Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 3.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0766
OpenBSD 2.9 up to and including 3.1 allows local users to cause a denial of service (resource exhaustion) and gain root privileges by filling the kernel's file descriptor table and closing file descriptors 0, 1, or 2 before executing a privileged process, which is not proper...
Openbsd Openbsd 2.9
Openbsd Openbsd 3.0
Openbsd Openbsd 3.1
NA
CVE-2002-2280
syslogd on OpenBSD 2.9 up to and including 3.2 does not change the source IP address of syslog packets when the machine's IP addressed is changed without rebooting, e.g. via ifconfig, which can cause incorrect information to be sent to the syslog server.
Openbsd Openbsd 2.9
Openbsd Openbsd 3.0
Openbsd Openbsd 3.1
Openbsd Openbsd 3.2
NA
CVE-2004-1799
PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote malicious users to bypass intended packet filters via spoofed packets to other interfaces.
Openbsd Openbsd 3.2
Openbsd Openbsd 3.3
Openbsd Openbsd 3.4
Openbsd Openbsd 3.0
Openbsd Openbsd 3.1
NA
CVE-2002-1420
Integer signedness error in select() on OpenBSD 3.1 and previous versions allows local users to overwrite arbitrary kernel memory via a negative value for the size parameter, which satisfies the boundary check as a signed integer, but is later used as an unsigned integer during a...
Openbsd Openbsd 3.1
Openbsd Openbsd 3.0
NA
CVE-2002-2188
OpenBSD prior to 3.2 allows local users to cause a denial of service (kernel crash) via a call to getrlimit(2) with invalid arguments, possibly due to an integer signedness error.
Openbsd Openbsd 3.0
Openbsd Openbsd 3.1
5.5
CVSSv3
CVE-2001-1559
The uipc system calls (uipc_syscalls.c) in OpenBSD 2.9 and 3.0 provide user mode return instead of versus rval kernel mode values to the fdrelease function, which allows local users to cause a denial of service and trigger a null dereference.
Openbsd Openbsd 2.9
Openbsd Openbsd 3.0
1 EDB exploit
NA
CVE-2002-0542
mail in OpenBSD 2.9 and 3.0 processes a tilde (~) escape character in a message even when it is not in interactive mode, which could allow local users to gain root privileges via calls to mail in cron.
Openbsd Openbsd 3.0
Openbsd Openbsd 2.9
1 EDB exploit
NA
CVE-2001-1415
vi.recover in OpenBSD prior to 3.1 allows local users to remove arbitrary zero-byte files such as device nodes.
Openbsd Openbsd 2.9
Openbsd Openbsd 3.0
NA
CVE-2002-2180
The setitimer(2) system call in OpenBSD 2.0 up to and including 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.2
Openbsd Openbsd 2.4
Openbsd Openbsd 3.1
Openbsd Openbsd 2.1
Openbsd Openbsd 2.3
Openbsd Openbsd 3.0
NA
CVE-2004-0257
OpenBSD 3.4 and NetBSD 1.6 and 1.6.1 allow remote malicious users to cause a denial of service (crash) by sending an IPv6 packet with a small MTU to a listening port and then issuing a TCP connect to that port.
Openbsd Openbsd 3.4
Netbsd Netbsd 1.6.1
Openbsd Openbsd 3.0
Netbsd Netbsd 1.6
Openbsd Openbsd 3.1
Openbsd Openbsd 3.2
Openbsd Openbsd 3.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »