Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 4.8 vulnerabilities and exploits
(subscribe to this query)
436
VMScore
CVE-2011-0419
Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library prior to 1.4.3 and the Apache HTTP Server prior to 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris...
Apache Portable Runtime
Apache Http Server
Netbsd Netbsd 5.1
Google Android
Freebsd Freebsd
Openbsd Openbsd 4.8
Apple Mac Os X 10.6.0
Oracle Solaris 10
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Suse Linux Enterprise Server 10
1 EDB exploit
2 Github repositories
1000
VMScore
CVE-2003-0466
Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow malicious users to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 up to and including 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buff...
Wuftpd Wu-ftpd
Redhat Wu Ftpd 2.6.1-16
Apple Mac Os X Server 10.2.6
Apple Mac Os X 10.2.6
Sun Solaris 9.0
Freebsd Freebsd
Netbsd Netbsd
Openbsd Openbsd
5 EDB exploits
445
VMScore
CVE-2003-0804
The arplookup function in FreeBSD 5.1 and previous versions, Mac OS X prior to 10.2.8, and possibly other BSD-based systems, allows remote attackers on a local subnet to cause a denial of service (resource starvation and panic) via a flood of spoofed ARP requests.
Apple Mac Os X 10.2.5
Apple Mac Os X Server 10.2.2
Apple Mac Os X 10.2.7
Apple Mac Os X Server 10.2.4
Apple Mac Os X 10.2.1
Openbsd Openbsd 3.3
Apple Mac Os X Server 10.2.7
Apple Mac Os X Server 10.2.3
Freebsd Freebsd 4.5
Apple Mac Os X 10.2.4
Freebsd Freebsd 4.7
Apple Mac Os X 10.2.2
Freebsd Freebsd 4.1
Freebsd Freebsd 4.4
Apple Mac Os X Server 10.2.5
Freebsd Freebsd 5.1
Openbsd Openbsd 3.2
Freebsd Freebsd 4.9
Apple Mac Os X Server 10.2.6
Freebsd Freebsd 4.8
Freebsd Freebsd 4.2
Apple Mac Os X Server 10.2
445
VMScore
CVE-2003-0688
The DNS map code in Sendmail 8.12.8 and previous versions, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote malicious users to cause a denial of service (process crash) via an invalid DNS response that causes S...
Redhat Sendmail 8.12.8-4
Redhat Sendmail 8.12.5-7
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12.8
Sgi Irix 6.5.21
Sgi Irix 6.5.19
Sendmail Sendmail 8.12.4
Sgi Irix 6.5.20
Sendmail Sendmail 8.12.1
Sendmail Sendmail 8.12.5
Sendmail Sendmail 8.12.6
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.7
Freebsd Freebsd 4.7
Compaq Tru64 5.0a
Openbsd Openbsd 3.2
Freebsd Freebsd 4.8
Freebsd Freebsd 4.6
Compaq Tru64 5.1
Freebsd Freebsd 5.0
715
VMScore
CVE-2004-1471
Format string vulnerability in wrapper.c in CVS 1.12.x up to and including 1.12.8, and 1.11.x up to and including 1.11.16 allows remote attackers with CVSROOT commit access to cause a denial of service (application crash) and possibly execute arbitrary code via format string spec...
Openpkg Openpkg 2.0
Cvs Cvs 1.11.14
Cvs Cvs 1.11.1
Cvs Cvs 1.11
Cvs Cvs 1.12.2
Cvs Cvs 1.11.4
Cvs Cvs 1.12.7
Sgi Propack 3.0
Cvs Cvs 1.12.5
Openpkg Openpkg 1.3
Cvs Cvs 1.11.16
Cvs Cvs 1.11.5
Cvs Cvs 1.10.8
Cvs Cvs 1.11.15
Cvs Cvs 1.11.11
Openpkg Openpkg Current
Cvs Cvs 1.12.8
Cvs Cvs 1.11.6
Cvs Cvs 1.12.1
Cvs Cvs 1.11.3
Cvs Cvs 1.11.2
Cvs Cvs 1.11.10
1 EDB exploit
505
VMScore
CVE-2005-0356
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote malicious users to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard late...
Cisco Secure Access Control Server 3.2
Cisco Mgx 8230 1.2.11
Cisco Mgx 8250 1.2.10
Cisco Secure Access Control Server 3.2.2
Cisco Personal Assistant 1.3(2)
Cisco Unity Server 2.2
Cisco Secure Access Control Server 2.4
Cisco Secure Access Control Server 3.1.1
Cisco Personal Assistant 1.3(4)
Cisco Unity Server 3.0
Cisco Secure Access Control Server 2.6.3
Cisco Interactive Voice Response
Cisco Secure Access Control Server 2.42
Cisco Call Manager 3.0
Cisco Call Manager 3.1(3a)
Cisco Secure Access Control Server 3.3.2
Cisco Unity Server 3.1
Cisco Call Manager 1.0
Cisco Unity Server 3.3
Cisco Personal Assistant 1.3(3)
Cisco Secure Access Control Server 2.1
Cisco Secure Access Control Server 3.3(1)
1 EDB exploit
632
VMScore
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0(16)sc3
Cisco Ios 12.2(3.4)bp
Cisco Ios 11.2xa
Cisco Ios 12.4(2)t2
Cisco Ios 12.3ym
Cisco Ios 11.3(11b)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0(21)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1(2)e1
Cisco Ios 12.1xg
Cisco Ios 12.1(19)ew
Cisco Ios 12.3(14)ym4
Cisco Ios 12.0(8)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2(7b)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3(10)
1 Github repository
445
VMScore
CVE-2004-0112
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote malicious users to cause a denial of service (crash) via a crafted SSL/TLS handshak...
Cisco Firewall Services Module
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Hp Aaa Server
Cisco Firewall Services Module 1.1 (3.005)
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 (0.208)
Avaya Sg203 4.4
Hp Hp-ux 11.11
Redhat Enterprise Linux Desktop 3.0
Hp Hp-ux 11.23
Cisco Ciscoworks Common Management Foundation 2.1
Freebsd Freebsd 5.1
Avaya Sg208 4.4
Redhat Enterprise Linux 3.0
Avaya Sg200 4.4
Avaya Sg5 4.4
Redhat Linux 7.2
Cisco Ciscoworks Common Services 2.2
Openbsd Openbsd 3.3
445
VMScore
CVE-2004-0079
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote malicious users to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Cisco Firewall Services Module
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Hp Aaa Server
Cisco Firewall Services Module 1.1 (3.005)
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 (0.208)
Avaya Sg203 4.4
Hp Hp-ux 11.11
Redhat Enterprise Linux Desktop 3.0
Hp Hp-ux 11.23
Cisco Ciscoworks Common Management Foundation 2.1
Freebsd Freebsd 5.1
Avaya Sg208 4.4
Redhat Enterprise Linux 3.0
Avaya Sg200 4.4
Avaya Sg5 4.4
Redhat Linux 7.2
Cisco Ciscoworks Common Services 2.2
Openbsd Openbsd 3.3
445
VMScore
CVE-2004-0081
OpenSSL 0.9.6 prior to 0.9.6d does not properly handle unknown message types, which allows remote malicious users to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
Cisco Firewall Services Module
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Hp Aaa Server
Cisco Firewall Services Module 1.1 (3.005)
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 (0.208)
Avaya Sg203 4.4
Hp Hp-ux 11.11
Redhat Enterprise Linux Desktop 3.0
Hp Hp-ux 11.23
Cisco Ciscoworks Common Management Foundation 2.1
Freebsd Freebsd 5.1
Avaya Sg208 4.4
Redhat Enterprise Linux 3.0
Avaya Sg200 4.4
Avaya Sg5 4.4
Redhat Linux 7.2
Cisco Ciscoworks Common Services 2.2
Openbsd Openbsd 3.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2