Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 2.8 vulnerabilities and exploits
(subscribe to this query)
107
VMScore
CVE-2001-1047
Race condition in OpenBSD VFS allows local users to cause a denial of service (kernel panic) by (1) creating a pipe in one thread and causing another thread to set one of the file descriptors to NULL via a close, or (2) calling dup2 on a file descriptor in one process, then setti...
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
Openbsd Openbsd 2.6
Openbsd Openbsd 2.9
605
VMScore
CVE-2002-2180
The setitimer(2) system call in OpenBSD 2.0 up to and including 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.2
Openbsd Openbsd 2.4
Openbsd Openbsd 3.1
Openbsd Openbsd 2.1
Openbsd Openbsd 2.3
Openbsd Openbsd 3.0
335
VMScore
CVE-2003-1366
chpass in OpenBSD 2.0 up to and including 3.2 allows local users to read portions of arbitrary files via a hard link attack on a temporary file used to store user database information.
Openbsd Openbsd 2.2
Openbsd Openbsd 2.3
Openbsd Openbsd 3.1
Openbsd Openbsd 3.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 2.9
Openbsd Openbsd 3.0
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
1 EDB exploit
445
VMScore
CVE-2005-0740
The TCP stack (tcp_input.c) in OpenBSD 3.5 and 3.6 allows remote malicious users to cause a denial of service (system panic) via crafted values in the TCP timestamp option, which causes invalid arguments to be used when calculating the retransmit timeout.
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 3.4
Openbsd Openbsd 3.5
Openbsd Openbsd 3.6
Openbsd Openbsd 2.2
Openbsd Openbsd 2.4
Openbsd Openbsd 3.1
Openbsd Openbsd 3.3
Openbsd Openbsd 2.3
Openbsd Openbsd 2.5
Openbsd Openbsd 3.0
Openbsd Openbsd 3.2
1000
VMScore
CVE-2001-0053
One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote malicious users to gain root privileges.
David Madore Ftpd-bsd 0.2.3
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.5
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Netbsd Netbsd 1.4
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.8
2 EDB exploits
755
VMScore
CVE-2001-0402
IPFilter 3.4.16 and previous versions does not include sufficient session information in its cache, which allows remote malicious users to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
Darren Reed Ipfilter
Freebsd Freebsd
Openbsd Openbsd 2.8
1 EDB exploit
436
VMScore
CVE-2009-0537
Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and previous versions and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent malicious users to cause a denial of service (application crash) via a deep directory tree, related to the...
Openbsd Openbsd 4.1
Openbsd Openbsd 3.7
Openbsd Openbsd 2.8
Openbsd Openbsd 3.8
Openbsd Openbsd
Openbsd Openbsd 3.1
Openbsd Openbsd 3.3
Openbsd Openbsd 2.9
Openbsd Openbsd 2.1
Openbsd Openbsd 2.2
Openbsd Openbsd 3.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Openbsd Openbsd 3.2
Openbsd Openbsd 2.4
Openbsd Openbsd 4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 3.0
Openbsd Openbsd 4.0
Openbsd Openbsd 3.5
Microsoft Interix 6.0
Openbsd Openbsd 2.6
445
VMScore
CVE-2011-2168
Multiple integer overflows in the glob implementation in libc in OpenBSD prior to 4.9 might allow context-dependent malicious users to have an unspecified impact via a crafted string, related to the GLOB_APPEND and GLOB_DOOFFS flags, a different issue than CVE-2011-0418.
Openbsd Openbsd 4.1
Openbsd Openbsd 3.7
Openbsd Openbsd 2.8
Openbsd Openbsd 3.8
Openbsd Openbsd 4.4
Openbsd Openbsd 3.1
Openbsd Openbsd 3.3
Openbsd Openbsd 2.9
Openbsd Openbsd 4.7
Openbsd Openbsd 2.1
Openbsd Openbsd 2.2
Openbsd Openbsd 3.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Openbsd Openbsd 3.2
Openbsd Openbsd 4.5
Openbsd Openbsd 2.4
Openbsd Openbsd 4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 3.0
Openbsd Openbsd 4.0
Openbsd Openbsd 3.5
1 Github repository
730
VMScore
CVE-2003-0144
Buffer overflow in the lprm command in the lprold lpr package on SuSE 7.1 up to and including 7.3, OpenBSD 3.2 and previous versions, and possibly other operating systems, allows local users to gain root privileges via long command line arguments such as (1) request ID or (2) use...
Lprold Lprold 3.0.48
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.2
Openbsd Openbsd 2.2
Openbsd Openbsd 2.3
Openbsd Openbsd 3.1
Openbsd Openbsd 3.2
Bsd Lpr 0.48
Bsd Lpr 2000-05-07
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 3.0
2 EDB exploits
828
VMScore
CVE-2011-2895
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont prior to 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD prior to 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x prior to 5.0.3 and 5.1.x prior to 5.1.1, FreeTyp...
Openbsd Openbsd 3.5
Openbsd Openbsd 3.4
Openbsd Openbsd 3.3
Openbsd Openbsd 2.6
Openbsd Openbsd 2.0
Freebsd Freebsd
Netbsd Netbsd
Openbsd Openbsd 3.0
Openbsd Openbsd 2.9
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
X Libxfont 1.2.0
X Libxfont 1.2.1
X Libxfont 1.2.9
X Libxfont 1.3.0
X Libxfont 1.4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 2.8
Openbsd Openbsd 2.7
Openbsd Openbsd 2.5
Openbsd Openbsd
X Libxfont 1.2.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »