Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd - vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2016-6240
Integer truncation error in the amap_alloc function in OpenBSD 5.8 and 5.9 allows local users to execute arbitrary code with kernel privileges via a large size value.
Openbsd Openbsd 5.9
Openbsd Openbsd 5.8
7.2
CVSSv2
CVE-2016-6241
Integer overflow in the amap_alloc1 function in OpenBSD 5.8 and 5.9 allows local users to execute arbitrary code with kernel privileges via a large size value.
Openbsd Openbsd 5.9
Openbsd Openbsd 5.8
7.2
CVSSv2
CVE-2016-10012
The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH prior to 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation ...
Openbsd Openssh
7.2
CVSSv2
CVE-2015-6565
sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence.
Openbsd Openssh 6.9
Openbsd Openssh 6.8
1 EDB exploit
7.2
CVSSv2
CVE-2011-1013
Integer signedness error in the drm_modeset_ctl function in (1) drivers/gpu/drm/drm_irq.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel prior to 2.6.38 and (2) sys/dev/pci/drm/drm_irq.c in the kernel in OpenBSD prior to 4.9 allows local users to trigger out-...
Linux Linux Kernel
Openbsd Openbsd
3 Github repositories
7.2
CVSSv2
CVE-2007-5365
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 up to and including 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote malicious users to execute arbitrary code or cause a denial of service (daemon crash) via...
Sun Opensolaris Snv 36
Sun Opensolaris Snv 30
Sun Opensolaris Snv 70
Sun Opensolaris Snv 33
Sun Opensolaris Snv 101
Sun Opensolaris Snv 90
Sun Opensolaris Snv 93
Sun Opensolaris Snv 85
Sun Opensolaris Snv 57
Sun Opensolaris Snv 87
Openbsd Openbsd 4.1
Sun Opensolaris Snv 26
Sun Opensolaris Snv 50
Redhat Enterprise Linux 2.1
Sun Opensolaris Snv 73
Sun Opensolaris Snv 72
Sun Opensolaris Snv 67
Ubuntu Ubuntu Linux 6.06
Sun Opensolaris Snv 91
Sun Opensolaris Snv 92
Sun Opensolaris Snv 01
Sun Opensolaris Snv 77
1 EDB exploit
7.2
CVSSv2
CVE-2007-3048
GNU screen 4.0.3 allows local users to unlock the screen via a CTRL-C sequence at the password prompt. NOTE: multiple third parties report inability to reproduce this issue
Gnu Screen 4.0.3
1 EDB exploit
7.2
CVSSv2
CVE-2006-6164
The _dl_unsetenv function in loader.c in the ELF ld.so in OpenBSD 3.9 and 4.0 does not properly remove duplicate environment variables, which allows local users to pass dangerous variables such as LD_PRELOAD to loading processes, which might be leveraged to gain privileges.
Openbsd Openbsd 3.9
Openbsd Openbsd 4.0
7.2
CVSSv2
CVE-2004-0106
Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084.
Xfree86 Project X11r6 4.1.0
Xfree86 Project X11r6 4.3.0
Xfree86 Project X11r6 4.2.1
Xfree86 Project X11r6 4.2.0
Xfree86 Project X11r6 4.1.12
Xfree86 Project X11r6 4.1.11
Openbsd Openbsd 3.3
Openbsd Openbsd 3.4
7.2
CVSSv2
CVE-2002-1420
Integer signedness error in select() on OpenBSD 3.1 and previous versions allows local users to overwrite arbitrary kernel memory via a negative value for the size parameter, which satisfies the boundary check as a signed integer, but is later used as an unsigned integer during a...
Openbsd Openbsd 3.1
Openbsd Openbsd 3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »