Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 3.6 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-2230
Heap-based buffer overflow in isakmpd on OpenBSD 3.4 up to and including 3.6 allows local users to cause a denial of service (panic) and corrupt memory via IPSEC credentials on a socket.
Openbsd Openbsd 3.5
Openbsd Openbsd 3.6
Openbsd Openbsd 3.4
NA
CVE-2005-0960
Multiple vulnerabilities in the SACK functionality in (1) tcp_input.c and (2) tcp_usrreq.c OpenBSD 3.5 and 3.6 allow remote malicious users to cause a denial of service (memory exhaustion or system crash).
Openbsd Openbsd 3.5
Openbsd Openbsd 3.6
NA
CVE-2005-0637
The copy functions in locore.s such as copyout in OpenBSD 3.5 and 3.6, and possibly other BSD based operating systems, may allow malicious users to exceed certain address boundaries and modify kernel memory.
Openbsd Openbsd 3.5
Openbsd Openbsd 3.6
NA
CVE-2005-0740
The TCP stack (tcp_input.c) in OpenBSD 3.5 and 3.6 allows remote malicious users to cause a denial of service (system panic) via crafted values in the TCP timestamp option, which causes invalid arguments to be used when calculating the retransmit timeout.
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 3.4
Openbsd Openbsd 3.5
Openbsd Openbsd 3.6
Openbsd Openbsd 2.2
Openbsd Openbsd 2.4
Openbsd Openbsd 3.1
Openbsd Openbsd 3.3
Openbsd Openbsd 2.3
Openbsd Openbsd 2.5
Openbsd Openbsd 3.0
Openbsd Openbsd 3.2
NA
CVE-2009-0537
Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and previous versions and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent malicious users to cause a denial of service (application crash) via a deep directory tree, related to the...
Openbsd Openbsd 4.1
Openbsd Openbsd 3.7
Openbsd Openbsd 2.8
Openbsd Openbsd 3.8
Openbsd Openbsd
Openbsd Openbsd 3.1
Openbsd Openbsd 3.3
Openbsd Openbsd 2.9
Openbsd Openbsd 2.1
Openbsd Openbsd 2.2
Openbsd Openbsd 3.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Openbsd Openbsd 3.2
Openbsd Openbsd 2.4
Openbsd Openbsd 4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 3.0
Openbsd Openbsd 4.0
Openbsd Openbsd 3.5
Microsoft Interix 6.0
Openbsd Openbsd 2.6
NA
CVE-2011-2168
Multiple integer overflows in the glob implementation in libc in OpenBSD prior to 4.9 might allow context-dependent malicious users to have an unspecified impact via a crafted string, related to the GLOB_APPEND and GLOB_DOOFFS flags, a different issue than CVE-2011-0418.
Openbsd Openbsd 4.1
Openbsd Openbsd 3.7
Openbsd Openbsd 2.8
Openbsd Openbsd 3.8
Openbsd Openbsd 4.4
Openbsd Openbsd 3.1
Openbsd Openbsd 3.3
Openbsd Openbsd 2.9
Openbsd Openbsd 4.7
Openbsd Openbsd 2.1
Openbsd Openbsd 2.2
Openbsd Openbsd 3.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Openbsd Openbsd 3.2
Openbsd Openbsd 4.5
Openbsd Openbsd 2.4
Openbsd Openbsd 4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 3.0
Openbsd Openbsd 4.0
Openbsd Openbsd 3.5
1 Github repository
NA
CVE-2005-2666
SSH, as implemented in OpenSSH prior to 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate a list of additional ta...
Openbsd Openssh 3.8
Openbsd Openssh 3.8.1p1
Openbsd Openssh 3.1
Openbsd Openssh 3.0.2p1
Openbsd Openssh 3.8.1
Openbsd Openssh 3.7.1p2
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.1p1
Openbsd Openssh 3.6.1p2
Openbsd Openssh 3.9
Openbsd Openssh 3.0
Openbsd Openssh 3.2
Openbsd Openssh 3.6
Openbsd Openssh 3.7
Openbsd Openssh 3.5p1
Openbsd Openssh 3.0.1p1
Openbsd Openssh 3.3
Openbsd Openssh 3.2.2p1
Openbsd Openssh 3.9.1p1
Openbsd Openssh 3.0.2
Openbsd Openssh 3.4p1
Openbsd Openssh 3.6.1p1
NA
CVE-2014-7250
The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote malicious users to cause a denial of service (resource consumption) via crafted packets.
Openbsd Openbsd 3.6
Netbsd Netbsd 2.0
Freebsd Freebsd 5.4
Bsd Bsd 4.3
NA
CVE-2006-0225
scp in OpenSSH 4.2p1 allows malicious users to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
Openbsd Openssh 3.0p1
Openbsd Openssh 3.1
Openbsd Openssh 3.4
Openbsd Openssh 3.4p1
Openbsd Openssh 3.7
Openbsd Openssh 3.7.1
Openbsd Openssh 3.7.1p2
Openbsd Openssh 4.0p1
Openbsd Openssh 4.1p1
Openbsd Openssh 3.0.2
Openbsd Openssh 3.0.2p1
Openbsd Openssh 3.3
Openbsd Openssh 3.3p1
Openbsd Openssh 3.6.1p1
Openbsd Openssh 3.6.1p2
Openbsd Openssh 3.9.1
Openbsd Openssh 3.9.1p1
Openbsd Openssh 3.0
Openbsd Openssh 3.1p1
Openbsd Openssh 3.2
Openbsd Openssh 3.5
Openbsd Openssh 3.5p1
NA
CVE-2005-2798
sshd in OpenSSH prior to 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.
Openbsd Openssh 3.1p1
Openbsd Openssh 3.2
Openbsd Openssh 3.5
Openbsd Openssh 3.5p1
Openbsd Openssh 3.7.1p2
Openbsd Openssh 3.8
Openbsd Openssh 3.8.1
Openbsd Openssh 3.0
Openbsd Openssh 3.0.1
Openbsd Openssh 3.0.1p1
Openbsd Openssh 3.2.2p1
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.6
Openbsd Openssh 3.6.1
Openbsd Openssh 3.8.1p1
Openbsd Openssh 3.9
Openbsd Openssh 3.0p1
Openbsd Openssh 3.1
Openbsd Openssh 3.4
Openbsd Openssh 3.4p1
Openbsd Openssh 3.7
Openbsd Openssh 3.7.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »