Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 6.2 vulnerabilities and exploits
(subscribe to this query)
4.9
CVSSv2
CVE-2018-14775
tss_alloc in sys/arch/i386/i386/gdt.c in OpenBSD 6.2 and 6.3 has a Local Denial of Service (system crash) due to incorrect I/O port access control on the i386 architecture.
Openbsd Openbsd 6.3
Openbsd Openbsd 6.2
1 Github repository
2.1
CVSSv2
CVE-2002-0701
ktrace in BSD-based operating systems allows the owner of a process with special privileges to trace the process after its privileges have been lowered, which may allow the owner to obtain sensitive information that the process obtained while it was running with the extra privile...
Freebsd Freebsd 6.2
Openbsd Openbsd
5.8
CVSSv2
CVE-2014-2653
The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and previous versions allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
Openbsd Openssh 6.4
Openbsd Openssh 6.3
Openbsd Openssh 6.5
Openbsd Openssh 6.2
Openbsd Openssh 6.1
Openbsd Openssh 6.0
Openbsd Openssh
6
CVSSv2
CVE-2013-4548
The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restri...
Openbsd Openssh 6.3
Openbsd Openssh 6.2
7.5
CVSSv2
CVE-2000-0750
Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote malicious users to execute arbitrary commands via a long file name.
Netbsd Netbsd 1.4.2
Redhat Linux 6.0
Redhat Linux 6.2
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Netbsd Netbsd 1.4.1
Redhat Linux 6.1
7.5
CVSSv2
CVE-2000-0751
mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote malicious users to execute arbitrary commands.
Openbsd Openbsd 2.7
Redhat Linux 6.1
Redhat Linux 6.2
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.4.2
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Redhat Linux 6.0
1 EDB exploit
5.8
CVSSv2
CVE-2014-2532
sshd in OpenSSH prior to 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote malicious users to bypass intended environment restrictions by using a substring located before a wildcard character.
Oracle Communications User Data Repository 10.0.1
Openbsd Openssh
Openbsd Openssh 6.4
Openbsd Openssh 6.1
Openbsd Openssh 6.0
Openbsd Openssh 6.3
Openbsd Openssh 6.2
4.4
CVSSv2
CVE-2006-6397
Integer overflow in banner/banner.c in FreeBSD, NetBSD, and OpenBSD might allow local users to modify memory via a long banner. NOTE: CVE and multiple third parties dispute this issue. Since banner is not setuid, an exploit would not cross privilege boundaries in normal operation...
Netbsd Netbsd 2.0.4
Freebsd Freebsd 6.2
Openbsd Openbsd
10
CVSSv2
CVE-1999-0798
Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type.
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
Sco Openserver
Sco Unixware 7.0
Sco Unixware 7.0.1
Redhat Linux
Sco Internet Faststart
Bsdi Bsd Os
Freebsd Freebsd 6.2
5.1
CVSSv2
CVE-1999-0061
File creation and deletion, and remote execution, in the BSD line printer daemon (lpd).
Openbsd Openbsd 2.1
Freebsd Freebsd 6.2
Linux Linux Kernel 2.6.20.1
Bsdi Bsd Os
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3661
open redirect
CVE-2024-25512
CVE-2024-33788
command injection
SSTI
CVE-2024-0043
CVE-2024-29210
CVE-2024-25510
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »