Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c in OpenSSH prior to 7.1p2 allows remote malicious users to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.
Openbsd Openssh 6.9
Openbsd Openssh 6.8
Openbsd Openssh 7.0
Openbsd Openssh 7.1
465
VMScore
CVE-2008-1215
Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via long commands containing "~&...
Netbsd Netbsd
Openbsd Openbsd 4.1
Openbsd Openbsd 4.2
Freebsd Freebsd 6.3
Freebsd Freebsd 7.0
1 EDB exploit
329
VMScore
CVE-2002-2092
Race condition in exec in OpenBSD 4.0 and previous versions, NetBSD 1.5.2 and previous versions, and FreeBSD 4.4 and previous versions allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.5.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.8
725
VMScore
CVE-2002-0572
FreeBSD 4.5 and previous versions, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called set...
Freebsd Freebsd 4.5
Openbsd Openbsd 2.0
Openbsd Openbsd 2.2
Sun Sunos -
Sun Solaris 7.0
Openbsd Openbsd 2.3
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 2.6
Freebsd Freebsd 4.4
Sun Solaris 8.0
Openbsd Openbsd 2.1
Sun Sunos 5.7
Sun Sunos 5.8
1 EDB exploit
446
VMScore
CVE-2019-8460
OpenBSD kernel version <= 6.5 can be forced to create long chains of TCP SACK holes that causes very expensive calls to tcp_sack_option() for every incoming SACK packet which can lead to a denial of service.
Openbsd Openbsd
668
VMScore
CVE-2020-16088
iked in OpenIKED, as used in OpenBSD up to and including 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches.
Openbsd Openbsd
801
VMScore
CVE-2019-19726
OpenBSD up to and including 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries ...
Openbsd Openbsd
1 Article
670
VMScore
CVE-2017-1000372
A flaw exists in OpenBSD's implementation of the stack guard page that allows malicious users to bypass it resulting in arbitrary code execution using setuid binaries such as /usr/bin/at. This affects OpenBSD 6.1 and possibly earlier versions.
Openbsd Openbsd
645
VMScore
CVE-2017-1000373
The OpenBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows malicious users to consume arbitrary amounts of stack memory and manipulate st...
Openbsd Openbsd
1 EDB exploit
445
VMScore
CVE-1999-0482
OpenBSD kernel crash through TSS handling, as caused by the crashme program.
Openbsd Openbsd
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »