Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 4.5 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-0414
KAME-derived implementations of IPsec on NetBSD 1.5.2, FreeBSD 4.5, and other operating systems, does not properly consult the Security Policy Database (SPD), which could cause a Security Gateway (SG) that does not use Encapsulating Security Payload (ESP) to forward forged IPv4 p...
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Openbsd Openbsd 2.6
Freebsd Freebsd 4.2
Freebsd Freebsd 4.4
Freebsd Freebsd 4.3
Freebsd Freebsd 4.5
Openbsd Openbsd 2.7
7.5
CVSSv2
CVE-2001-0572
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote malicious user to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password gu...
Openbsd Openssh 4.5
Ssh Ssh 1.2.30
Ssh Ssh 1.2.25
Ssh Ssh 1.2.26
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
Ssh Ssh 1.2.24
Ssh Ssh 1.2.31
7.2
CVSSv2
CVE-2002-0572
FreeBSD 4.5 and previous versions, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called set...
Freebsd Freebsd 4.5
Openbsd Openbsd 2.0
Openbsd Openbsd 2.2
Sun Sunos -
Sun Solaris 7.0
Openbsd Openbsd 2.3
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 2.6
Freebsd Freebsd 4.4
Sun Solaris 8.0
Openbsd Openbsd 2.1
Sun Sunos 5.7
Sun Sunos 5.8
1 EDB exploit
7.1
CVSSv2
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0\\(16\\)sc3
Cisco Ios 12.2\\(3.4\\)bp
Cisco Ios 11.2xa
Cisco Ios 12.4\\(2\\)t2
Cisco Ios 12.3ym
Cisco Ios 11.3\\(11b\\)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0\\(21\\)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1\\(2\\)e1
Cisco Ios 12.1xg
Cisco Ios 12.1\\(19\\)ew
Cisco Ios 12.3\\(14\\)ym4
Cisco Ios 12.0\\(8\\)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2\\(7b\\)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3\\(10\\)
1 Github repository
7.1
CVSSv2
CVE-2004-1471
Format string vulnerability in wrapper.c in CVS 1.12.x up to and including 1.12.8, and 1.11.x up to and including 1.11.16 allows remote attackers with CVSROOT commit access to cause a denial of service (application crash) and possibly execute arbitrary code via format string spec...
Cvs Cvs 1.11.10
Cvs Cvs 1.11.11
Cvs Cvs 1.11.5
Cvs Cvs 1.11.6
Openpkg Openpkg 2.0
Openpkg Openpkg Current
Cvs Cvs 1.10.7
Cvs Cvs 1.10.8
Cvs Cvs 1.11
Cvs Cvs 1.11.16
Cvs Cvs 1.11.2
Cvs Cvs 1.12.5
Cvs Cvs 1.12.7
Cvs Cvs 1.11.14
Cvs Cvs 1.11.15
Cvs Cvs 1.12.1
Cvs Cvs 1.12.2
Sgi Propack 2.4
Sgi Propack 3.0
Cvs Cvs 1.11.1
Cvs Cvs 1.11.1 P1
Cvs Cvs 1.11.3
1 EDB exploit
6.8
CVSSv2
CVE-2009-0689
Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x pr...
Freebsd Freebsd 6.4
Openbsd Openbsd 4.5
Netbsd Netbsd 5.0
Mozilla Firefox 3.0.2
Mozilla Firefox 3.0.3
Mozilla Firefox 3.5
Mozilla Firefox 3.5.1
Freebsd Freebsd 7.2
Mozilla Firefox 3.0.13
Mozilla Firefox 3.0.14
Mozilla Firefox 3.0.8
Mozilla Firefox 3.0.9
Mozilla Firefox 3.0.11
Mozilla Firefox 3.0.12
Mozilla Firefox 3.0.6
Mozilla Firefox 3.0.7
K-meleon Project K-meleon 1.5.3
Mozilla Seamonkey 1.1.8
Mozilla Firefox 3.0.1
Mozilla Firefox 3.0.10
Mozilla Firefox 3.0.4
Mozilla Firefox 3.0.5
11 EDB exploits
1 Github repository
6.5
CVSSv2
CVE-2008-1657
OpenSSH 4.4 up to versions prior to 4.9 allows remote authenticated users to bypass the sshd_config ForceCommand directive by modifying the .ssh/rc session file.
Openbsd Openssh 4.4
Openbsd Openssh 4.4p1
Openbsd Openssh 4.5
Openbsd Openssh 4.6
Openbsd Openssh 4.7
Openbsd Openssh 4.8
1 Github repository
5
CVSSv2
CVE-2010-5107
The default configuration of OpenSSH up to and including 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote malicious users to cause a denial of service (connection-slot exhaustion) by periodically making...
Openbsd Openssh
Openbsd Openssh 5.7
Openbsd Openssh 5.1
Openbsd Openssh 4.2p1
Openbsd Openssh 4.1p1
Openbsd Openssh 4.3
Openbsd Openssh 4.4
Openbsd Openssh 3.8.1p1
Openbsd Openssh 3.9
Openbsd Openssh 3.0p1
Openbsd Openssh 3.0.2
Openbsd Openssh 3.5p1
Openbsd Openssh 3.6
Openbsd Openssh 3.2.2
Openbsd Openssh 3.2.2p1
Openbsd Openssh 2.1
Openbsd Openssh 2.9.9
Openbsd Openssh 1.5.7
Openbsd Openssh 1.5.8
Openbsd Openssh 1.2
Openbsd Openssh 5.2
Openbsd Openssh 5.3
2 Github repositories
5
CVSSv2
CVE-2011-2168
Multiple integer overflows in the glob implementation in libc in OpenBSD prior to 4.9 might allow context-dependent malicious users to have an unspecified impact via a crafted string, related to the GLOB_APPEND and GLOB_DOOFFS flags, a different issue than CVE-2011-0418.
Openbsd Openbsd 4.1
Openbsd Openbsd 3.7
Openbsd Openbsd 2.8
Openbsd Openbsd 3.8
Openbsd Openbsd 4.4
Openbsd Openbsd 3.1
Openbsd Openbsd 3.3
Openbsd Openbsd 2.9
Openbsd Openbsd 4.7
Openbsd Openbsd 2.1
Openbsd Openbsd 2.2
Openbsd Openbsd 3.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Openbsd Openbsd 3.2
Openbsd Openbsd 4.5
Openbsd Openbsd 2.4
Openbsd Openbsd 4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 3.0
Openbsd Openbsd 4.0
Openbsd Openbsd 3.5
1 Github repository
5
CVSSv2
CVE-2007-2243
OpenSSH 4.6 and previous versions, when ChallengeResponseAuthentication is enabled, allows remote malicious users to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue t...
Openbsd Openssh 2.1
Openbsd Openssh 2.1.1
Openbsd Openssh 2.9.9
Openbsd Openssh 2.9.9p2
Openbsd Openssh 3.0p1
Openbsd Openssh 3.1
Openbsd Openssh 3.3p1
Openbsd Openssh 3.4
Openbsd Openssh 3.6.1p2
Openbsd Openssh 3.7
Openbsd Openssh 3.9.1
Openbsd Openssh 3.9.1p1
Openbsd Openssh 4.3
Openbsd Openssh 4.3p1
Openbsd Openssh 1.2.27
Openbsd Openssh 1.2.3
Openbsd Openssh 2.5.2
Openbsd Openssh 2.9
Openbsd Openssh 3.0.2
Openbsd Openssh 3.0.2p1
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »