionable findings only.
Start a free scan