Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 4.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-3572
OpenBSD 4.4, 4.5, and 4.6, when running on an i386 kernel, does not properly handle XMM exceptions, which allows local users to cause a denial of service (kernel panic) via unspecified vectors.
Openbsd Openbsd 4.4
Openbsd Openbsd 4.5
Openbsd Openbsd 4.6
NA
CVE-2009-0687
The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 up to and including 4.5, NetBSD 5.0 before RC3, MirOS 10 and previous versions, and MidnightBSD 0.3-current allows remote malicious users to cause a denial of service (panic) via crafted IP packets th...
Openbsd Openbsd 4.4
Mirbsd Miros
Netbsd Netbsd 5.0
Midnightbsd Midnightbsd 0.3-current
Openbsd Openbsd 4.5
Openbsd Openbsd 4.2
Openbsd Openbsd 4.3
3 EDB exploits
NA
CVE-2008-1657
OpenSSH 4.4 up to versions prior to 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
Openbsd Openssh 4.8
Openbsd Openssh 4.7
Openbsd Openssh 4.4
Openbsd Openssh 4.5
Openbsd Openssh 4.4p1
Openbsd Openssh 4.6
1 Github repository
NA
CVE-2007-4752
ssh in OpenSSH prior to 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows malicious users to violate intended policy and gain privileges by causing an X client to be treated as trusted.
Openbsd Openssh 4.3p2
Openbsd Openssh
Openbsd Openssh 4.1
Openbsd Openssh 4.0p1
Openbsd Openssh 4.4
Openbsd Openssh 4.1p1
Openbsd Openssh 4.2p1
Openbsd Openssh 4.5
Openbsd Openssh 4.2
Openbsd Openssh 4.4p1
Openbsd Openssh 4.3p1
Openbsd Openssh 4.3
Openbsd Openssh 4.0
NA
CVE-2011-2168
Multiple integer overflows in the glob implementation in libc in OpenBSD prior to 4.9 might allow context-dependent malicious users to have an unspecified impact via a crafted string, related to the GLOB_APPEND and GLOB_DOOFFS flags, a different issue than CVE-2011-0418.
Openbsd Openbsd 4.1
Openbsd Openbsd 3.7
Openbsd Openbsd 2.8
Openbsd Openbsd 3.8
Openbsd Openbsd 4.4
Openbsd Openbsd 3.1
Openbsd Openbsd 3.3
Openbsd Openbsd 2.9
Openbsd Openbsd 4.7
Openbsd Openbsd 2.1
Openbsd Openbsd 2.2
Openbsd Openbsd 3.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Openbsd Openbsd 3.2
Openbsd Openbsd 4.5
Openbsd Openbsd 2.4
Openbsd Openbsd 4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 3.0
Openbsd Openbsd 4.0
Openbsd Openbsd 3.5
1 Github repository
NA
CVE-2000-0999
Format string vulnerabilities in OpenBSD ssh program (and possibly other BSD-based operating systems) allow malicious users to gain root privileges.
Openbsd Openssh 4.5
NA
CVE-2006-4925
packet.c in ssh in OpenSSH allows remote malicious users to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.
Openbsd Openssh 4.5
NA
CVE-2002-0572
FreeBSD 4.5 and previous versions, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called set...
Sun Solaris 2.5.1
Freebsd Freebsd 4.5
Openbsd Openbsd 2.1
Sun Sunos 5.7
Openbsd Openbsd 2.2
Sun Sunos 5.8
Openbsd Openbsd 2.0
Freebsd Freebsd 4.4
Sun Solaris 7.0
Sun Sunos 5.5.1
Openbsd Openbsd 2.3
Sun Solaris 2.6
Sun Solaris 8.0
Sun Sunos -
1 EDB exploit
NA
CVE-2002-1220
BIND 8.3.x up to and including 8.3.3 allows remote malicious users to cause a denial of service (termination due to assertion failure) via a request for a subdomain that does not exist, with an OPT resource record with a large UDP payload size.
Isc Bind 8.3.1
Isc Bind 8.3.2
Isc Bind 8.3.0
Isc Bind 8.3.3
Openbsd Openbsd 3.1
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Freebsd Freebsd 4.4
Openbsd Openbsd 3.2
Openbsd Openbsd 3.0
Freebsd Freebsd 4.6
1 EDB exploit
NA
CVE-2002-0414
KAME-derived implementations of IPsec on NetBSD 1.5.2, FreeBSD 4.5, and other operating systems, does not properly consult the Security Policy Database (SPD), which could cause a Security Gateway (SG) that does not use Encapsulating Security Payload (ESP) to forward forged IPv4 p...
Netbsd Netbsd 1.5
Freebsd Freebsd 4.5
Openbsd Openbsd 2.7
Netbsd Netbsd 1.5.1
Freebsd Freebsd 4.4
Netbsd Netbsd 1.5.2
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Openbsd Openbsd 2.6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »