Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 6.9 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2022-27881
engine.c in slaacd in OpenBSD 6.9 and 7.0 prior to 2022-02-21 has a buffer overflow triggerable by an IPv6 router advertisement with more than seven nameservers. NOTE: privilege separation and pledge can prevent exploitation.
Openbsd Openbsd 7.0
Openbsd Openbsd 6.9
5
CVSSv2
CVE-2022-27882
slaacd in OpenBSD 6.9 and 7.0 prior to 2022-03-22 has an integer signedness error and resultant heap-based buffer overflow triggerable by a crafted IPv6 router advertisement. NOTE: privilege separation and pledge can prevent exploitation.
Openbsd Openbsd 6.9
Openbsd Openbsd 7.0
7.8
CVSSv2
CVE-2016-8858
The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x up to and including 7.3 allows remote malicious users to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that "OpenSSH upstream does not cons...
Openbsd Openssh 6.9
Openbsd Openssh 7.3
Openbsd Openssh 7.1
Openbsd Openssh 7.2
Openbsd Openssh 6.8
Openbsd Openssh 7.0
5
CVSSv2
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH prior to 7.1p2 allows remote malicious users to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
Openbsd Openssh 6.9
Openbsd Openssh 6.8
Openbsd Openssh 7.0
Openbsd Openssh 7.1
7.2
CVSSv2
CVE-2015-6565
sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence.
Openbsd Openssh 6.9
Openbsd Openssh 6.8
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started